Access the intermediate findings timeline to review findings in Splunk Enterprise Security
Access the Intermediate findings timeline visualization to investigate the intermediate findings that created a finding based on risk.
Use one of the following methods to access the Intermediate findings timeline visualization from the Analyst Queue on the Mission Control page in Splunk Enterprise Security:
- Expand the finding and select the down arrow next to the Entity value.
- Go to a specific finding and select the number in the Intermediate findings column, which is an active link.
- Select the investigation ID in the Analyst Queue.
The Intermediate findings timeline is consistent irrespective of how you access the visualization.
Identify the intermediate findings associated with a finding
Follow these steps to identify the intermediate findings associated with a finding so that you can isolate the threat to your security environment:
- In the Splunk Enterprise Security app, go to the Analyst queue on the Mission Control page.
- In the Type column filter drop-down list, select Findings and select Apply to display the findings that have associated intermediate findings.
- Select the individual findings to review the following fields:
Field Description Intermediate findings Events that created the finding Risk score Sum of all the scores associated with each of the contributing intermediate finding
For example, if there are 5 intermediate findings and each intermediate finding has a risk score of 10, 20, 30, 40, and 50, then the aggregated risk score is 150. - Select the value of the Intermediate findings field in the row of the finding on the Mission Control page to open the Timeline visualization and further investigate the intermediate findings associated with the finding.
- Select the value in the Intermediate findings field for the finding that you want to investigate.
Investigating a finding opens a window that contains two panels. The top panel displays a visualization of all the intermediate findings that created the finding. The bottom panel includes a table with detailed information on the intermediate findings. - Sort the intermediate findings in the table based on any of the following fields:
- Time
- Description
- Detection
- Risk score
- Expand the finding in the Intermediate findings details table to further analyze the entities in your security environment.
This includes information on the following fields:- Entity
- Detection
- Risk score
- Description
- Detection description
- Annotations
- Threat object
- Threat object type
- Select View contributing intermediate findings for information on the intermediate findings that triggered the event.
You can also search for specific intermediate findings that created the findings through the filter. - Correlate the intermediate findings with dates and the severity of the risk scores in the Intermediate findings timeline visualization to identify threats.
You can zoom in and out to narrow down the time of occurrence since the visualization plots the intermediate findings using time on the x-axis and the risk score on the y-axis. - Select the color-coded icons in the Intermediate findings timeline visualization to view more information on the intermediate finding within a tooltip.
The following list indicates additional details about the intermediate finding:
- Risk score
- Detection
- Description
- Time
- MITRE tactic
- MITRE technique
- Select a finding on the timeline to highlight the associated row in the Intermediate findings details table.
- Identify the entity type using the icons displayed in the header of the Intermediate findings Timeline visualization.
The following is a list of the available icons:- User
- System
- Network artifacts
See also
For more information on reviewing findings, see the product documentation:
Reviewing findings using the intermediate findings timeline in Splunk Enterprise Security | Review findings using the threat topology visualization in Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 8.1.0
Feedback submitted, thanks!