Splunk Enterprise Security

Splunk Enterprise Security
Community Activity
abdullahgursu
Is it the proper way to get incidents through a webhook that searchs for notable events and send them to our api? I ...
by abdullahgursu Engager in Splunk Enterprise Security 03-22-2018
0 0
0
0
samhodgson
Hi, I am reviewing the results for the 'ESCU - DNS Query Requests Resolved by Unauthorized DNS Servers - Rule' corre...
by samhodgson Path Finder in Splunk Enterprise Security 03-21-2018
0 0
0
0
att35
Hi, We are indexing eStreamer logs from sourcefire and have the app, "eStreamer for Splunk" (2.2.1) and add-on, "Spl...
by att35 Builder in Splunk Enterprise Security 03-21-2018
0 6
0
6
abdullahgursu
I have admin, user, power roles on Splunk Enterprise Security instance but it still requires authentication and it do...
by abdullahgursu Engager in Splunk Enterprise Security 03-14-2018
0 1
0
1
mmoermans
When using Enterprise Security we get the following error "Failed to find the target event with valid host and source...
by mmoermans Path Finder in Splunk Enterprise Security 03-14-2018
0 0
0
0
mohammedsamir
If it isn't possible to install other apps that aren't CIM Compliant on the Sh machine that has the Enterprise securi...
by mohammedsamir Explorer in Splunk Enterprise Security 03-13-2018
0 4
0
4
N92
If I am rebuilding existing data model in ES then it may be possible to loose any kind of data from indexers?
by N92 Path Finder in Splunk Enterprise Security 03-11-2018
0 8
0
8
CSmoke
I no longer see Extreme Search on Splunkbase. Is it part of Splunk or Enterprise Security? (We are a few version be...
by CSmoke Path Finder in Splunk Enterprise Security 03-10-2018
1 5
1
5
jc_najera
Hi Community, Not sure how to explain this... But the whole timeline looks like this: A user plugs in a USB stick o...
by jc_najera New Member in Splunk Enterprise Security 03-08-2018
0 1
0
1
pksecurityiris
Dear Team, In splunk ES if the incident is assigned to someone an email notification needs to be sent that the incide...
by pksecurityiris Engager in Splunk Enterprise Security 03-08-2018
2 0
2
0
lakshman239
Greetings I am using the latest version of add-on builder (2.2.0) and can create an alert action/adaptive response a...
by lakshman239 Influencer in Splunk Enterprise Security 03-08-2018
0 2
0
2
laleger
I would like to create a dashboard that displays notable event titles as seen on the Incident Review dashboard. Is th...
by laleger Explorer in Splunk Enterprise Security 03-07-2018
1 4
1
4
Kinngk789
Are the Workflow Actions listed in the Enterprise Security Sandbox installed by default with a new Enterprise Securit...
by Kinngk789 New Member in Splunk Enterprise Security 03-07-2018
0 0
0
0
zestep
<title>Registered Devices (Map)</title> <search> <query>| devicesearch query="$sensor_sea...
by zestep New Member in Splunk Enterprise Security 03-07-2018
0 0
0
0
kamal_jagga
We have not been using the Splunk ES for long and the “xswhere” used for this notable is an extreme search. The extre...
by kamal_jagga Contributor in Splunk Enterprise Security 03-05-2018
0 2
0
2
hcannon
Splunk Enterprise Security uses "event types" as a means to suppress future alerting on a set of field values. We lik...
by hcannon Path Finder in Splunk Enterprise Security 03-05-2018
0 0
0
0
aaronandshag
In our Splunk Enterprise Incident review queue, I have a custom lookup that is being used for our threat intelligence...
by aaronandshag Explorer in Splunk Enterprise Security 03-03-2018
0 2
0
2
evelenke
Hi Splunkers, As it's stated in documentation, fields like ip, mac, dns in Asset lookup should be "A pipe-delimited ...
by evelenke Contributor in Splunk Enterprise Security 03-03-2018
0 1
0
1
j4adam
Hi all, I have created an adaptive response collects information from a host and indexes it. I have attached this a...
by j4adam Communicator in Splunk Enterprise Security 03-03-2018
0 1
0
1
joonoyang
Hi, I'm working on adding new data in CIM and putting tags in Communication and network with required fields. Of cou...
by joonoyang Engager in Splunk Enterprise Security 03-03-2018
0 1
0
1
tauricecobbins
The webhook opiont is only available under Search & Reporting alert actions. This option in not available in the adap...
by tauricecobbins Engager in Splunk Enterprise Security 03-03-2018
2 1
2
1
mgkaddoura
Hello Is it possible to assign the default owner of the notable event based on a time schedule? For example, if the...
by mgkaddoura Engager in Splunk Enterprise Security 03-03-2018
1 1
1
1
pfabrizi
We are using ES and I was wondering if all the data models\lookups and enriched data available when searching from a ...
by pfabrizi Path Finder in Splunk Enterprise Security 03-02-2018
0 1
0
1
gf13579
The correlation search 'Completely Inactive Accounts' makes use of the Access Tracker lookup, which records the most ...
by gf13579 Communicator in Splunk Enterprise Security 03-01-2018
0 0
0
0
wishfor
I added a new Threat Intelligence Download and in the Audit dashboard I can constantly see that the feed on "csv down...
by wishfor Engager in Splunk Enterprise Security 02-28-2018
1 0
1
0
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...
Top Solution Authors