Copy an event profile for the Splunk Enterprise Event Ingestion integration
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- Security Incident Response integrations
Copy an event profile for the Splunk Enterprise Event Ingestion integration
Copy an existing profile and its associated settings instead of creating new profiles. If you are creating multiple profiles, and you want to reuse the settings of an existing profile, you might prefer to copy alarm profiles to save time.
Before you begin
Role required: sn_si.admin
About this task
Copying an existing profile and its associated settings is optional.
If you copy a profile, the profile name is initially modified to avoid duplicate profiles. In addition, the copied profile is disabled (false) so it is not activated accidentally prior to completing the configuration. Copy profiles and use existing maps for security incidents that you have already previewed and verified.
Procedure
What to do next
You are prompted to activate (enable) the new profile after you complete the configuration steps.