Splunk Enterprise

How to make data event correlation automatic?

Jeewan
Loves-to-Learn

Hello Guys, 

I have some doubt about data event correlation. i am getting events from different different security vendors like Area1 bitdefender, crowdstrike, cloudflare.  now i wants in my splunk the event correlation should happen automatically. suppose any incident happen in any endpoint it should correlate that event with other data sources as well. not sure how to achieve this 

or i am getting the events from different vendor so in some event the IP is listed as source IP in some event it listed computer IP to normalize it for all the data sources so it will be the same for all data sources. 

any lead will be appricatebale 

Thanks 

Jeewan 

Labels (3)
0 Karma

PaulPanther
Builder

@Jeewan Regarding the data normalization part of your question you should check out Splunk Common Information Model (CIM)  Overview of the Splunk Common Information Model - Splunk Documentation

With that you should solve the first part your question.

0 Karma
Get Updates on the Splunk Community!

Build Scalable Security While Moving to Cloud - Guide From Clayton Homes

 Clayton Homes faced the increased challenge of strengthening their security posture as they went through ...

Mission Control | Explore the latest release of Splunk Mission Control (2.3)

We’re happy to announce the release of Mission Control 2.3 which includes several new and exciting features ...

Cloud Platform | Migrating your Splunk Cloud deployment to Python 3.7

Python 2.7, the last release of Python 2, reached End of Life back on January 1, 2020. As part of our larger ...