Splunk Enterprise Security

Tune out blocks for Threat Activity Detected in ES.

jbillings
Path Finder

I'm a bit of a rookie and trying to tune the "Threat Activity Detected" correlation search in ES. I would like to take the output of the default search and compare the src, dest, _time from a search on the firewall. I would also output the action= from the firewall and if action=allowed then alert. I plan to create the same for repeat attempts, but trying to get past the comparison.

rezzwan
Engager

Re up, i also facing the same issues

 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...