Splunk Enterprise Security

Splunk Enterprise Security: How to set up alerts when a notable event with urgency High & Critical arises in the Incident review?

kiran331
Builder

Hi

How to set up alerts when a notable event with urgency High & Critical arises in the Incident review with event details?

1 Solution

mwhittaker126
Engager

This is what i used. Hopefully this can help you out.

`notable` | where urgency="high" OR urgency="critical" | table _time source src dest user | eval computer=coalesce(src,dest)

View solution in original post

mwhittaker126
Engager

This is what i used. Hopefully this can help you out.

`notable` | where urgency="high" OR urgency="critical" | table _time source src dest user | eval computer=coalesce(src,dest)
Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...