To build new alerts, perform the following steps:
- Ensure that the correct app is selected via the
Apps
menu option in Splunk UI - Leverage an existing search macro that has been recently built and update it to meet the search query for detection
- Test if the alert works
- Use MITRE Attack Framework to add relevant fields from the Matrix here if applicable
- Create a new search macro with updated permissions. Search macro should be prefixed with appropriate keyword e.g.
gcp_detect_
orsysmon_detect
- Update the search macro permissions to be publicly readable, and admin writable
- Run the search macro to validate that the results returned are correct
- Create a splunk alert using the Splunk macro to execute every hour, shared in the app, and send alerts to Triggered Alerts
To update the app in Splunkbase, perform the following steps: -
- Ensure that all settings in
metadata/local.meta
are merged inmetadata/default.meta
, and the file does not exist - Ensure that all settings in
local/*
are merged inmetadata
folder, andlocal
folder does not exist - Ensure that version in
default/app.conf
file is updated - Ensure that the alerts lookup file is empty