Splunk Tech Talks
Deep-dives for technical practitioners.

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, Investigation, and Response

DayaSCanales
Splunk Employee
Splunk Employee

Screenshot 2025-11-06 at 10.12.58 AM.png

Watch On Demand the Tech Talk, and empower your SOC to reach new heights!

Duration: 1 hour 

Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This release revolutionizes how SOC teams handle alert triage and investigations by introducing a streamlined workflow fully integrated with Splunk SOAR for effortless automation.

Enjoy a consistent user experience aligned with the Open Cybersecurity Schema Format, while maintaining backward compatibility with your existing Enterprise Security data.

Highlights to look forward to:

  • A revamped workflow that speeds up alert triage and investigations
  • Seamless native integration with Splunk SOAR for smarter automation
  • Industry-standard terminology for a more intuitive user experience
  • Support for most existing data to ensure smooth transition
  • New capabilities designed for security engineers and administrators to maximize innovation

Don’t miss this chance to future-proof your security operations and achieve faster, smarter threat detection and response.  Join Us On Demand!

DayaSCanales
Splunk Employee
Splunk Employee
LesediK
Splunk Employee
Splunk Employee

View all the top of mind questions from the live event!

Q. Are there controls in place that would allow an analyst to develop and create a new version of a detection but the ability to deploy is given to another user group (peer review)?

A. With Splunk Enterprise Security 8.x we offer detection versioning with a lot of git-like features, but I do not believe there is any kind of dedicated merge request sort of flow.

LesediK_7-1676518142760.png

 

Q. I've attended previous Tech Talks from Splunk about Risk-based Alerting. Does Finding-based detections tie into that?

A. Yep! It is basically the next evolution of Risk Based Alerting making it far more natively integrated with the product.

LesediK_7-1676518142760.png

Q. Does the investigations workbench handle multi-tenancy?

A. There are tools you can use to make separate queues and views for different teams but ES8's Analyst Queue does not yet include multi-tenancy as an out of the box feature.

LesediK_7-1676518142760.png

Q. Does the investigations workbench handle multi-tenancy?

A. There are tools you can use to make separate queues and views for different teams but ES8's Analyst Queue does not yet include multi-tenancy as an out of the box feature.

LesediK_7-1676518142760.png

Q. How would ingestion of third party alerts that are already correlated into incidents (e.g. Defender XDR), be ingested and turned into findings? And is there functionality that mirrors the existing correlation from the source?

A. There's a lot of flexibility that comes with Findings and Intermediate Findings. You can ingest things to 'alert' straight away or you can ingest things to not show up as an alert but build towards one. This means you can decide how to treat those alerts from a third party tool, and if the "pre-correlated" alerts include the context you could ingest that as well.

LesediK_7-1676518142760.png

Q. Can a finding group get more findings after the group is initially created?

A. Yes! So Finding Groups are made to be added to within their window. You can also always add more Findings to an Investigation once you make one.

LesediK_7-1676518142760.png

Q. Can additional findings be added to a detection based on a reference number (e.g. 3rd party incident id) automatically?

A. This is a very achievable thing leveraging Automation, e.g., the SOAR block for "add finding to investigation" or "add finding." There are some SPL-first mechanisms that may work.

Come find me on Community Slack : @Drew Church and we can try and figure out more together.

LesediK_7-1676518142760.png

Q. What is the recommended process to restoring the nav bar after an upgrade?

A. Post app install, you will need to go into the post-install upgrade routine. It will prompt you to reset to default. From there, you will need to use the Navigation Menu editor inside of Enterprise Security to add back in the customizations.

LesediK_7-1676518142760.png

Q. Any changes to Git Integration within Splunk Enterprise Security or Splunk SOAR on prem?

A. Enterprise Security 8 does not have a git integration. There are no changes to Splunk SOAR (on-prem) or Splunk SOAR (Cloud) in terms of the git integration.

LesediK_7-1676518142760.png

Contributors
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...