Security Intelligence in Splunk ES means understanding threats more intelligently by looking at:
Context (Who is affected? How important is that asset?)
Risk (How dangerous is the event or behavior?)
This is different from traditional SIEMs that alert for every small event, often overwhelming analysts. Instead, Splunk ES helps you focus on what really matters by using Risk-Based Alerting (RBA) and contextual data enrichment.
RBA is a method where:
Splunk doesn’t generate alerts every time something unusual happens.
Instead, it assigns risk scores to users or systems over time.
When the accumulated risk score reaches a threshold, then a notable event is triggered.
Traditional alerting might say:
“Generate an alert every time someone fails to log in 3 times.”
But what if those failed logins are from a test server with no sensitive data? Or what if 10 alerts flood the dashboard for one small issue?
RBA solves this by:
Looking at the importance of the asset involved.
Measuring the severity of behavior.
Adding it all together into a smart risk score.
Only when the total risk becomes meaningful, Splunk will alert you.
Let’s say:
A low-priority device sees failed logins → Risk score +2
A high-value server sees port scans → Risk score +10
A C-level executive’s account is involved in both → Total risk = high → Trigger alert
This allows the SOC team to focus on high-impact threats, not every small event.
Risk Rules are a special kind of correlation search. But instead of triggering a notable event directly, they:
Assign a numeric risk score to a user, host, or system
Tag the entity (e.g., “High Login Failure Rate”)
Store the score in a risk index that can be analyzed later
Each rule might define:
What behavior to watch for (e.g., data exfiltration, privilege escalation)
How much risk to assign if that behavior is detected
Whether the rule applies differently to high-value vs. low-value assets
A Risk Rule might say:
“If a user logs into more than 3 systems in under 5 minutes, assign a risk score of 15.”
This behavior alone might not trigger a notable event. But if other Risk Rules also apply to that user, the total risk score grows, eventually crossing a threshold that generates a single, well-prioritized alert.
This is the foundation that makes Risk-Based Alerting intelligent.
It enriches raw data with organizational context. Splunk ES can match:
IP addresses to known devices (like finance servers, firewalls, or guest laptops)
Usernames to real people (including department, role, location)
In correlation rules: you can write rules that treat executives differently from regular users
In dashboards: to show you risk scores by department or region
In alerts: to explain not just what happened, but why it matters
If the same event (e.g., failed login) happens on:
A guest Wi-Fi printer → Low risk
The company CFO's laptop → High risk
That’s context — and it’s critical.
The Assets and Identities Framework makes that possible by using lookup tables (such as assets.csv and identities.csv) to relate IPs and usernames to real-world information.
You don’t waste time on minor alerts.
You know which alerts affect key assets or users.
You can create escalation rules for high-risk systems.
Less noise in the SOC.
Alerts are smarter, fewer, and more meaningful.
Analysts can focus on real incidents, improving response times.
Alerts include who, where, and how important.
You make faster decisions with more confidence.
You can explain findings to non-technical stakeholders more easily.
In Splunk ES, Security Intelligence is about thinking smart, not just fast. By combining:
Risk-Based Alerting
Risk Rules
Context from the Assets and Identities Framework
You end up with a SIEM system that gives you clearer, smarter, and more focused alerts, helping your security team act quickly and effectively.
In addition to understanding the concepts of risk scoring and contextual enrichment, it’s helpful to know how these are implemented and queried in practice within Splunk ES. This makes the Risk-Based Alerting (RBA) model not only conceptually clear but also technically actionable.
Risk Rules are the backbone of the RBA model. Unlike standard correlation searches, they don’t trigger a Notable Event directly. Instead, they assign numeric risk scores to entities such as users, hosts, or IP addresses, which accumulate over time.
Risk Rules are created and managed through the Content Management Dashboard in Splunk ES.
You can access this interface via:
Configure > Content Management > Type: Risk Rule
This UI allows you to:
Define SPL logic for risk conditions.
Assign static or dynamic risk scores.
Specify target entities (e.g., All_Risk.user, All_Risk.src).
Set tags, descriptions, and metadata for governance.
risk IndexAll generated risk events are stored in the internal risk index.
Each entry contains fields like:
risk_object_type (user, host, IP)
risk_object
risk_score
rule_name
threat_object_type
timestamp
This allows security teams to search and analyze cumulative risk over time using SPL.
Once Risk Rules are active and data is flowing into the risk index, analysts can use SPL to find and prioritize threats. One powerful way is by using data models to search across risk activity in an accelerated, normalized manner.
Here is a basic example using the Risk.All_Risk data model:
| tstats summariesonly=true count from datamodel=Risk.All_Risk
where All_Risk.risk_score > 50
by All_Risk.user
Uses tstats for high performance (leveraging accelerated data).
Pulls from the Risk.All_Risk CIM data model.
Filters for risk scores greater than 50 (considered elevated risk).
Groups the results by user (All_Risk.user) to see which accounts are involved.
This SPL can be adapted into dashboards, custom alerts, or executive reports to track users accumulating excessive risk and requiring further review.
| Feature | Purpose |
|---|---|
| Content Management UI | Visual interface to create and manage Risk Rules |
risk index |
Central storage for all scored risk events |
SPL with tstats |
Efficient way to query risk data across users or assets using CIM |
| Practical Query Example | Shows how to identify high-risk users based on stored risk scores |
What is the purpose of the Security Intelligence dashboard in Splunk Enterprise Security?
The Security Intelligence dashboard provides high-level visibility into threat activity, security detections, and risk indicators across the monitored environment.
The dashboard aggregates multiple security metrics including notable events, threat intelligence matches, and risk activity. It helps security teams quickly assess the organization’s overall security posture. Instead of reviewing individual alerts, analysts can observe patterns and spikes in security events across domains such as malware, authentication activity, and network threats. A frequent operational mistake is treating this dashboard as an investigative tool. Its primary purpose is situational awareness rather than deep forensic analysis.
Demand Score: 44
Exam Relevance Score: 55
What types of data typically feed the Security Intelligence dashboard?
The dashboard aggregates data from correlation searches, threat intelligence matches, and normalized security logs mapped through CIM-compliant data models.
Security Intelligence dashboards rely on structured data produced by ES analytics. Correlation searches generate notable events and detection metrics, while threat intelligence feeds contribute indicators such as malicious IPs or domains. CIM-compliant logs ensure consistent field mapping across security data sources. These data sources collectively populate the dashboard visualizations that highlight detection trends and threat activity. If logs are not CIM-compliant, the dashboard may display incomplete information.
Demand Score: 40
Exam Relevance Score: 61
How does the Security Intelligence dashboard help analysts identify emerging threats?
It highlights unusual spikes or trends in security events and threat intelligence matches across monitored systems.
By visualizing aggregated security metrics, the dashboard allows analysts to quickly identify anomalies such as sudden increases in authentication failures or malware detections. These trends can signal emerging threats or misconfigurations within the environment. Analysts typically use this dashboard for early detection signals before pivoting into deeper investigation tools such as Incident Review or forensic dashboards.
Demand Score: 38
Exam Relevance Score: 53