Splunk® Enterprise Security

Install and Upgrade Splunk Enterprise Security

This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.

New notable event

You can create a new notable event from an event you are viewing in any search dashboard in the Splunk App for Enterprise Security. A new notable event can be created from the Access Search, Malware Search, Traffic Search, Intrusion Search, Proxy Search, or Search dashboards.

Manual notable event creation

Create a new notable event from an existing event shown as part of a search result or by using New Notable Event in the Configure panel.

Note: Do not create a new notable event from an existing notable event. For instance, do not create a new notable event from an event shown on the Incident Review dashboard.

Create a notable event from existing event

To create a new notable event from an event in the Malware Search dashboard:

1. Finalize the search in the Malware Search dashboard.

2. Select "Create notable event" from the Options menu for the event. A notable event is created using parameters of the selected event.

ES new NE from incident.png

3. In the Create Notable Event form, add a title and description for the new notable event.

Es new NE form TM.png

Use the drop-down options in the form to set the values for the other fields. Select the appropriate Domain, Urgency, Owner, and Status for the notable event.

Options for the notable event fields:

Field Description
Title Name for notable event
Domain Access, Audit, Endpoint, Identity, Network, or Threat
Urgency Level of severity: Informational, Low, Medium, High, Critical
Owner unassigned, Administrator, esadmin, esanalyst
Status Unassigned, New, In Progress, Pending, Resolved, Closed
Description Purpose of the notable event

4. Click Save.

When you successfully create the notable event, an event is logged showing that a new event was created. View the new notable event in the Incident Review dashboard.

ES ne in incident review.png

Create new notable event from the Configure panel

A non-administrator role, such as an ES analyst, needs to have an administrator grant additional permissions to the role, in order to manually create and edit a new notable event.

To add the permissions to the ess_analyst role, an administrator would do the following:

1. In Splunk Web, choose Settings > Access Controls > Roles.

2. Click on the ess-analyst role (in the list of roles) to open the editor.

3. In the "Capabilities" section, add edit_tcp to the Selected capabilities.

ES edit NE capability.png

4. Click Save.

Once this is done, an ES analyst can create a new notable event from the Configure panel in the Splunk App for Enterprise Security. To do this:

1. In the Enterprise Security interface, go to Configure > Incident Handling > New Notable Event.

ES config incident handling ne.png

2. Click New Notable Event.

3. Use the Create Notable Event panel to add a title and description for the new notable event.

Es new NE form.png

4. Modify the default field values for the notable event with the drop-down field options. Select the appropriate Domain, Urgency, Owner, and Status.

5. Click Save.

Last modified on 28 December, 2013
Modify correlation searches   Notable event statuses

This documentation applies to the following versions of Splunk® Enterprise Security: 3.0, 3.0.1


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters