heroui logo

Detect Critical Alerts from Security Tools

Splunk Security Content

View Source
Summary
This rule is designed to detect high and critical severity alerts generated by endpoint security tools such as Microsoft Defender, Carbon Black, and Crowdstrike. It aggregates alerts from the Alerts data model, focusing on critical severity levels, and retrieves key details like alert signature, application, description, source, destination, and timestamps. The search query processes data from Windows Defender Alerts and MS365 Defender incident alerts, using the tstats command for efficient retrieval in a Splunk environment. The risk_score is dynamically assigned based on alert severity, enhancing the rule's ability to prioritize incidents effectively. However, this particular analytic has been deprecated in favor of more tailored product analytics, indicating a shift towards more specialized detection capabilities. The deprecation does not negate its functionality, and it can still serve as a valuable tool for analyzing critical alerts and ensuring compliance with security policies.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • User Account
Created: 2025-01-13