Start an investigation in
You can start an investigation in several ways in .
- Start an investigation from Incident Review while triaging notable events. See Add a notable event to an investigation.
- Start an investigation with an event workflow action. See Add a Splunk event to an investigation.
- Start an investigation from the Investigations dashboard.
- Start an investigation when viewing a dashboard using the investigation bar.
After you start an investigation, you can investigate assets and identities using the investigation workbench, and start adding details to the investigation.
By default, users with the pci_admin and pci_analyst roles can start an investigation.
Start an investigation from the Investigations dashboard
Start an investigation from the Investigations dashboard.
- Click Create New Investigation.
- Type a title.
- (Optional) Select a status.
- (Optional) Type a description.
- Click Save.
Start an investigation from the investigation bar
When viewing dashboards in , you can see an investigation bar at the bottom of the page. You can use the investigation bar to track your investigation progress from any page in .
- Click the icon to create an investigation.
- Type a title.
- (Optional) Select a status.
- (Optional) Type a description.
- Click Save.
The investigation is loaded in the investigation bar.
Investigations in | Investigate a potential security incident on the investigation workbench in the |
This documentation applies to the following versions of Splunk® App for PCI Compliance: 5.0.1, 5.0.2, 5.1.0, 5.1.1, 5.1.2, 5.2.0, 5.3.0, 5.3.1, 5.3.2
Feedback submitted, thanks!