Splunk Enterprise Security

Threat Intelligence Management - Wrong threat match field?

torstein1
Explorer

Hi,

I have looked at Threat match "src" under Threat Intelligence Manager.

In the configuration the datamodel DNS Resolution is enabled and the match field is DNS.query.

However, in the generated SPL i find these to lines:

 

| eval "threat_match_field"=if(isnull('threat_match_field'),"src",'threat_match_field') 
| eval "threat_match_value"=if(isnull('threat_match_value'),'DNS.query','threat_match_value')

 


This will change the threat_match_field to src, but I would have thought it should be "query"?

And this will make a wrong description in the Threat Activity use case when the fields are populated.

Is this a fault, have anyone else noticed this?

Get Updates on the Splunk Community!

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...

Cloud Platform & Enterprise: Classic Dashboard Export Feature Deprecation

As of Splunk Cloud Platform 9.3.2408 and Splunk Enterprise 9.4, classic dashboard export features are now ...