Tune detections in Splunk Enterprise Security
To optimize the performance of detections and reduce alert noise, you must adjust the detection SPL over the various stages of its life-cycle as follows:
- Detection authoring: The first stage when the initial detection logic or SPL is created. For more information, see Guidelines to create a custom finding-based detection.
- Detection tuning: Systematically analyze and test detection search results to exclude field values to reduce alert noise and amplify specific threats. For more information, see Tune detections in real time to reduce false positives in Splunk Enterprise Security.
- Throttling: Suppress specific detections or fields in a detection for a period of time to prevent undesired findings from being added to a specific investigation. For more information, see Suppress specific detections or fields in Splunk Enterprise Security.
- Risk-based alerting: create finding-based detections that automatically generate findings when an entity's risk score passes a threshold you define. This helps you surface entities that might need immediate review. For more information, see Using entity risk scores for detections in Splunk Enterprise Security.
- Detection scheduling: Set the time and run detections as scheduled searches to specify the results that get included in the search results. For more information, see Specify the time to run detections in Splunk Enterprise Security.
Tune detections in real time to reduce false positives in Splunk Enterprise Security
Adjust your detection SPL in real time to reduce false positives and improve the accuracy of alerts. You can analyze and test detection search results to surface the root causes of alert noise without jeopardizing detection coverage by identifying field values that occur with high frequency or patterns and then modify your detection logic by excluding specific field values. Dynamically tuning detections helps to continuously optimize the security thresholds based on ongoing telemetry guidance without missing true threats.
field:values that are in the results, sort by prevalence, and view sample events to determine false positives. You can also link shared indicators or field values for more prescriptive relational exclusions. Throughout the process, you receive real-time feedback on the projected reduction in alert volume as exclusions are applied, thereby streamlining future tuning efforts and promoting consistency.
- In Splunk Enterprise Security, go to Configure.
- Select Content, and then select Content management.
- In the Content management page, open the detection to which you want to make adjustments in the detection editor.
- In the Edit detection page, select Tuning mode to run the detection search against your security operation center's (SOC's) historical data over a defined time window and identify a prioritized list of field values such as usernames, hostnames, command lines, or IP addresses that are likely to generate alerts.
-
Once the detection search runs, go to the Detection metrics in the left panel to view a summary of potential fields that might be excluded based on noise reduction percentages, total events, and similar field values, which might be contributing to alert noise. The fields and their values are listed in a table.Note: As you exclude field values from the detection, the detection SPL is dynamically updated with visual cues for exclusion logic such as NOT statements, which helps to understand the impact of your tuning of the detection logic.
-
Select any of the fields in the table to view the Exclusion details on the right panel.
-
Select Sample events to view the sample events created by the field that you selected, which helps to decide if the field is worth excluding from the detection.Note: You might see empty rows in Sample Events because the detection SPL filters out required fields such as
_cd,_raw,_time, andsourcefrom the event data. -
Select Related fields to view the fields that are associated with the primary field that you selected from the main table. Using the Related fields tab you can view the field values and the sample events for these related fields to further narrow down false positives and create a relational exclusion. A relational exclusion is an exclusion where the
Primary Field:Value AND the Related Field:Valueare both true. For example, whereNOT (source="logins.log" AND host="test-server").Note: The Pending exclusions summary panel summarizes the number of total exclusions. direct exclusions, and relational exclusions. For example, if you excluded one field such asactionTypewith a value ofNETWORK_CONNECTIONand a related field such asinstance_IDwith a value ofi-e1254378927492797, you have 1 direct exclusion, 1 related exclusion and 2 total exclusions that are listed in the Pending exclusions summary panel. -
Turn on or turn off various field and values to identify the impact of excluding specific fields from the detection search results. You can see detection metrics update in real time as you make exclusions or changes.Note: Excluding multiple fields with specific values often provide more accurate results than completely excluding a single field.
-
Expand the field in Related fields to view 5 or fewer sample events that might be created and quickly identify if those events are benign and creating alert noise. Reviewing sample events and related events makes excluding fields and values from detections to be a more precise operation.
- Select Open in search to review all the search results for the detection in a new search and reporting window without navigating away from the detection editor. When you open the detection using Open in search, you can run the search with all the new exclusions incorporated and you can review the results to ensure that false positives are reduced. Running a preview search lets you test the results of the detection from the detection editor and fine tune the detection for your use case.
Note: You can specify the time window such as 24 hours, Last 7 days, and so on to run the search results and further tune the detection. You can further optimize the detection SPL by appending the
whereclause at the beginning of the search query. - Select Pending exclusions to see the field exclusions that you turned on so that you can review and verify that the listed exclusions what you wanted to turn on.
- Select Apply to review and apply the pending exclusion fields to the detection. The summary view provides information on the excluded fields, field values, the number of events that the field generates, and the potential percentage of noise reduction if the field is excluded from the detection.
- Select the checkbox to save the collection of pending exclusions as a lookup that you might use as a reference to create detections.
Note: Once a lookup is created from the list of the exclusions that were identified when you tuned the detection, you must create the lookup definition manually before you can use the lookup to augment your SPL searches. To create a lookup definition, go to Settings and select Lookups and then select Lookup definitions .
- Enter a name for the lookup.
- (Optional)Enter some notes about the lookup.
- Select Save to save the changes to the detection once you have tuned the SPL as required.
Note: SPL updates are not saved until you confirm and save the changes. All notes that you added are saved in the version history of the detection.