Refer to your action history in Splunk App for PCI Compliance
While you investigate an attack or other security incident, actions that you take in Splunk App for PCI Compliance are recorded in your action history. You can only view your own entries in your action history. After you add an item to an investigation, all collaborators on the investigation can view that entry.
Your action history tracks the following types of actions using searches:
- Dashboards you visit
- Searches you run
- Per-panel filtering actions you take
- Changes you make to a notable event
- Changes you make to the suppression filters of a notable event
When you select a type of action history to add an investigation, the corresponding search runs to retrieve results. Splunk App for PCI Compliance tracks these actions to help you add context to an investigation, audit an investigation, and give a complete history of actions taken during an investigation that resulted in relevant findings.
For example, if you run a search that gives helpful information for an investigation, you can add that search to the investigation. You can then find that search string in the investigation, run the search again, or revisit a search to save it as a report when the investigation is over. See Add an entry from your action history to an investigation for more about using your action history when investigating in Splunk App for PCI Compliance.
Share or print an investigation in Splunk App for PCI Compliance
Review the summary of an investigation in Splunk App for PCI Compliance
This documentation applies to the following versions of Splunk® App for PCI Compliance: 3.5.0, 3.6.0, 3.6.1, 3.7.0, 3.7.1, 3.7.2, 3.8.0, 3.8.1