Start with Investigation in Splunk SOAR (Cloud) (2024)

Use the Investigation page as the starting point to understand, investigate, and act on events. An event is a single piece of data in Splunk software with a given timestamp, host, source, and source type. Events in are also called containers. The Investigation page provides you access to event activity history, contextual and interactive data views, secure file attachments, and automation and case management controls.

The activity feed displays current and historical action and playbook activity that has acted on the currently displayed event. It provides a summary of the success, ongoing execution, and results of all automation operations for the event. The activity feed also provides team collaboration capabilities that are integrated inline with automation details and other data, forming a record of all relevant event information.

Use to promote a verified event to a case using the integrated case management capability. Case management supports tasks that map to your defined Standard Operating Procedures (SOPs). Case management also has full access to the Automation Engine, allowing you to launch actions and playbooks as part of a task.

Open the Investigation page

To open the Investigation page, follow these steps:

  1. From the Home menu, select either Cases or Sources, then My Events.
  2. Select an event. If you do not yet have any events, select +Event to create an event.

Alternatively, select any event on the home page.

Set your view in Investigation

You can quickly view information and perform actions using the Summary and Analyst views in . Within an event or a case, switch between views by selecting the toggle switch for the Summary or Analyst view.

The following table describes uses for the two different views.

ViewUses
SummaryView the status of an event or case.
AnalystView the status of an event or case and also perform actions, such as running a playbook, adding and editing a workbook, or viewing and adding artifacts.

Run a playbook manually

administrators set most playbooks to run automatically when certain conditions are met, like when an event with a certain label is created. Occasionally, you might want to manually run a playbook against an event. You can do this in the Analyst view.To run a playbook event in the Analyst view of the Investigation page, follow these steps:

  1. From the main menu, select Sources, or any of its subsections.
  2. Select an event that you want to run the playbook against.
  3. On the Investigation page, select the Analyst view.
  4. Select the Run Playbook button . A list of available playbooks appears.
  5. Locate the playbook you want to run. Recommended playbooks appear at the top of the list. Optionally sort the columns or use the search field.
  6. By default, the playbook will run only on new artifacts collected since the last run of this playbook. To change the scope, select one of the following options:
    • New Artifacts: (Default) Includes only artifacts collected since the last run of this playbook.
    • All Artifacts: Includes all artifacts.
    • Artifact: Provide the ID of the specific artifact to include in this playbook run.
  7. Select Run Playbook.

View the Activity panel to see the progress of the playbook run. You can view information and perform actions within the Activity panel, including:

  • View the status of the playbook run. The action is currently in progress. Select the x icon to cancel the activity. The action completes successfully. action does not complete successfully.
  • from playbookdebug logpin to hudadd to case

    from outputfrom 3 dots. repeat actionPin to hudadd to case

    Mark as evidence

  • View the data created from a playbook run. Expand sections to see the results of each action, like geolocation data.

HUD cards

The collapsible heads up display (HUD) helps you track important metrics and information. administrators control HUD card settings. Users can customize the HUD for an event or case by adding or removing cards, or configuring manual cards of their own design.

The following HUD card types are available:

  • Preset Metrics
  • Custom Fields
  • Manual

Preset Metrics and Custom Fields cards are defined by a administrator and display one of the built-in metrics or the information from a custom field. You can add or remove these cards, but only an administrator can change the card options. Manual cards let you add a customized card to the HUD for an event or case. Data-type cards include data and are displayed in the HUD table data.

Add a card to the HUD

Perform the following steps to add a card to the HUD:

  1. From the Home menu, select either Cases or Sources, then My Events.
  2. Select an event or case.
  3. Expand the HUD menu by selecting the downward-facing double chevron icon .
  4. Select the gear icon to open the Configure HUD modal.
  5. Select + HUD Card.
  6. Choose a HUD card type.
  7. Configure the available card options. The following table describes the manual card options:
    SettingDescription
    TypeText creates an input field where you can add a small amount of text.

    Select creates a card with a dropdown list of options.

    MessageThe name of the HUD card.
    ColorThe display color of the HUD card.
  8. To display available data-type cards, switch on the HUD table data toggle.
  9. Select Save.
Start with Investigation in Splunk SOAR (Cloud) (2024)

FAQs

Start with Investigation in Splunk SOAR (Cloud)? ›

Use the Investigation page as the starting point to understand, investigate, and act on events. An event is a single piece of data in Splunk software with a given timestamp, host, source, and source type.

How does Splunk soar work? ›

Splunk SOAR consolidates events ingested from multiple sources into one location. This level of consolidation enables analysts to filter and sort all events to identify high-fidelity events and prioritize action quickly.

What is the old name of Splunk soar? ›

Splunk Phantom is a Security Orchestration, Automation, and Response (SOAR) system.

When a search is run in Splunk in what order are events returned? ›

When you run a search that returns events, by default the events are returned in descending timestamp order, with the most current events returned first.

What are the two main use cases for Splunk Dem? ›

  • IT Operations Monitoring. ...
  • Security Monitoring. ...
  • Application Development and Testing Analysis. ...
  • Service and KPI Monitoring. ...
  • Customer Experience Monitoring.
Mar 6, 2023

Is Splunk a SIEM or SOAR? ›

Splunk is a big data solution that provides security information and event management (SIEM) capabilities.

What is the difference between SIEM and SOAR? ›

While SIEM primarily focuses on collecting and analyzing security event data, SOAR extends these capabilities through automation, orchestration, and predefined incident response playbooks.

What is replacing Splunk? ›

Logtail is a ClickHouse-powered log management and analysis tool that offers sophisticated data collection, processing and reporting features. It is an excellent Splunk alternative that provides tools for collecting data across your entire stack and centralizing them in one place.

Is Splunk still relevant? ›

Until then, skills around on-prem Splunk still are in demand. Even Splunk Cloud customers have need to run on-prem instances so the need for people who know how to run them will be there for a long time.

How to configure Splunk SOAR? ›

Configure the service with Splunk App for SOAR
  1. Obtain a Splunk Cloud Platform or Splunk Enterprise license.
  2. Add required indexes to your Splunk server.
  3. Configure the app. Where to configure the app in a distributed deployment. Configure or upgrade the app using Splunk Web. Configure or upgrade the app from a downloaded file.
Mar 6, 2024

What are the 3 modes in Splunk search? ›

Search mode has three settings: Fast, Verbose, and Smart. Fast mode speeds up searches by limiting the types of data returned by the search.

What are the 4 types of searches in Splunk by performance? ›

How search types affect Splunk Enterprise performance
Search typeRef. indexer throughputPerformance impact
DenseUp to 50,000 matching events per second.CPU-bound
SparseUp to 5,000 matching events per second.CPU-bound
Super-sparseUp to 2 seconds per index bucket.I/O bound
RareFrom 10 to 50 index buckets per second.I/O bound

Why are searches skipped in Splunk? ›

The maximum number of concurrent historical scheduled searches on an instance or cluster has been reached. This is the most common reason for skipped searches. This happens because the searches have taken all available search slots so new searches cannot be scheduled.

Are SIEM and Splunk the same? ›

Splunk Enterprise Security:

it is a SIEM system that makes use of machine-generated data to get operational insights into threats, vulnerabilities, security technologies, and identity information.

How many types of Splunk are there? ›

Splunk Enterprise licenses are available in two types: Enterprise and Free.

Which Boolean used in Splunk? ›

There are three different types of Boolean operators available in Splunk. These are AND , OR , and NOT . Case sensitivity is important here, and these operators must be in uppercase to be recognized by Splunk. The AND operator is implied by default and is not needed, but does no harm if used.

What is SOAR and how IT works? ›

SOAR stands for security orchestration, automation, and response. SOAR seeks to alleviate the strain on IT teams by incorporating automated responses to a variety of events. A SOAR system can also be programmed to custom-fit an organization's needs.

How does Splunk search so fast? ›

The Splunk platform decreases search runtime by dividing up the processing across multiple servers. By doing this, each server performs less overall work, which decreases individual search runtime and increases the number of searches that can be executed in the same span of time.

How do Splunk alerts work? ›

An alert is a type of saved search. Alerts run in real time or on a scheduled interval and are triggered when they return results that meet user-defined conditions. When an alert is triggered, it can initialize one or more alert actions.

References

Top Articles
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 6308

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.