Using entity risk scores for detections in Splunk Enterprise Security
Entity risk scores (ERS) help you identify users, hosts, or devices that might require attention based on recent risk activity. Splunk Enterprise Security updates these scores every 20 minutes by aggregating risk events and storing them in the ers index. ERS values are commonly used to highlight high-risk entities and trigger additional investigation or automated workflows in Splunk Enterprise Security.
You can create finding-based detections that automatically generate findings when an entity's risk score passes a threshold you define. This helps you surface entities that might need immediate review.
index=ers ers>=80 risk_object_type=user
| stats max(ers) as entity_risk_score values(detections) as detections by normalized_risk_object
-
index=erssearches the ERS index. -
ers>=80returns only entities with a risk score of 80 or higher. -
risk_object_type=userlimits results to user entities. -
stats max(ers)returns the highest ERS value per user. -
values(detections)lists detections already linked to that entity. -
by normalized_risk_objectgroups results by the normalized entity name.
The search returns a list of high-risk users and any detections already associated with them. You can use this output as the basis for a Splunk Enterprise Security detection or investigation workflow, such as generating findings automatically when a user's score crosses your threshold.