Splunk Enterprise Security

Splunk Rules: How to suppress threat activity alert into one

pavanbmishra
Path Finder

Hello Dears,

We usually see the threat correlation alert suppressed basis on the filed specified as per snap attached. It does work when there is any suspicious IP address reported, but not for URLs, say if the domain is registered as blacklisted and if the traffic hitting to that domain having different URLs, it triggered all those alerts.

How can we suppress these into one, if the domain is the same? Added additional field (threat_collection_key) to suppress URLs but seems not working here. Is there any workaround?

alt text

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Building Momentum: Splunk Developer Program at .conf25

At Splunk, developers are at the heart of innovation. That’s why this year at .conf25, we officially launched ...