Splunk Enterprise Security

Splunk App for Enterprise Security: Empty csv lookup file (contains only a header) for table ppf_threat_activity

mcronkrite
Splunk Employee
Splunk Employee

empty csv lookup file contains only a header for table ppf_threat_activity

New install of ES 3.3, the populating search appears not to have run... How can I jump start this lookup?

DMohn
Motivator

This lookup gets populated, if you use the "Advanced Filter" on the Thread Activity Dashboard. Select one (or more) events in the Thread Activity Details Panel, and filter or highlight the events. This will add an entry in the ppf_thread_activity.csv lookup.

If you don't want to use this functionality, you could also highlight and unhighlight the event, which will still create an entry in the csv, and make the warning disappear - but no highlights will remain!

jeremycarterdhs
Explorer

Thank you for the answer. I love when it's a simple fix!

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...

Observability | Use Synthetic Monitoring for Website Metadata Verification

If you are on Splunk Observability Cloud, you may already have Synthetic Monitoringin your observability ...

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...