Splunk Enterprise Security

Threat Intelligence Management - Wrong threat match field?

torstein1
Explorer

Hi,

I have looked at Threat match "src" under Threat Intelligence Manager.

In the configuration the datamodel DNS Resolution is enabled and the match field is DNS.query.

However, in the generated SPL i find these to lines:

 

| eval "threat_match_field"=if(isnull('threat_match_field'),"src",'threat_match_field') 
| eval "threat_match_value"=if(isnull('threat_match_value'),'DNS.query','threat_match_value')

 


This will change the threat_match_field to src, but I would have thought it should be "query"?

And this will make a wrong description in the Threat Activity use case when the fields are populated.

Is this a fault, have anyone else noticed this?

Get Updates on the Splunk Community!

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...