Start an investigation in Splunk App for PCI Compliance
You can start an investigation in several ways in Splunk App for PCI Compliance.
- Start an investigation from Incident Review while triaging notable events. See Add a notable event to an investigation.
- Start an investigation with an event workflow action. See Add a Splunk event to an investigation.
- Start an investigation from the Investigations dashboard.
- Start an investigation when viewing a dashboard using the investigation bar.
After you start an investigation, you can investigate assets and identities using the investigation workbench, and start adding details to the investigation.
By default, users with the pci_admin and pci_analyst roles can start an investigation.
Start an investigation from the Investigations dashboard
Start an investigation from the Investigations dashboard.
- Click Create New Investigation.
- Type a title.
- (Optional) Select a status.
- (Optional) Type a description.
- Click Save.
Start an investigation from the investigation bar
When viewing dashboards in Splunk App for PCI Compliance, you can see an investigation bar at the bottom of the page. You can use the investigation bar to track your investigation progress from any page in Splunk App for PCI Compliance.
- Type a title.
- (Optional) Select a status.
- (Optional) Type a description.
- Click Save.
The investigation is loaded in the investigation bar.
Investigations in Splunk App for PCI Compliance | Investigate a potential security incident on the investigation workbench in the Splunk App for PCI Compliance |
This documentation applies to the following versions of Splunk® App for PCI Compliance: 5.0.1, 5.0.2, 5.1.0, 5.1.1, 5.1.2, 5.2.0, 5.3.0, 5.3.1, 5.3.2, 5.3.3
Feedback submitted, thanks!