Splunk® Phantom (Legacy)

Use Splunk Phantom

Mark files and events as evidence in Splunk Phantom

When you discover information that's critical to your conclusions, you can mark it as evidence in your investigation. Evidence can include files, artifacts, action results, events, and notes. Tagging evidence helps to separate general information from information that's directly related to diagnosing an incident. All evidence appears on the Evidence tab within an investigation.

Mark a file as evidence

Perform the following steps to mark a file as evidence:

  1. Navigate to a container in Splunk Phantom.
  2. Click Analyst to change the container to analyst view.
  3. Click the Files tab.
  4. Click the ... button for the file.
  5. Select Mark as Evidence.
  6. Click Confirm.

Mark an event as evidence

To mark an event as evidence, select Mark as Evidence when adding the event to a case. For more information about adding events to cases, see Add objects to a case in Splunk Phantom. The following screenshot illustrates how to mark an event as evidence.

This screen image shows a sample dialog window when marking an event as evidence. There is a Mark as Evidence checkbox that is highlighted in the image.

When you add an event to an existing case, it copies all the data from the existing event into the case you're adding it to while also maintaining the original event data. The information on the Evidence tab is a copy of the original event, not the actual event.

Last modified on 22 January, 2020
Approve actions before they run in Splunk Phantom   View recommendations for mission experts, playbooks, and actions

This documentation applies to the following versions of Splunk® Phantom (Legacy): 4.8, 4.9, 4.10, 4.10.1, 4.10.2, 4.10.3, 4.10.4, 4.10.6, 4.10.7


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters