Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Security Operations
Table of Contents
Choose your release version
    Home New York Security Incident Management Security Operations Security Incident Response Security Incident Response integrations Splunk Enterprise Security event ingestion integration for Security Operations by ServiceNow

    Splunk Enterprise Security event ingestion integration for Security Operations by ServiceNow

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Splunk Enterprise Security event ingestion integration for Security Operations by ServiceNow

    The Splunk Enterprise Security notable event ingestion integration with the Security Incident Response (SIR) product allows security incident analysts to collect and process notable event data (referred to as notables). Data is ingested continually based on a configured polling schedule and it is used by analysts to identify and respond to potential cyber threats. Security events that are collected can be correlated into notable events in Splunk Enterprise Security and then ingested automatically with this integration. Also, individual notable events can be manually forwarded on-demand from the Splunk Enterprise Security Incident Review console and reporting interface into the Security Incident Response product of the Now Platform to create security incidents.

    Overview

    This integration provides a security operations center (SOC) analyst with visibility to notable events and related contributing event data. This data can be integrated into Now Platform Security Incident Response (SIR) security incidents for further investigation and remediation. Profiles are created in your Now Platform instance to handle different notable event types that are created via correlation searches in Splunk Enterprise Security. These profiles customize how different Splunk event fields are displayed on SIR security incidents.

    Key features

    This integration includes the following key features:

    • Create multiple notable event ingestion profiles to create SIR security incidents for specific types of threats such as phishing and malware and unauthorized access attempts.
    • Create multiple event profiles for on-demand event forwarding from your Splunk ES incident review console to create SIR security incidents.
    • Drag-and-drop mapping of Splunk notable event field values to associated SIR security incident fields.
    • A preview of the SIR security incident layout based on sample notable events to validate event mapping details.
    • Ingest historical notable events as well as ongoing, new, and updated notable events on configurable intervals.
    • Filter out notable events that do not meet SIR incident generation criteria, for example, low priority events, events that have yet to achieve a specific status, and so on.
    • Aggregate events or alerts to existing SIR security incidents based on matching field values to avoid duplicate security incidents.
    • Update notable events based on SIR incident creation and/or closure conditionals via a bi-directional interface to keep Splunk ESnotable event updates in sync with the ServiceNow SIR incident status.

    Supported Now Platform versions

    This integration supports the Madrid and New York Now Platform releases.

    The com.snc.si_dep plugin is required for this integration. This plugin automatically installs all the dependencies that are required to support the Security Incident Response product. Install and activate this plugin before installing and activating the other Security Operations applications.

    The following Security Operations applications must be installed and activated from the ServiceNow Store. Install and then activate one application at a time in the order listed below to ensure a smooth installation:
    1. Security Integration Framework
    2. Security Support Common
    3. Security Incident Response

    For more information about installing the Security Operations core applications, see Get entitlement for a Security Operations product or application and Activate a ServiceNow Store application.

    ServiceNow Addons

    The ServiceNow Security Operations Event Ingestion Addon for Splunk ES is required only if you prefer to forward events manually from your Splunk Enterprise Security Incident Review console into your Now Platform instance. This ServiceNow addon is available in splunkbase.

    This ServiceNow Security Operations Event Ingestion Addon for Splunk Enterprise application in splunkbase is not required for the automated alert ingestion that is supported by the integration.

    Splunk Supported versions

    This integration supports version 5.3.1 of Splunk Enterprise Security and 7.2.6 of Splunk Enterprise. The integration also supports the Splunk Enterprise Security Cloud service.

    MID Server

    This integration requires an installed and configured MID Server in your Now Platform® instance to connect to the Splunk service when the Splunk server is deployed within your corporate network. If you are using the Splunk Cloud service, a MID Server is not required. See the ServiceNow Product Documentation website for more information about MID Servers.

    References

    Reference Document Identifier Document Title
    1 Splunk product website Splunk Enterprise Security product website.
    2 ServiceNow Product documentation website ServiceNow Product Documentation website

    Checklist

    For a printable checklist of these topics, see Checklist for the Splunk Enterprise Security Notable Event Ingestion integration. You can use this list to monitor your progress as you work through the tasks of the integration.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Splunk Enterprise Security event ingestion integration for Security Operations by ServiceNow

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Splunk Enterprise Security event ingestion integration for Security Operations by ServiceNow

      The Splunk Enterprise Security notable event ingestion integration with the Security Incident Response (SIR) product allows security incident analysts to collect and process notable event data (referred to as notables). Data is ingested continually based on a configured polling schedule and it is used by analysts to identify and respond to potential cyber threats. Security events that are collected can be correlated into notable events in Splunk Enterprise Security and then ingested automatically with this integration. Also, individual notable events can be manually forwarded on-demand from the Splunk Enterprise Security Incident Review console and reporting interface into the Security Incident Response product of the Now Platform to create security incidents.

      Overview

      This integration provides a security operations center (SOC) analyst with visibility to notable events and related contributing event data. This data can be integrated into Now Platform Security Incident Response (SIR) security incidents for further investigation and remediation. Profiles are created in your Now Platform instance to handle different notable event types that are created via correlation searches in Splunk Enterprise Security. These profiles customize how different Splunk event fields are displayed on SIR security incidents.

      Key features

      This integration includes the following key features:

      • Create multiple notable event ingestion profiles to create SIR security incidents for specific types of threats such as phishing and malware and unauthorized access attempts.
      • Create multiple event profiles for on-demand event forwarding from your Splunk ES incident review console to create SIR security incidents.
      • Drag-and-drop mapping of Splunk notable event field values to associated SIR security incident fields.
      • A preview of the SIR security incident layout based on sample notable events to validate event mapping details.
      • Ingest historical notable events as well as ongoing, new, and updated notable events on configurable intervals.
      • Filter out notable events that do not meet SIR incident generation criteria, for example, low priority events, events that have yet to achieve a specific status, and so on.
      • Aggregate events or alerts to existing SIR security incidents based on matching field values to avoid duplicate security incidents.
      • Update notable events based on SIR incident creation and/or closure conditionals via a bi-directional interface to keep Splunk ESnotable event updates in sync with the ServiceNow SIR incident status.

      Supported Now Platform versions

      This integration supports the Madrid and New York Now Platform releases.

      The com.snc.si_dep plugin is required for this integration. This plugin automatically installs all the dependencies that are required to support the Security Incident Response product. Install and activate this plugin before installing and activating the other Security Operations applications.

      The following Security Operations applications must be installed and activated from the ServiceNow Store. Install and then activate one application at a time in the order listed below to ensure a smooth installation:
      1. Security Integration Framework
      2. Security Support Common
      3. Security Incident Response

      For more information about installing the Security Operations core applications, see Get entitlement for a Security Operations product or application and Activate a ServiceNow Store application.

      ServiceNow Addons

      The ServiceNow Security Operations Event Ingestion Addon for Splunk ES is required only if you prefer to forward events manually from your Splunk Enterprise Security Incident Review console into your Now Platform instance. This ServiceNow addon is available in splunkbase.

      This ServiceNow Security Operations Event Ingestion Addon for Splunk Enterprise application in splunkbase is not required for the automated alert ingestion that is supported by the integration.

      Splunk Supported versions

      This integration supports version 5.3.1 of Splunk Enterprise Security and 7.2.6 of Splunk Enterprise. The integration also supports the Splunk Enterprise Security Cloud service.

      MID Server

      This integration requires an installed and configured MID Server in your Now Platform® instance to connect to the Splunk service when the Splunk server is deployed within your corporate network. If you are using the Splunk Cloud service, a MID Server is not required. See the ServiceNow Product Documentation website for more information about MID Servers.

      References

      Reference Document Identifier Document Title
      1 Splunk product website Splunk Enterprise Security product website.
      2 ServiceNow Product documentation website ServiceNow Product Documentation website

      Checklist

      For a printable checklist of these topics, see Checklist for the Splunk Enterprise Security Notable Event Ingestion integration. You can use this list to monitor your progress as you work through the tasks of the integration.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login