Reduce alert volumes by triaging notables
Buttercup Games, a fictitious company, runs an e-commerce site to sell its products. Ram, a security analyst at Buttercup Games, triages incoming notables from correlation searches and opens investigations to assess risk to the organization. Ram receives over 10,000 notables every day, 50% of which are false positives.
Despite Ram's best attempts to triage all notables and delegate the investigations, manually selecting notables for triage forces Ram to abandon certain notables that Ram deems less risky. Sifting through the high volume of notables causes Ram to burn out quickly. The high volume of excessive notables also results in slow threat detection and response time, which exposes Ram's organization to security threats.
Kay, the manager of the security operations center (SOC) at Buttercup Games and Ram's manager, wants to streamline the manual and monotonous triage process. Kay knows that Ram can overlook the risks in the SOC and asks Ram to use dispositions and other features available in Splunk Enterprise Security to triage notables and classify them. This process helps Ram to separate the false positives and focus on the notables that pose the highest threat.
This scenario describes how Ram uses dispositions to separate notables that are false positives from notables that represent real threats while reducing alert fatigue and risk in the SOC of Buttercup Games by taking these steps.
Adjust risk scores for specific objects | Add dispositions to risk notables |
This documentation applies to the following versions of Splunk® Enterprise Security: 7.3.2
Feedback submitted, thanks!