Refer to your action history in
While you investigate an attack or other security incident, actions that you take in are recorded in your action history. You can only view your own entries in your action history. After you add an item to an investigation, all collaborators on the investigation can view that entry.
Your action history tracks the following types of actions using saved searches:
- Dashboards you visit
- Searches you run
- Per-panel filtering actions you take
- Changes you make to a notable event
- Changes you make to the suppression filters of a notable event
tracks these actions to help you add context to an investigation, audit an investigation, and provide a complete history of actions taken during an investigation that resulted in relevant findings. For example, if you run a search that gives helpful information for an investigation, you can add that search to the investigation. You can then find that search string in the investigation, run the search again, or revisit a search to save it as a report when the investigation is over. See Add an entry from your action history to an investigation for more about using your action history when investigating in .
Action history items do not immediately appear in the action history list. Five saved searches create action history items. After these saved searches run, you can view the action history items and add them an investigation.
Share or print an investigation in | Asset and Identity Correlation |
This documentation applies to the following versions of Splunk® App for PCI Compliance: 3.1.3, 3.4.0, 3.4.1, 3.4.2
Feedback submitted, thanks!