The Carbon Black Cloud app for Splunk SIEM includes the following saved searches (default/savedsearches.conf).
vmware_example_for_alerting
This search is designed to show users how to create alerts by using the app.
The saved search is disabled by default in the app; you can enable it from the Saved Searches Settings tab. This saved search creates a report when there is a new alert. You can then use any of the Alert Actions listed in Alert Actions Reference for Splunk SIEM, or use custom Alert Actions in your environment.
CB Analytics - Ingest Enriched Events
This saved search provides Enriched Event Details based on CB_ANALYTICS
alerts. The default time range is earliest=-30m AND latest=-20m
and runs every 10 minutes after you enable it. The delay is built-in to allow Carbon Black Cloud time to aggregate and deliver additonal events that are associated with the alert. The following search is required to output these fields:
alert_id
org_key
sourcetype
source
host
The Alert IDs should be de-duplicated via stats.
The alert_id
field should be a ;:;:
delimited string for efficiency and accuracy in the alert action.
'stats values(aid) as alert_id by org_key sourcetype source host | eval alert_id = mvjoin(alert_id, ";:;:" )'