Tutorial: Use risk-based alerting in Splunk Enterprise Security to analyze risk (2024)

Use this high level tutorial to deploy risk-based alerting (RBA) in Splunk Enterprise Security and investigate threat in you security environment. Additional customizations might be required to maximize the impact of risk based alerting for more complex security environments. For more information on tuning and curating risk using RBA, see Curate risk using risk based alerting.

If you have a support contract, you can file a case to further customize risk based alerting using the Splunk Support Portal. See Support and Services.

Follow these steps to configure risk-based alerting:

  1. Update assets and identities
  2. Configure data models
  3. Run risk based correlation searches
  4. Use risk factors to dynamically adjust risk scores
  5. Review notables to identify risk
  6. Curate risk to reduce false positives
  7. Configure more risk rules to evaluate risk

Update assets and identities

Maintaining your asset and identity framework is key to deploying risk-based alerting in your organization. Assets and identities such as systems and users in your organization are considered risk objects. Follow these guidelines to optimally configure assets and identities for RBA in Splunk Enterprise Security:

  1. Review the completeness of your LDAP data and determine how critical the various assets and identities are for your organization's mission and processes so that you can prioritize the risk associated with the assets and identities accordingly.
    1. In Splunk Enterprise Security, navigate to Search > Search.
    2. Display all your asset and identity data.
      On the search bar, type the following to list identity data:

      | `identities`

      (For identities)
      On the search bar, type the following to list asset data:

      | `assets`

      (For assets: )
  2. Review the Risk Analysis framework in Splunk Enterprise Security and formulate a plan to raise risk scores of the assets and identities in your organization based on their context.
    An automatic lookup from within the SA-Identity Management app in Splunk Enterprise Security compares indexed events with asset and identity data in the asset and identity lists to provide data enrichment and context. The additional asset and identity context added to indexed events helps to identify the criticality of specific assets or identities within your SOC and assign risk scores to them accordingly.
    See also
    • Asset and identity correlation.
    • Update assets and identities
    • Configure asset and identity correlation
    • Collect and extract asset and identity data
  3. Use the Risk Factor Editor in Splunk Enterprise Security to increase or decrease the risk scores associated with your assets and identities. This helps to customize risk in your security environment based on evolving threat.

Use a vulnerability scanner that identifies and creates an inventory of all the systems connected to your network to ensure the completeness of your asset and identity data. Vulnerability scanning identifies both the operating systems and the software installed on it, along with other attributes such as open ports and user accounts and checks each item in the inventory against one or more databases of known vulnerabilities for potential security breach.

Configure data models

Tune data models to write correlation searches that generate risk notables in Splunk Enterprise Security.
Data models group normalized events that exist in different indexes and sourcetypes and help to review the performance, accuracy, and data diversity in your security organization.

Follow these steps to configure data models for risk based alerting:

  1. Audit your datamodel performance.
    In Splunk Enterprise Security, navigate to Audit > Datamodel Audit to check the data model accelerations and acceleration time frames.
    Alternatively, you can type the following in your browser to audit your data models:
    https://<SPLUNK instance>/en-US/app/SplunkEnterpriseSecuritySuite/datamodel_audit
  2. Check that the indexes feeding the common information data models (CIM) are accurate by verifying that they are tagged clearly and consistently.
    In Splunk Enterprise Security, navigate to Configure > CIM Setup to check the data model settings and index configurations.
    Alternatively, you can type the following in your browser to verify the data model configurations:
    https://<SPLUNK instance>/en-US/app/SplunkEnterpriseSecuritySuite/cim_setup
  3. Check the diversity of your network data by reviewing network traffic, web, intrusion detection system (IDS), email, and authentication. You might also review the endpoints, network sessions, and network resolutions in your security environment to ensure that a large and varied dataset is analyzed to assess threat effectively.

See also

  • Configure data models
  • Create and manage data models in Splunk Enterprise Security

Run risk based correlation searches

Risk-based correlation searches are searches that mine the risk index and aggregate the risk associated with risk objects (assets and identities). When the sum of risk scores for all risk events associated with a risk object reaches a certain threshold, a risk notable is generated.

Follow these steps to run risk based correlation searches:

  1. Enable the default risk-based correlation searches provided by Splunk Enterprise Security to learn how risk based alerting works. To enable a risk based correlation search:In the Incident Review page, filter the correlation searches by risk and select the checkbox next to the default correlation searches.

    All other correlation searches must be disabled to avoid unnecessary data noise.

    Following are the default risk based correlation searches:

    • ATT&CK Tactic Threshold Exceeded For Object Over Previous 7 Days
    • Risk Threshold Exceeded For Object Over 24 Hour Period

    The risk based correlation search: ATT&CK Tactic Threshold Exceeded for Object Over Previous 7 days creates risk notables when the number of MITRE tactics exceeds three over the last seven days i.e. tactic_count >=3 and source_count >=4. This risk based correlation search searches the risk index for data diversity as defined by the MITRE ATT&CK framework.

    The risk-based correlation search Risk Threshold Exceeded for Object Over 24 Hour Period creates risk notables when the risk score for an object exceeds 100 over the last 24 hours i.e. risk_score_sum > 100. This risk based correlation search searches the risk index and aggregates risk scores by object. For example, if an object has eight related events, each with a calculated risk score, the search adds all the eight scores together. This default risk based correlation search has a default setting of a 24 hour search window.

  2. Specify the search time range and search schedule to run the risk based correlation search. Use the following search timeline and schedule settings to balance your search performance, account for data lags, and set longer time frames to evaluate threat:
    • Earliest: -1h@h
    • Latest: @h
    • Schedule Cron: 07 * * * *
    For more information on scheduling, see Change correlation search scheduling.

    Risk based correlation searches are usually run once in an hour.

  3. Use the Correlation Search editor to adjust the risk scores and severity associated with the risk based correlation search.You can also add dynamic severity to the search as follows:
    For example:
    • For a risk score > 100 over 12 hours, Severity is Medium
    • For a risk score > 150 over 12 hours, Severity is High
    • For a risk score > 200 over 12 hours, Severity is Critical

    Do not overthink how to assign risk scores since the risk score of a single event matters less than the total number of events related to an individual object. When you assign risk scores to risk objects, you assign scores to individual events and the event scores are aggregated over time.

  4. Create a dynamic risk message for each risk based correlation search. Make sure that the risk message is descriptive, yet concise and consistent.
    A risk message is an adaptive response action. Adding a custom risk message to a risk rule may help to build detections based on specific information, such as risk scores. For more information on how to create a risk message, see Create a risk message.
  5. Use the Risk Analysis adaptive response action in the Correlation Search Editor to assign risk to multiple risk objects by specifying risk scores, risk objects, risk object types, threat objects, threat object types, and a risk message.

    Prior to Splunk Enterprise version 6.4.x, only a single risk object could be configured in a correlation search.

    For more information on assigning risk, see Assign risk in Splunk Enterprise Security.

    Following are some common pairings of risk object field with risk object type:

    • user/source
    • source/dest
    • user/source/dest

See also

  • Use default correlation searches to generate risk notables in Splunk Enterprise Security
  • How risk notables are generated

Create a risk message

Follow these steps to create a risk message:

  1. In Splunk Enterprise Security, select Configure > Content > Content Management.
  2. Filter to display any risk based correlation search.
  3. Click on the risk incident rule to open the correlation search editor.
  4. Scroll to Adaptive Response Actions.
  5. Click Add New Response Action.
  6. Scroll to select the Risk Analysis adaptive response action from the drop down list so that when the correlation search finds events, it creates risk events in the risk index.
  7. Type a risk message. For example: "Possible Bypass of User Account Controls".
    You can also add custom fields to the risk message using the $variable$ format. For example: The instance of $parent_process_name$spawning$process_name$ was identified as an attempt to add a certificate to the store on endpoint $dest$ by user $user$
  8. Add risk modifiers by populating the following fields:
    • Risk Score
    • Risk Object Field
    • Risk Object Type
  9. Click Save.

Use risk factors

Risk modifiers are key to calculating risk scores and adjusting risk scores for risk objects. Risk factors are multipliers of risk that are based on the characteristics of the specific user or asset. You can specify conditions to dynamically adjust risk scores and simplify the threat investigation process by surfacing suspicious behavior.

For more information on risk factors, see

  • Create risk factors in Splunk Enterprise Security
  • Manage risk factors in Splunk Enterprise Security
  • Use default risk factors in Splunk Enterprise Security

Configure risk factors with the following conditions:

  • Watchlist Users: watchlist=true, multiply by 1.2
  • Critical Priority – Asset: priority=critical, multiply by 1.2
  • Critical Priority – User: priority=critical, multiply by 1.2

Evaluating data based on individual criticality and prioritizing key data elements are central to verify the completeness of your assets and identity data in Splunk ES. See Update the assets and identity framework.

Splunk ES calculates the total risk score dynamically as risk factor calculations are displayed only in the risk data model, not the risk index.

Review notables to identify risk

Correlate and aggregate the risk associated with assets and identities.

  1. In Splunk Enterprise Security, click on Content > Content Management to open the risk based correlation search in the correlation search editor.
  2. Scroll to Adaptive Response Actions > Notable.
  3. Use the following search in the Drill-down Search to identify:
    • All relevant risk events applied to the risk object including risk message, src, dest, user, and risk factors
    • MITRE ATT&CK annotations
    • Related risk objects associated with the risk events

    | from datamodel:"Risk.All_Risk" | search risk_object="$risk_object$" | table _time, risk_object, risk_object_type, source, annotations.mitre_attack.mitre_tactic_id, annotations.mitre_attack.mitre_technique_id, dest, src, user, risk_message, calculated_risk_score, risk_factor* | rename annotations.mitre_attack.mitre_tactic_id as mitre_tactic_id, annotations.mitre_attack.mitre_technique_id as mitre_technique_id | eval risk_event_type="primary_object" | append [| from datamodel:"Risk.All_Risk" | search risk_object!=" $risk_object$" (dest="$risk_object$" OR src="$risk_object$" OR user="$risk_object$") | table _time, risk_object, risk_object_type, source, annotations.mitre_attack.mitre_tactic_id, annotations.mitre_attack.mitre_technique_id, dest, src, user, risk_message, calculated_risk_score, risk_factor* | rename annotations.mitre_attack.mitre_tactic_id as mitre_tactic_id, annotations.mitre_attack.mitre_technique_id as mitre_technique_id | eval risk_event_type="related_object" ]

    Adding this drill down to notable events helps drill down into the risk object from a notable event within the '''Incident Review''' panel.

Curate risk to reduce false positives

Use throttling and search filtering to adjust risk based alerting and generate high fidelity notables to reduce false positives. You can throttle by risk objects, risk scores, and risk message. You might also add filters to prevent known false positives from being written to the risk index. For example: signature!="", URL!="*.google.com*" . You can also adjust the searches that aggregate risk from the events in the risk index by throttling on risk object, source, and risk incident rules. For more information on throttling, see Throttle alerts.

You can also suppress notables to prevent a sudden flood of new notables when a new risk rule is deployed. For more information on suppressing risk notables or alerts, see Define alert suppression groups to throttle sets of similar alerts

Additionally, you can suppress notables and prevent a sudden flood of notables from impacting your SOC by setting the Urgency level of some notables as Informational.

For more information on tuning risk notables to curate risk, see Curate risk in your security environment using risk based alerting.

Configure more risk based correlation searches to evaluate risk

Configure, deploy, and adjust more risk rules to experiment with the differences between the alerts generated by risk based alerting in Splunk Enterprise Security that might range from data configuration to detection writing to incident response playbooks.

The total number of risk based correlation searches do not impact threat detection since dynamic rules can produce exponential amounts of visibility in your security environment. Data source diversity and the number of risk events that are recorded to your risk index on a weekly basis are the true measure of visibility into your security environment.

Use visualizations to drill down on threat

Use dashboard visualizations in Splunk Enterprise Security to drill down on risk notables and investigate threat.
See also

  • Introduction to the dashboards
  • Use the Threat Topology visualization to analyze risk notables
  • Use the Risk Timeline to analyze risk events
Tutorial: Use risk-based alerting in Splunk Enterprise Security to analyze risk (2024)

FAQs

What is risk based alerting in Splunk? ›

Risk based alerting (RBA) represents a conceptual shift in how analysts respond to alerts or notable events. Instead of responding to all notables or alerts created by correlation searches, analysts receive and respond only to risk notables created by risk-based correlation searches.

What are the two valid types of alerts in Splunk? ›

There are two alert types, scheduled and real-time.

What is risk based alerting RBA? ›

Risk-based alerting (RBA) provides teams with a unique opportunity to pivot resources from traditionally reactive functions to proactive functions in the SOC.

Which Splunk solution designed to analyze threats and attacks? ›

Splunk Enterprise Security (ES) delivers an analytics- driven, market-leading SIEM solution that enables organizations to discover, monitor, investigate, respond and report on threats, attacks and other abnormal activity found across the enterprise.

What are the three types of risk in information security? ›

Types of risks in information security
  • Human error. Something as simple as including the wrong person in the Cc field of an email or attaching the wrong document to an email could cause a data breach. ...
  • Malicious insiders. A core part of an organisation's security practices are access controls. ...
  • Physical theft. ...
  • Phishing.
Jan 20, 2022

How do I use Splunk alerts? ›

Create a real-time alert with per-result triggering
  1. Navigate to the Search page in the Search & Reporting app.
  2. Create a search.
  3. Select Save As>Alert.
  4. Enter a title and optional description.
  5. Specify permissions.
  6. Select the Real-time alert type.
  7. (Optional) Change the Expires setting. ...
  8. Select the Per-Result trigger option.
May 21, 2019

What are the 7 types of alerts? ›

6 Major Types of Emergency Alerts
  • Mass notification systems. ...
  • Wireless Emergency Alerts (WEA) ...
  • SMS text systems. ...
  • Outdoor public warning systems. ...
  • Color code alerts. ...
  • Organizational emergency alert systems.
Apr 21, 2022

What are the three types of alerts? ›

There are three major alert systems: Wireless Emergency Alerts, Emergency Alert System and Opt-In Alert Systems. Each system has different ways of communicating with people, but all of the emergency alert systems provide a way to let people know when there is something wrong.

How are alerts configured in Splunk? ›

Configure custom webhook notifications

In Splunk Web, open SAI and go to Settings > Notifications. Under Custom webhook settings, enter a webhook for the Webhook URL. When you're done, click Set default custom webhook URL to save the custom webhook.

What is an example of risk-based approach? ›

A risk-based approach means that countries, competent authorities, and banks identify, assess, and understand the money laundering and terrorist financing risk to which they are exposed, and take the appropriate mitigation measures in accordance with the level of risk.

What is risk based testing with example? ›

Risk-based Testing (RBT)

In this test, the software is assessed to identify risk. It includes assessing criticality of business, frequency of usage, possible areas with problems, etc. This type of testing emphasizes testing of software's features and functions which are vulnerable to defects.

What is the purpose of risk based monitoring? ›

Risk-based monitoring is the process of ensuring the quality of clinical trials by identifying, assessing, monitoring and mitigating the risks that could affect the quality or safety of a study.

What are 4 methods of threat detection? ›

Generally, all threat detection falls into four major categories: Configuration, Modeling, Indicator, and Threat Behavior. There is no best type of threat detection. Each category can support different requirements and approaches depending on the business requirement.

How do I investigate an alert in Splunk? ›

Monitor and investigate alerts from the Alerts tab. View alert notifications.
...
To view alerts, follow these steps:
  1. Go to the Investigate page.
  2. Select the Entities or Groups view to investigate entities or groups, respectively.
  3. From the list, select an entity or group you want to investigate to open the Analysis Workspace.
Jul 8, 2020

What are threat analysis tools? ›

Threat analysis is a cybersecurity strategy that aims to assess an organization's security protocols, processes and procedures to identify threats, vulnerabilities, and even gather knowledge of a potential attack before they happen.

What are the 3 steps of security risk assessment? ›

3 Steps to Perform a Data Security Risk Assessment Successfully
  • Identify what the risks are to your critical systems and sensitive data.
  • Identify and organize your data by the weight of the risk associated with it.
  • Take action to mitigate the risks.
Dec 7, 2022

What are the five 5 categories of risk? ›

There are five categories of operational risk: people risk, process risk, systems risk, external events risk, and legal and compliance risk.

How do I check splunk alert logs? ›

You could get some information from the Splunk internal logs. Use the below query to fetch the details. index=_internal source="/opt/splunk/var/log/splunk/scheduler. log" savedsearch_name="your_search_name".

What is the difference between reports and alerts in Splunk? ›

A report can be used in a dashboard. It does have to trigger anything. An alert is based on a scheduled saved search that whenever certain conditions are overcome, generates one or more actions to be executed.

What are the alert levels in Splunk? ›

Available severity levels include Info, Low, Medium, High, and Critical.

What are the alert methods? ›

Alert Handling in Selenium
  • Void dismiss(): This method is used when the 'Cancel' button is clicked in the alert box. ...
  • Void accept(): This method is used to click on the 'OK' button of the alert. ...
  • String getText(): This method is used to capture the alert message.
Feb 10, 2023

How do I manage alerts? ›

Option 1: In your Settings app
  1. Open your phone's Settings app.
  2. Tap Apps & notifications. Notifications.
  3. Under “Recently Sent,” tap an app.
  4. Tap a type of notification.
  5. Choose your options: Choose Alerting or Silent. To see a banner for alerting notifications when your phone is unlocked, turn on Pop on screen.

What are the alert code colors? ›

Let's take a closer look at the different alert colors and what they mean:
  • Amber (AMBER) Alert. The Amber Alert program is the best-known missing persons program in the United States. ...
  • Silver Alert. ...
  • Blue Alert. ...
  • Endangered Missing Persons Alert. ...
  • Camo Alert. ...
  • Clear (CLEAR) Alert.
Jul 13, 2021

What is the difference between an alert and a warning? ›

Traditionally, “alerts” have been used to indicate that something significant has happened or may happen, while “warnings” typically follow alerts and provide more detail information indicating what protective action should be taken.

What is the purpose of alerts? ›

Difference between alerts, announcements, and notifications
Type of messageWhat it's used for
Alerts- Important messages to help keep your account active and running - Messages about potential problems to fix
2 more rows

How many types of alerts are there? ›

1 Types of Alerts. Alerts can be classified into four main types: Mandatory alerts - These alerts contain information/messages that all Recipe Management for Pharmaceuticals users must receive. Mandatory alerts are automatically assigned to all users.

How do I create a simple alert in Splunk? ›

Resolution
  1. Navigate to Splunk using the following link: ...
  2. In the Search page, enter the search string you are looking for example: ...
  3. To create an alert select Save As and then select Alert as follows:
  4. You will be presented with the following screen where you can enter additional details:

Which actions can be triggered by an alert in Splunk? ›

Configure alert actions
  • Set up alert actions.
  • Email notification action.
  • Use tokens in email notifications.
  • Use a webhook alert action.
  • Output results to a CSV lookup.
  • Log events.
  • Monitor triggered alerts.
  • Run a script alert action.
Jul 22, 2022

How do I setup my alerts? ›

Create an alert
  1. Go to Google Alerts.
  2. In the box at the top, enter a topic you want to follow.
  3. To change your settings, click Show options. You can change: How often you get notifications. The types of sites you'll see. Your language. ...
  4. Click Create Alert. You'll get emails whenever we find matching search results.

What are 3 examples of risk? ›

Examples of uncertainty-based risks include:
  • damage by fire, flood or other natural disasters.
  • unexpected financial loss due to an economic downturn, or bankruptcy of other businesses that owe you money.
  • loss of important suppliers or customers.
  • decrease in market share because new competitors or products enter the market.
Feb 1, 2021

What are the two main approaches to risk analysis? ›

The two main approaches to risk analysis are qualitative and quantitative. Qualitative risk analysis typically means assessing the likelihood that a risk will occur based on subjective qualities and the impact it could have on an organization using predefined ranking scales.

What is risk-based analysis? ›

Risk Analysis is a proven way of identifying and assessing factors that could negatively affect the success of a business or project. It allows you to examine the risks that you or your organization face, and helps you decide whether or not to move forward with a decision.

How do you do a risk based assessment? ›

You can do it yourself or appoint a competent person to help you.
  1. Identify hazards.
  2. Assess the risks.
  3. Control the risks.
  4. Record your findings.
  5. Review the controls.

How do you use risk-based approach? ›

The risk-based approach has three steps: determine the risk profile, implement effective risk controls and balance the residual risk.
  1. Determine the risk profile. ...
  2. Implement effective risk controls. ...
  3. Balance the residual risk.
May 26, 2022

What are three objectives of a risk monitoring? ›

Objectives of Risk Management
  • Identify:
  • Measure:
  • Monitor:
  • Control:
  • Transfer:
Jun 27, 2022

What are the four purposes of a risk assessment? ›

Create awareness of hazards and risk. Identify who may be at risk (e.g., employees, cleaners, visitors, contractors, the public, etc.). Determine whether a control program is required for a particular hazard. Determine if existing control measures are adequate or if more should be done.

What are the types of risk monitoring? ›

What Are the Different Types of Risk Monitoring?
  • Voluntary risk monitoring: When the risk monitoring process isn't legally required but is a key part of your risk management strategy.
  • Mandatory risk monitoring: Companies may be legally required to monitor risk based on the vertical they operate in.
Jul 26, 2022

What are the 5 W's in security? ›

Who, what, where, when and why? Pretty much anything you need to do can be clarified and distilled by isolating the issues into the 5 W's.

What are the 4 categories of threats? ›

Threats can be classified into four different categories; direct, indirect, veiled, conditional.

How does Splunk detect cyber threats? ›

It often relies on techniques including endpoint monitoring, signature- and behavior-based detection, malware sandboxing and user and entity behavior analytics. The purpose of advanced threat detection is to detect and mitigate an advanced attack proactively before it escalates to a breach.

How do I check Splunk errors? ›

For that, type ERROR in the search bar and press the search button. Here, Splunk is returning all the logs with error keyword.

What are risk alerts? ›

A Risk Alert is service designed to provide notice of a topic of concern or high risk to the facility, its operations or its people. Periodically, a Risk Alert or other communication is issued to our participants as a warning or reminder of a potential or imminent hazard.

What are Splunk alerts based on? ›

Alerts run in real time or on a scheduled interval and are triggered when they return results that meet user-defined conditions. When an alert is triggered, it can initialize one or more alert actions.

What is risk-based monitoring? ›

Risk-based monitoring (RBM) is an approach to clinical trials that uses data from previously conducted studies to predict the risk of a patient experiencing certain side effects.

What are risk-based controls? ›

Risk control is a plan-based business strategy that aims to identify, assess, and prepare for any dangers, hazards, and other potentials for disaster—both physical and figurative—that may interfere with an organization's operations and objectives.

What are alert types? ›

What are the different types of alerts and what do they mean?
  • Emergency alerts for fires, floods, natural disasters etc.
  • Amber alerts when a child is missing.
  • Silver alerts when seniors re missing.
  • Ashanti alerts for missing adults who are too old for an Amber alert and too young for a Silver alert.
Apr 21, 2022

How many days will the alerts be visible in the dashboard? ›

The insider risk Alert dashboard allows you to view and act on alerts generated by insider risk policies. Each report widget displays information for the last 30 days.

Which tab should you use to view a historical timeline of all alerts and controls and then take action on the risks in the case? ›

The Activity explorer tab allows risk analysts and investigators to review case activity details associated with risk alerts.

What are the three main components of Splunk? ›

Splunk Components. The primary components in the Splunk architecture are the forwarder, the indexer, and the search head.

Top Articles
Latest Posts
Article information

Author: Patricia Veum II

Last Updated:

Views: 6241

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Patricia Veum II

Birthday: 1994-12-16

Address: 2064 Little Summit, Goldieton, MS 97651-0862

Phone: +6873952696715

Job: Principal Officer

Hobby: Rafting, Cabaret, Candle making, Jigsaw puzzles, Inline skating, Magic, Graffiti

Introduction: My name is Patricia Veum II, I am a vast, combative, smiling, famous, inexpensive, zealous, sparkling person who loves writing and wants to share my knowledge and understanding with you.