Is there a way to run a search for all correlationsearches and see their response actions? I want to see what correlationsearchescreate notable events and which ones do not. For e...
I'm really overthinking this, but am lost.
I need to show when newcorrelationsearches are introduced into the environment. I have a lookup with the current correlationsearches, along w/ r...
...omething5
That would mean that whenever a new source type is onboarded I would have to manually add it to all the correlationsearches that I created or that are by default in Splunk Enterprise Security c...
Hi I have to createcorrelationsearches in Splunk ES My cron schedule will be */60**** Is it better to use a real-time schedule or a continuous schedule? Is it necessary to fill the time r...
Hello All,
I am very new to Splunk.
Can someone help me with this use case please:
I have to create a search which should take an IP coming from a data source A and take that IP go to a file g...
Hi, I have a correlationsearchcreated in Enterprise security. Scheduled as below. Mode: guided Time range> Earliest: -24h, Latest: Now, Cron: 0 03 * * *, scheduling: realtime, schedule w...
Hello,
I have to create a newcorrelationsearch looking for failed authentication to VPN. The rule should trigger if there are more than 5 login failures for a source IP and if there are 20 d...
...ours I get results, however no notable events are created. Does the correlationsearch syntax need to be in a certain format to generate the notable event?