Splunk Enterprise Security

Threat Artifacts setting

WildHuckleberry
Path Finder

Hello Splunkers, 

 

is there any way to change that red box name as a test?? 

 

스크린샷 2022-01-27 오후 5.01.43.png

 

 

Thank you in advance 🙂

Labels (2)
0 Karma
1 Solution

isoutamo
SplunkTrust
SplunkTrust

Hi

just add in this panel's SPL next part

....
| eval threat_collection = if(threat_collection == "ip_intel", "Foo Bar", threat_collection)
| ....

r. Ismo 

View solution in original post

isoutamo
SplunkTrust
SplunkTrust

Hi

just add in this panel's SPL next part

....
| eval threat_collection = if(threat_collection == "ip_intel", "Foo Bar", threat_collection)
| ....

r. Ismo 

Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...