Splunk Enterprise Security

Splunk Enterprise Security: How to set up alerts when a notable event with urgency High & Critical arises in the Incident review?

kiran331
Builder

Hi

How to set up alerts when a notable event with urgency High & Critical arises in the Incident review with event details?

1 Solution

mwhittaker126
Engager

This is what i used. Hopefully this can help you out.

`notable` | where urgency="high" OR urgency="critical" | table _time source src dest user | eval computer=coalesce(src,dest)

View solution in original post

mwhittaker126
Engager

This is what i used. Hopefully this can help you out.

`notable` | where urgency="high" OR urgency="critical" | table _time source src dest user | eval computer=coalesce(src,dest)
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...