Splunk® Enterprise Security

Administer Splunk Enterprise Security

Verify that your asset and identity data was added to Splunk Enterprise Security

Verify that your asset or identity data was added to Splunk Enterprise Security by searching and viewing dashboards.

Prerequisites

  1. Extract asset and identity data in Splunk Enterprise Security.
  2. Format an asset or identity list as a lookup.
  3. Configure a new asset or identity list.

Steps

Verify asset lookup data.

  1. Verify that a specific asset record exists in the asset lookup.
    1. Choose an asset record with data in the ip, mac, nt_host, or dns fields from an asset list.
    2. Search for it in Splunk Web.

      | makeresults | eval src="1.2.3.4" | `get_asset(src)`

  2. View all available assets in your instance using one of the following methods. Compare the number of rows with your asset data sources to verify the number of asset records matches your expectations, or spot check specific records.
    • View the Asset Center dashboard. See Asset Center dashboard in Use Splunk Enterprise Security..
    • Use the assets macro.

      | `assets`

    • Search the data model.

      |`datamodel("Identity_Management", "All_Assets")` |`drop_dm_object_name("All_Assets")`

Verify identity lookup data.

  1. Verify that a specific identity record exists in the identity lookup.
    1. Choose an identity record with data in the identity field.
    2. Search for it in Splunk Web.

      | makeresults | eval user="VanHelsing" | `get_identity4events(user)`

  2. View all available identities in your instance using one of the following methods. Compare the number of rows with your identity data sources to verify the number of identity records matches your expectations, or spot check specific records.
    • View the Identity Center dashboard. See Identity Center dashboard in Use Splunk Enterprise Security.
    • Use the identities macro.

      | `identities`

    • Search the data model.

      |`datamodel("Identity_Management", "All_Identities")` |`drop_dm_object_name("All_Identities")`

Last modified on 27 August, 2024
Revise asset and identity lookup memory usage behavior in   Configure asset and identity correlation in Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 8.0.0, 8.0.1


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters