Splunk® Enterprise Security

Administer Splunk Enterprise Security

Download manual as PDF

Download topic as PDF

Add asset and identity data to Splunk Enterprise Security

Splunk Enterprise Security uses an asset and identity system to correlate asset and identity information with events to enrich and provide context to your data. This system takes information from external data sources to populate lookups, which Enterprise Security correlates with events at search time.

You have choices for registering asset and identity data in ES:

  • Manually register asset and identity data in Asset and Identity Manger
  • Use LDAP to register data in Asset and Identity Manger

Manually register asset and identity data in Asset and Identity Manger

Do the following to manually add asset and identity data to ES to take advantage of asset and identity correlation:

  1. Collect and extract asset and identity data in Splunk Enterprise Security.
  2. Format the asset or identity list as a lookup in Splunk Enterprise Security.
  3. Configure a new asset or identity list in Splunk Enterprise Security.
  4. Manage assets and identities in Splunk Enterprise Security.
  5. Verify that your asset or identity data was added to Splunk Enterprise Security.

Use LDAP to register data in Asset and Identity Manger

Do the following to use LDAP to register asset and identity data in ES to take advantage of asset and identity correlation.

  1. Collect and extract asset and identity data in Splunk Enterprise Security.
  2. Create a lookup from your current LDAP data in Splunk Enterprise Security.
  3. Verify that your asset or identity data was added to Splunk Enterprise Security.

See also

Lookups that store merged asset and identity data

Asset and identity fields after processing in Splunk Enterprise Security

How Splunk Enterprise Security processes and merges asset and identity data

PREVIOUS
Configure adaptive response actions for a correlation search in Splunk Enterprise Security
  NEXT
Collect and extract asset and identity data in Splunk Enterprise Security

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters