Investigate risk notables that represent a threat
Ram investigates the risk notables that are tagged as True Positive - Suspicious Activity using the timeline visualization on the Incident Review page and identifies the source of the security threat.
- From the Splunk Enterprise Security menu bar, Ram clicks the Incident Review page.
- From the Type filter drop-down list, Ram selects Risk Notable to display the notables that have associated risk events.
- Ram focuses only on the risk notables that have the Disposition tagged as True Positive - Suspicious Activity.
- Ram reviews the following two fields for the risk notables: Risk Event and Aggregated Score. The Aggregated Score is the sum of all the scores associated with each of the contributing risk events.
- Ram clicks the value in the Risk Events field for the notable event that he wants to investigate. This opens a window that contains two panels. The top panel displays a timeline visualization of the contributing risk events that created the notable. The bottom panel includes a table with detailed information on the contributing risk events as shown in the following image:
- Ram expands the risk notable in the Contributing Risk Events table for more details to further analyze the risk objects in his security environment.
This includes information on the following fields: Risk Object Source Risk Score Risk Message Saved Search Description Threat Object Threat Object Type These details provide Ram with further context to analyze the risk object, such as power shell, registry entries, commands, risk messages, user login information, or any other suspicious activity as shown in the following image:
- Ram correlates the risk events with dates and the severity of the risk scores in the timeline visualization to identify threats.
- Ram also zooms in and out to narrow down the time of occurrence since the timeline visualization plots the contributing risk events using time on the x-axis and the risk score on the y-axis. The timeline visualization also uses color codes on the icons that indicate the severity of the risk scores. Color coding risk score icons are consistent across the Contributing Risk Events table and the timeline visualization of the risk events. Ram knows that a lower risk score corresponds to a lighter color icon.
- Ram now identifies the risk object type through the icons displayed in the header of the timeline visualization.
Icons include:
- User
- System
- Network Artifacts
- Other
Sort notables by disposition | Isolate User Behaviors That Pose Threats |
This documentation applies to the following versions of Splunk® Enterprise Security: 7.0.0
Feedback submitted, thanks!