Splunk Enterprise Security

How to make Splunk ES override urgency changes?

Dworsnop
Path Finder

Hi all,

I have a correlation search that passes alerts from another system into ES and I need to prevent the urgency of the alert from being changed by ES.

Essentially I (think I) need ES to ignore the priority of any asset or identity associated with the incident so that the urgency doesn't change.

Cany anyone offer any advice on how to do this?

Thanks very much  🙂

Edit: I should add, I didn't create the original correlation search and I don't have much experience in this area, hence the question. Thanks again!

Labels (2)
0 Karma
1 Solution

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

View solution in original post

0 Karma

starcher
Influencer

That is correct. 

starcher
Influencer

Dworsnop
Path Finder

Thanks for the signposting @starcher 

Presumably I'm on the right lines here... "Severity defined in the search syntax results in an event where severity takes precedence over the severity defined in the notable event adaptive response action."

Therefore all I need to do is add " | eval severity="high" " to the end of my correlation search?

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...