Splunk Enterprise

How to Export Notable Events from Incident Review to CSV with Specific Fields?

KKuser
Path Finder

I'm looking to export notable events from the Incident Review dashboard in Splunk Enterprise Security to a CSV/Excel file. I need to include the following details:

  • Notable Name (Rule Name)
  • Notable Triggered Time
  • Time Assigned for Investigation
  • Conclusion (e.g., True Positive (TP), False Positive (FP), Benign True Positive (BTP))
  • Open/Closed Status

What would be the best SPL query or method to extract this information? Also, is there a way to automate this export on a scheduled basis?

 

Currently using the SPL query:

`notable`
| eval original_time=strftime(orig_time,"%c")
| eval reviewing_time=strftime(review_time,"%c")
| table search_name, comment, disposition_label, original_time, reviewing_time, owner, search_name, reviewer, status, status_description, status_label, urgency, username


and I'm getting results. However, I'm not getting an ID to locate and go through an individual notable if I wanted to. How can I search for a specific notable? Is there a tracking number for a notable? I'd like to include it in my table as well.

Labels (1)
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @KKuser 

You probably want to include the "source_event_id" field which is a unique field for each of your notable events.

Please let me know how you get on, and please consider adding karma or accepting this post if it has helped.

 

0 Karma
Get Updates on the Splunk Community!

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...