Splunk Search

identify and generate alerts for specific policies

AL3Z
Builder

Hi all,

When I run this query it is not giving any alerts from the policies marked in red color what changes do we need so that it can raise an alerts when any one violates these policies.

index=dlp sourcetype=netskope ((policy="[DLP] - All Apps - Internal" OR policy="[SMTP] - Gmail - Internal " OR policy="[DLP] - GDrive - Internal ") AND ((policy="All DLP Policies" ) OR (policy="[SMTP] - All Apps - Pwd Protected Files - Alert") OR (alert_type=uba alert_name=" Potential suspicious activity: uploads" )

Thanks


Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Please share sample events for each policy.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Bridging the Gap: Splunk Helps Students Move from Classroom to Career

The Splunk Community is a powerful network of users, educators, and organizations working together to tackle ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...