Splunk® App for PCI Compliance

User Manual

Download manual as PDF

Download topic as PDF

Make changes to an investigation in Splunk App for PCI Compliance

Make changes to the entries on an investigation from the timeline list or slide view.

Change the title and description of an investigation

Change the title and description of an investigation from the investigation bar. For example, change the name of the investigation as your investigation progresses to more accurately describe the security incident you are investigating.

  1. From the investigation bar, click the edit investigation icon. From the investigation view, click Edit.
  2. Change the title or description.
  3. Click Save.

Update the status of an investigation

Update the status of an investigation from the workbench, summary, or timeline view.

  1. While viewing the investigation, click Edit > Edit title, description, and status.
  2. Select a new status.
  3. Click Save.

You can also update the status of an investigation from the investigation bar.

  1. Click the all investigations icon and select your investigation.
  2. After loading your investigation into the investigation bar, click the edit investigation icon and select a status.
  3. Click Save.

Similar to notable events, administrators can customize the statuses available to select, and restrict the status workflow. Because of this, you might not be able to transition from some statuses to other statuses. See Manage and customize investigation statuses in this manual.

Delete investigation entries

You can delete investigation entries when viewing the investigation timeline list or slide views.

  1. Find the entry on the investigation.
  2. Click Action > Delete Entry.
  3. Click Delete to confirm deleting the entry.

To delete multiple entries:

  1. Click List to view the investigation as a list of entries.
  2. Select the check box next to the investigation entries that you want to delete.
  3. Click Action and select Delete.
  4. Click Delete to confirm deleting the entry.

Change a note

  1. Find the note in the investigation and open the note for editing.
    1. From the timeline view of the investigation click Action > Edit Note
    2. From the list view of the investigation click Edit in the Actions column.
  2. Make changes. For example, add a new attachment and add a sentence to the description describing the new attachment.
  3. Remove a file attachment by clicking the X next to the file name.
  4. Click Save.

Change the title of an entry

You can change the title of an entry to make it more clear.

  1. Locate the notable event, Splunk event, action history item, or other entry on the investigation.
  2. From the Actions menu, click Edit.
  3. Change the title.
PREVIOUS
Add details to an investigation in Splunk App for PCI Compliance
  NEXT
Collaborate on an investigation in Splunk App for PCI Compliance

This documentation applies to the following versions of Splunk® App for PCI Compliance: 3.5.0, 3.6.0, 3.6.1, 3.7.0, 3.7.1, 3.7.2, 3.8.0


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters