Splunk® App for PCI Compliance

User Manual

Download manual as PDF

Download topic as PDF

Investigations in Splunk App for PCI Compliance

Visualize and document the steps you take during an investigation by creating and adding details to an investigation in Splunk App for PCI Compliance.


You can start, manage, and add details to investigations on the Investigations page. View or filter the investigations assigned to you, or create one. You can view all investigations that you collaborate on using the Investigations page. As an analyst, you can only see investigations assigned to you if you also have been granted the capability to manage all investigations.

Manage your investigations

Manage ongoing investigations from the Investigations page. You can see the titles, descriptions, time created, last modified time, and collaborators on the investigations assigned to you. If you have the capability to manage all investigations, you can see all the same details for all investigations, not just the investigations that you collaborate on.

Find an investigation or refine the list of investigations by filtering. Type in the Filter box to search the title and description fields of investigations.

Example investigation workflow

  1. You are notified of a security incident that needs investigation through a notable event, an alert action, or by an email, ticket from the help desk, or a phone call.
  2. Create an investigation in Splunk App for PCI Compliance.
  3. If you must work with someone else on the investigation, add them as a collaborator.
  4. Investigate the incident. While you investigate, add helpful or insightful steps to the investigation.
    1. Run searches, adding useful searches to the investigation from your action history with the investigation bar or relevant events using event actions. This makes it easy to replicate your work for future, similar investigations, and to make a comprehensive record of your investigation process.
    2. Filter dashboards to focus on specific elements, like narrowing down a swim lane search to focus on a specific asset or identity on the asset or identity investigator dashboards. Add insightful filtering actions from your action history to the investigation using the investigation bar.
    3. Triage and investigate potentially related notable events. Add relevant notable events to the investigation.
    4. Add notes to record other investigation steps, such as notes from a phone call, email or chat conversations, links to press coverage or social media posts. Upload files like screenshots or forensic investigation files.
  5. Complete the investigation and add a note to record a summary of your findings.
PREVIOUS
Predictive Analytics dashboard
  NEXT
Start an investigation in Splunk App for PCI Compliance

This documentation applies to the following versions of Splunk® App for PCI Compliance: 3.5.0, 3.6.0, 3.6.1, 3.7.0, 3.7.1, 3.7.2, 3.8.0


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters