Copy an event profile for the Splunk Enterprise Security Event Ingestion integration
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- Splunk Enterprise Security Event Ingestion Integration
Copy an event profile for the Splunk Enterprise Security Event Ingestion integration
Copy an existing profile and its associated settings instead of creating new profiles. If you are creating multiple profiles, and you want to reuse the settings of an existing profile, you may prefer to copy alarm profiles to save time.
Before you begin
Role required: sn_si.ingestion_profile_admin
About this task
If you copy a profile, the profile name is initially modified to avoid duplicate profiles. In addition, the copied profile is deactivated (false) so it is not activated accidentally prior to completing the configuration. Copy profiles and use existing maps for security incidents that you have already previewed and verified.
Procedure
What to do next
You are prompted to activate (enable) the new profile after you complete the configuration step.