Splunk® Enterprise Security

Use Splunk Enterprise Security

The documentation for Splunk Enterprise Security versions 8.0 and higher have been rearchitected from previous versions, causing some links to have redirect errors. To resolve redirect errors, you must use the version selector on the ES documentation homepage to navigate between the versions.

You can see threat intelligence data only if your admin has set up Threat Intelligence Management (Cloud) for your organization. For information on configuring Threat Intelligence Management (Cloud), see Overview of threat intelligence in Splunk Enterprise Security.

Review threat intelligence attributes for a finding in Splunk Enterprise Security

If you have access to Threat Intelligence Management (Cloud), you can review threat intelligence attributes associated with a finding in the side panel of the analyst queue. Use threat intelligence attributes to help you determine whether you need to start an investigation based on this finding.

You can find threat intelligence attributes for a finding as you're triaging in the analyst queue. On the Mission Control page of Splunk Enterprise Security, select a finding, and then find the Threat intelligence section in the side panel.

Threat intelligence attributes include threat actors, MITRE tactics, CVEs, and malware associated with one or more observables present in the finding. These attributes are reported by intelligence sources contributing to active threat lists in the Threat Intelligence Management (Cloud) system.

To see a list of finding or investigation fields that can contain observables, see Fields containing observables in Splunk Enterprise Security.

If a finding has multiple observables, and those observables share an attribute value, then that attribute value is listed only once.

See also

For more details on threat intelligence in Splunk Enterprise Security, see the product documentation:

Last modified on 28 May, 2025
Triage findings and finding groups in Splunk Enterprise Security   Start investigations in Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 8.1.0


Please expect delayed responses to documentation feedback while the team migrates content to a new system. We value your input and thank you for your patience as we work to provide you with an improved content experience!

Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters