-
Notifications
You must be signed in to change notification settings - Fork 377
/
Copy pathget_notable_info.json
49 lines (49 loc) · 1.43 KB
/
get_notable_info.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
{
"creation_date": "2017-03-15",
"data_metadata": {
"data_source": [
"Notable Events"
],
"providing_technologies": [
"Splunk Enterprise Security"
]
},
"description": "This search queries the notable index to retrieve detailed information captured within the notable. Every notable has a unique ID associated with it, which is used to point us directly to the notable event under investigation.",
"entities": [
"event_id"
],
"how_to_implement": "If you are using Enterprise Security you are likely already creating notable events with your correlation rules. No additional configuration is necessary.",
"id": "f3fb4d1b-5f33-4b01-b541-c7af9534c242",
"investigate": {
"splunk": {
"fields_required": [
"event_id"
],
"schedule": {
"cron_schedule": "",
"earliest_time": "3600",
"latest_time": "3600"
},
"search": "| search `notable_by_id({event_id})` | table time, rule_name, dest, dest_asset_id, dest_owner, priority, severity, owner, status_description"
}
},
"maintainers": [
{
"company": "Splunk",
"email": "bpatel@splunk.com",
"name": "Bhavin Patel"
}
],
"modification_date": "2017-09-20",
"name": "Get Notable Info",
"original_authors": [
{
"company": "Splunk",
"email": "bpatel@splunk.com",
"name": "Bhavin Patel"
}
],
"spec_version": 2,
"type": "splunk",
"version": "1.0"
}