Turn on notables for correlation searches
When you upgrade to Enterprise Security 6.4.x or higher, notable actions for some correlation searches may be turned off. If you want these correlation searches to generate notables, you must turn on the notable actions for the correlation searches.
Use the following list to identify the correlation searches that may be turned off:
- Access - Account Deleted - Rule
- Access - Brute Force Access Behavior Detected - Rule
- Access - Cleartext Password At Rest - Rule
- Access - Default Account Usage - Rule
- Access - Default Accounts At Rest - Rule
- Audit - Anomalous Audit Trail Activity Detected - Rule
- Endpoint - Should Timesync Host Not Syncing - Rule
- Endpoint - High Number of Hosts Not Updating Malware Signatures - Rule
- Network - Substantial Increase in an Event - Rule
- Network - Substantial Increase in Port Activity (By Destination) - Rule
- Asset - Asset Ownership Unspecified - Rule
- Identity - Activity from Expired User Identity – Rule
Steps
- From the Enterprise Security menu, select Configure > Content > Content Management. This displays the list of knowledge objects and correlation searches.
- Click on the correlation search for which you want to turn on the notables.
This opens the correlation search editor. - Scroll down to Adaptive Response Actions and click on Add New Response Action.
- From the list of adaptive response actions, select Notable.
- Scroll to Recommended Actions and select the notable actions that you want to turn on for the correlation search from the list.
- Click Save.
In releases 6.4.0 and higher, the audit search [Audit - Notable Default Modify for Correlation Searches]
generates a health check warning if default correlation searches that have been changed to generate risk notables are run as searches that generate notables. To prevent the searches from running in an infinite loop and remove the health check warning, turn off the [Audit - Notable Default Modify for Correlation Searches]
search on Splunk Enterprise Security UI.
Upgrade correlation searches in Splunk Enterprise Security | Use default risk incident rules in Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 7.0.1, 7.0.2, 7.1.0, 7.1.1, 7.1.2, 7.2.0, 7.3.0, 7.3.1, 7.3.2
Feedback submitted, thanks!