Splunk Enterprise

How to make data event correlation automatic?

Jeewan
Loves-to-Learn Lots

Hello Guys, 

I have some doubt about data event correlation. i am getting events from different different security vendors like Area1 bitdefender, crowdstrike, cloudflare.  now i wants in my splunk the event correlation should happen automatically. suppose any incident happen in any endpoint it should correlate that event with other data sources as well. not sure how to achieve this 

or i am getting the events from different vendor so in some event the IP is listed as source IP in some event it listed computer IP to normalize it for all the data sources so it will be the same for all data sources. 

any lead will be appricatebale 

Thanks 

Jeewan 

Labels (3)
0 Karma

PaulPanther
Builder

@Jeewan Regarding the data normalization part of your question you should check out Splunk Common Information Model (CIM)  Overview of the Splunk Common Information Model - Splunk Documentation

With that you should solve the first part your question.

0 Karma
Get Updates on the Splunk Community!

Take Your Breath Away with Splunk Risk-Based Alerting (RBA)

WATCH NOW!The Splunk Guide to Risk-Based Alerting is here to empower your SOC like never before. Join Haylee ...

SignalFlow: What? Why? How?

What is SignalFlow? Splunk Observability Cloud’s analytics engine, SignalFlow, opens up a world of in-depth ...

Federated Search for Amazon S3 | Key Use Cases to Streamline Compliance Workflows

Modern business operations are supported by data compliance. As regulations evolve, organizations must ...