Add a new entity list
After you create an entity list, you can also create a finding exclusion rule based that entity list for more precise threat detection tuning. See Create a finding exclusion rule using the UEBA configuration page.
Gain operational intelligence by collecting, indexing, and visualizing data using a powerful on-premises engine for actionable insights.
Release NotesCollect, index, and visualize your data in the cloud for better operational intelligence.
Release NotesDiscover, share, and install apps and add-ons with the Splunk community on Splunkbase. Publish your own or add others to your Splunk platform instance.
Gain operational intelligence by collecting, indexing, and visualizing data using a powerful on-premises engine for actionable insights.
Release NotesStreamline your security operations with a SOAR system that integrates orchestration, playbook automation, and case management to enhance threat response.
Prevent disruptions and optimize operations when you monitor and analyze your IT service with predictive analytics and machine learning.
Release NotesCollect, index, and visualize your data in the cloud for better operational intelligence.
Release NotesGain end-to-end visibility, troubleshoot in real-time, and optimize performance across infrastructure, applications, and user interfaces.
Release NotesMonitor business application performance for cloud environments and IT infrastructure.
Release NotesMonitor business application performance for cloud environments and IT infrastructure.
Release NotesAn on-premises solution using AppDynamics On-Premises or Appdynamics Virtual Appliance (self hosted).
Release NotesBuild and deliver apps and integrations with SDKs, APIs and tools.
Access and share apps and add-ons with the Splunk community on Splunkbase. Publish your own apps, or download and install others on your Splunk platform instance.
Explore information on best practices, connect with community, or contact support.
Source: Choose from existing sources in your asset and identity lookups.
Category: Choose from existing categories in your asset and identity lookups.
Pattern match: Enter a pattern to match against normalized_risk_object values.
After you create an entity list, you can also create a finding exclusion rule based that entity list for more precise threat detection tuning. See Create a finding exclusion rule using the UEBA configuration page.