The New & Improved Splunk Guide to Risk-Based Alerting

Howdy folks, it’s your friendly neighborhood transformational detection engineering evangelist Haylee Mills here. Maybe you’ve already been introduced to risk-based alerting, or maybe you’ve seen one of my many talks on the subject:

Even if you haven’t, I’m super excited to share a brand new version of my step-by-step guide to success with the risk-based alerting framework! Initially released in 2022, I designed it with customers of any skill level in mind because utilizing this exciting — but different from traditional alerting — method means building something that isn't a flick-the-switch solution; this is investing in your people with a product to transform your security approach.

The reason it’s so powerful is because it allows you to:

So What’s New?

I’ve reviewed the entire guide and made sure to include the many contributions of the RBA Community to the RBA GitHub where relevant, the amazing Splunk .conf talks from customers over the past two years, as well as some great feedback and better SPL throughout from the incredible Splunk wizard Gabriel Vasseur. After many customer calls where they’ve definitely read the guide, but maybe missed a key point because I didn’t repeat it enough, I’ve also added the Five RBA Building Blocks to reiterate some important points:

Build in Parallel

Not every piece of RBA needs to be fully developed and finished to start on the next piece. CIM data normalization is important, datamodels (and especially *accelerated datamodels*) are important, the Asset & Identity framework is important, but don’t let perfection get in the way of good! When you do tighten up these other bits, it will improve RBA, but they aren’t showstoppers.

Build Threat Object

Threat object is invaluable for tuning, SOAR enrichment, and finding anomalous behavior. Incorporate it at the start! You can take a look at Stuart McIntosh from Outpost Security and my .conf23 talk to get a better idea of how useful this is, but please take my word for it. I’ve gotten on many customer calls where I see an issue that would be so much easier to diagnose, adjust, and remediate if they only had threat object fleshed out in their correlation searches.

Build Rule Diversity

You need a variety in scores and sources for RBA to really show its value. If you only have one data source in your risk index or your scores are all flat, you’re missing out on the power of things threading together in interesting ways.

Build Signature Based Sources

Signature based sources for risk events like IDS, DLP, EDR, or cloud alert logs bring a lot of diverse content online very quickly. This ties into the above point, because these signature based sources bring a lot of visibility on many behavior types very quickly. Decide what you investigate with direct alerts (maybe high and critical severity), everything else is perfect for risk.

Build Noisy Content into Risk

One of the most impactful things RBA can do is remove busywork from your analyst queues. If your analysts are closing out alerts with no action the majority of the time, those alerts should be in RBA. If they’re closing it out with action every time, that’s a great candidate for SOAR automation.

What Now?

What are you waiting for? Go download the new-and-improved Splunk Guide to Risk-Based Alerting and you’ll be well on your way. Also, please come join us in the RBA Community and feel free to ask questions on the Slack anytime or join us in the monthly Office Hours.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.