
Splunk - Search Network Events (generic) - Cisco XDR Incident
This workflow enhances security management by automating the process of identifying and managing network security events using Splunk and Cisco XDR. It performs scheduled searches for new logs, creating or updating XDR Incidents based on event severity and target status. By default, it focuses on Critical and High Severity Events to minimize noise and improve scalability. Users can customize the workflow by mapping specific Splunk event fields such as Source IP, Destination IP, and MITRE Tactics, ensuring accurate threat detection and response. Additionally, it allows for automation scheduling, such as a 10-minute interval, facilitating continuous monitoring and timely incident response. This integration streamlines security operations, reduces manual workload, and enhances the organization's ability to respond to threats efficiently.
Description
Installation and Configuration Instructions
Step 1: Install the Workflow
- Ensure you have the Splunk Cloud integration enabled in XDR.
- Install the workflow from the XDR automation Exchange.
Step 2: Configure Search Parameters
-
Splunk Search Parameter: Index
- Enter the Splunk Index to retrieve the network events.
- To search all events, use "*". Note: This is not recommended for scalability.
-
Splunk Search Parameter: Source Type
- Enter the source type for the Splunk events (e.g.,
cisco:asa
).
- Enter the source type for the Splunk events (e.g.,
Step 3: Map Event Field Names
For each field, enter the corresponding field name from the Splunk events:
- Destination Port: (e.g.,
dest_port
) - Indicator: (e.g.,
Threat_Name
) - Severity: (e.g.,
event_severity
) - MITRE Tactic: (e.g.,
mitre_tactic_id
) - MITRE Technique: (e.g.,
mitre_technique_id
) - Source IP: (e.g.,
src_ip
) - Time: (e.g.,
splunk_time
) - Destination IP: (e.g.,
dest_ip
) - Event Type Name: (e.g.,
alert_category
) - Source Name: (e.g.,
vendor_product
)
Ensure all field names are correctly mapped to match your specific Splunk event data structure.
Step 4: Automate the Workflow
- When prompted to "Automate it," you can add a scheduled automation rule.
- For example, set the automation to run at a 10-minute interval.
This workflow requires the following targets to be available before it can be run.
Integration targets
- Splunk Cloud
- Cisco XDR