Splunk® Enterprise Security

Splunk Enterprise Security Tutorials

Splunk Enterprise Security version 4.6.x is available only to Splunk Cloud subscribers.
This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.

Additional resources for creating a correlation search

Additional resources to assist you with creating your own correlation searches can be found in the following places.

For information on choosing a data model as a data source, see What data models are included in the Splunk Add-on for Common Information Model.

For information about choosing a lookup table as a data source, see Introduction to lookup configuration in the Knowledge Manager Manual and Configure lists and lookups in the Splunk Enterprise Security User Manual.

For information about aggregate functions, see the Splunk platform documentation.

For information on search scheduling, see the Splunk platform documentation.

For examples of time modifiers, see the Splunk platform documentation.

Last modified on 31 March, 2017
Part 5: Choose available adaptive response actions for the correlation search  

This documentation applies to the following versions of Splunk® Enterprise Security: 4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.6.0 Cloud only


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters