Splunk Enterprise

How to make data event correlation automatic?

Jeewan
Loves-to-Learn

Hello Guys, 

I have some doubt about data event correlation. i am getting events from different different security vendors like Area1 bitdefender, crowdstrike, cloudflare.  now i wants in my splunk the event correlation should happen automatically. suppose any incident happen in any endpoint it should correlate that event with other data sources as well. not sure how to achieve this 

or i am getting the events from different vendor so in some event the IP is listed as source IP in some event it listed computer IP to normalize it for all the data sources so it will be the same for all data sources. 

any lead will be appricatebale 

Thanks 

Jeewan 

Labels (3)
0 Karma

PaulPanther
Builder

@Jeewan Regarding the data normalization part of your question you should check out Splunk Common Information Model (CIM)  Overview of the Splunk Common Information Model - Splunk Documentation

With that you should solve the first part your question.

0 Karma
Get Updates on the Splunk Community!

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...

Adoption of Infrastructure Monitoring at Splunk

  Splunk's Growth Engineering team showcases one of their first Splunk product adoption-Splunk Infrastructure ...