Splunk Enterprise Security

Which fields are used for the identity comparison in Splunk ES?

jacqu3sy
Path Finder

Hi,

Within Splunk Enterprise Security, when the urgency of a notable event is calculated, the priority of the identity is used alongside the Severity of the savedsearch. This I follow and understand.

However, which fields are used for the identity comparison? The identity lookup contains headers identity, nick, first, last, email among others.

Which of these fields is used to compare with the Splunk event? And then, which field pulled back via the savedsearch in Splunk is used for the comparison? user, account, login etc

Splunk docs do not appear to provide the answer via either;

https://docs.splunk.com/Documentation/ES/5.2.2/User/Howurgencyisassigned#Modify_the_urgency_lookup_d...

OR

https://docs.splunk.com/Documentation/ES/5.2.2/Admin/Addassetandidentitydata

Thanks.

0 Karma
1 Solution

harsmarvania57
Ultra Champion

Hi,

While looking at SA-IdentityManagement add-on which ships with Enterprise Security, I can see that src_user and user fields from events are mapping with Identity Lookup automatically and it will provide fields like src_user_first, user_first etc.

EDIT: From identity_lookup_expanded Lookup definition, splunk is mapping key field from lookup with src_user and user fields from actual events

View solution in original post

0 Karma

lakshman239
Influencer

The 2 key fields which help determine the severity/priority and correlate to events is the 'user_priority' and 'user_category'

You can run |makeresults | eval user="jacqu3sy" |get_identity4events(user) to link back to Identity data in your deployment and it will show all user_* fields.

squidbarn
Engager

Be sure to surround the macro in back-ticks: 

| makeresults | eval user="jacqu3sy" | `get_identity4events(user)`

0 Karma

jacqu3sy
Path Finder

That's a really useful query, many thanks.

0 Karma

harsmarvania57
Ultra Champion

Hi,

While looking at SA-IdentityManagement add-on which ships with Enterprise Security, I can see that src_user and user fields from events are mapping with Identity Lookup automatically and it will provide fields like src_user_first, user_first etc.

EDIT: From identity_lookup_expanded Lookup definition, splunk is mapping key field from lookup with src_user and user fields from actual events

0 Karma

jacqu3sy
Path Finder

Hi, thanks for that. But where are you seeing this and how can I view it?

And if src_user and user are the fields in question, which field in identity lookup are they mapping to; identitiy, nick, first, last etc?

0 Karma

harsmarvania57
Ultra Champion

Go to Settings -> Lookups -> Automatic Lookups and Select apps as SA-IDentityManagement and you will able to see default : LOOKUP-zy-identity_lookup_expanded-src_user and default : LOOKUP-zy-identity_lookup_expanded-user automatic lookup which is mapping key field from identity_lookup_expanded lookup definition with src_user and user fields from actual events

0 Karma

jacqu3sy
Path Finder

Really helpful. Thanks.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...