Finding-based detections available in Splunk Enterprise Security

Note: Finding-based detections in Splunk Enterprise Security are currently released as a preview feature. Preview features are provided by Splunk to you "as is" without any warranties, maintenance and support, or service level commitments. Splunk makes this preview feature available in its sole discretion and may discontinue it at any time. Use of preview features is subject to the Splunk General Terms. To provide feedback, visit the Voice of the Customer portal for finding-based detections and select Send Feedback.

View the available list of finding-based detections in Splunk Enterprise Security to use them to investigate security threats. You can also use these available detections as a model to create your own custom finding-based detections for threat investigation. For example, in the finding-based detection Findings Risk Threshold Exceeded for Entity Over 24 Hour Period, you can increase the risk score threshold by 200 instead of 100 over the last 24 hours if that works for your environment.

Note: You can rename a detection and configure a unique label for tracking purposes. However, renaming only applies to customized detections or clones of detections that are available in Splunk Enterprise Security. Alternatively, you can configure a customized name for a detection available in Splunk Enterprise Security. Renaming a detection applies to real-time and scheduled detections, whether they are turned on or off.

Use a REST search to obtain a list of detections that are available in Splunk Enterprise Security and extract the information in a table.

For example, use the following search to create a table with the app, security domain, name, and description of all the detections in your environment.

Use the following search to create a table with only the activated detections and adaptive response actions associated with those detections.

If you want to see the adaptive response actions for all detections, remove | where disabled=0.

Following are some examples of finding-based detections included in Splunk Enterprise Security:

Finding-based detection name Description SPL search
Findings ATT&CK Tactic Threshold Exceeded for Entity Over Previous 7 Days Creates findings when the number of MITRE tactics exceeds 3 over the last 7 days.
Findings Risk Threshold Exceeded for Entity Over 24 Hour Period Searches the risk index and aggregates risk scores by entity and creates findings when the risk score for an object exceeds 100 over the last 24 hours. For example, if an entity has 8 related events, each with a calculated risk score, the search adds all the 8 scores together. This default finding-based detection has a default setting of a 24-hour search window.