Asset & Identity for Splunk Enterprise Security - Part 3: Empowering Analysts with More Attributes in Notables
D
Stop me if you think you've heard this one before but now my analysts are telling me that they need to be able to take these new asset attributes and get them into our notable events so they have them automatically! You have been quite helpful so far so I am turning to you once more to help me understand how we can make this work!
Wistfully,
Steven M.
Steven,
I’m so pleased to hear from you again and yes, this is a totally reasonable request from your analyst team. As you undoubtedly have been thinking, adding new fields to a dashboard panel is nice and informative, but analysts need this information as they review notable events. This is what we will cover today!
By default, assets (and identities), along with their associated attributes are returned with events if they are available using the automatic lookup capability, as was discussed in our first post in this series. Here we can see the field src_rack_number is populated with the rack number for this specific asset. What’s cool about this is that I didn’t need to do anything to add this field to the automatic lookup, Splunk Enterprise Security added the field to the automatic lookup when we added the new field in our configuration.
You’re back? Fantastic. Modifying the Incident Review Settings is very straightforward and can be found within Configure on the ES navigation bar. We have talked about assets being represented as the source (src), destination (dest) or as device (dvc) and the automatic lookups facilitate this. However, because the asset field could be any of those, we will need to create three entries in the Event Attributes list, as you can see below. The automatic lookup does the heavy lifting to automatically prepend dvc, dest or src to our asset fields. Once we have added the new fields to Event Attributes, we can click save at the bottom of the settings page.
Until next time,
Buttercup
----------------------------------------------------
Thanks!
John Stoner
Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Splunk Security Content for Threat Detection & Response: November Recap

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

AI for Humans: A Beginner’s Field Guide

Splunk Security Content for Threat Detection & Response: November 2025 Update

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
