Add a response plan to an investigation in Splunk Enterprise Security
Add a response plan to an investigation in Splunk Enterprise Security so that analysts can follow response guidelines for that particular investigation.
Add one or more response plans to an investigation
Using a response plan helps you remember and track all the tasks relevant to an investigation. You can add one or more response plans to an investigation after you start the investigation. After you add a response plan to a particular investigation, any changes you make to the response plan are not applied to the original response plan and apply only to that particular investigation.
Prerequisites
Before you can add a response plan to an investigation, complete the following:
- Create your own response plan or add a response plan included with Splunk Enterprise Security.
- Publish the response plan you want to add to the investigation. You can only add published response plans to investigations.
Steps
Follow these steps to add a response plan to an investigation:
- Select an investigation from the analyst queue on the Mission Control page.
- Select View details.
- Select the Response tab.
- Select + Response to add a response plan to the investigation.
- Select a response plan from the drop-down list.
- Select Submit to apply the response plan to the investigation.
- (Optional) Repeat these steps to add another response plan to the investigation.
Manage response plans for an investigation
You can add response plans to an investigation, reorder them, and delete the ones you no longer want.
Follow these steps to manage response plans for an investigation:
- Select an investigation from the analyst queue on the Mission Control page.
- Select View details.
- Select the Response tab.
- Open the drop-down list next to the name of the response plan.
- Select Manage plans.
- To add a response plan to the investigation, select + Response.
- To reorder a response plan in the list, select and drag the move icon ( ). You can drop the response plan anywhere in the list.
- If there are multiple response plans, you can delete some. To delete a response plan, select the trash icon ( ).
- Select Done.
Add tokens in response plans
Use tokens inside response plans and use the value of the token to substitute the response plan in an investigation. A token is a variable that you can use in response plans to standardize your response to investigations.
You can add a token to the following fields in a response plan:
- Response plan name
- Response plan description
- Phase name
- Phase description
- Task name
- Task description
- Searches
Splunk Enterprise Security supports predefined tokens such as status
, urgency
, sensitivity
, investigation_id
, and others. For example, if you want the status of an investigation, such as New
or Pending
, to appear in a search embedded in a response plan task, you can add the $status$
token to a new search in the response plan task.
Follow these steps to add a token to a response plan:
- In Splunk Enterprise Security, select Security content, then select Response plans.
- Open an existing response plan, or create a new one.
- Select the field in the response plan that you want to add a token to. For example, if you want to add a token to a phase name, expand the phase that you want to edit, and then select the phase name field.
- In the field that you're editing, enter the name of the token you want to use with the
$token_name$
syntax. For example, if you want to use thestatus
token, enter$status$
. - Select Save changes.
See also
For more information on response plans, see the product documentation:
Create response plans in Splunk Enterprise Security | Associate an investigation type with a response plan in Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 8.0.0
Feedback submitted, thanks!