Splunk ES - Lets Correlate

image

Splunk ES – Creating Custom Correlation Searches

 

In today's blog I will be discussing one of the very valuable features of the Splunk App for Enterprise Security. Correlation searches provide a very highly customizable level of security based detection and alerting within Splunk and ES.

 

What is a Correlation Search?

A correlations search is a type of saved search used to detect suspicious events or patterns in your data. If a suspicious event is detected, a notable event is created. The notable event can then be investigated using the Incident Review dashboard in ES.

 

Why Create a Custom Correlation Search in ES?

Custom correlation searches allow you to generate notable events and monitor specific patterns in order to provide you an alert when those patterns are found. They search for cross data-type correlations that give you an understanding of evolving threat scenarios in real time. Ultimately, creating a custom correlation search will allow you to seek out specific security threats specific to your environment.

 

To Create a Custom Correlation Search:

1.     Navigate to Configure > General > Custom Searches

2.     Select New

3.     Select Correlation Search

Search Name                      Create correlation search title/descriptor

Application Context            Select app that will contain the correlation search

Description                         Provide a brief description of the correlation search

Search                                Provide the correlation search sting

Time Range

Start time                           Set earliest time for search

End time                            Set latest time for search

Start time and End time should be expressed in relative time. Refer to the link in the footnote for relative time examples[1].

Cron Schedule*                  Set cron schedule

Throttling

Window Duration               Set a relative time range defined in seconds at which, during this time range, any additional event that matches any of the Fields to group by will not create a new alert.

Fields to group by              Enter a search field used to match similar events, at which, during the Window duration, any additional matches for the correlation search will be compared to the field defined in Fields to group by.

Notable Event

Create notable event (check box)

Title                                   Create the notable event title. This title will appear on the Incident Review dashboard.

Description                        Provide a description of the notable event.

Security Domain                 Set the security domain field of the notable event

Severity                              Set the severity of the notable event

Default Owner                    Set the default owner of the notable event

Default Status                    Set the default owner of the notable event

Drill-down name               Create the name for Contributing Events (link in a notable event)

Drill-down search              Provide the search for Contributing Events (Drill-down)

Risk Scoring

Create risk modifier (check box)                    

Score                                 Set the default score assignment for the notable event

Risk object field                 Set the search field the risk Score is applied to

Risk object type                 Set the type of object the risk Score is applied to

Actions

Include in RSS fees (check box)                       

Send email (check box)

              Email subject                     Provide email subject line. Defaults to “Splunk Alert: $name$”, where $name$ is the correlation search Search Name

              Email address(es)               Provide email address(es) that should receive the alert

Include results in email (check box)

As CSV (from dropdown)

As PDF (from dropdown)

Incline (from dropdown)

Run a script (check box)  

File name of the shell script to run

 

Incident Review and Notable Events

Once you have finished testing your correlation searches and have saved it in production they will start populating notable events in the Incident Review dashboard. Analysts will then be able to use the dashboard to gain insight into the severity of events occurring within your system or network. They will use the dashboard views to triage new notable events, examine event details, and assign events to analysts for review and resolution. 

More information on the incident review dashboard can be found here:  http://docs.splunk.com/Documentation/ES/latest/User/IncidentReviewdashboard

 

As always, thanks for reading and please feel free to contact us with any of your Splunk questions. 

 

 

Subscribe to Our Newsletter

Stay In Touch