<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: splunk notable hash in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/splunk-notable-hash/m-p/550110#M2356</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/300931"&gt;@valenting&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is the default behaviour for all XSOAR incidents. The below screenshot shows Splunk Event Hashes being extracted as file hashes.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-07-20 at 11.05.40 am.png" style="width: 305px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/51807iB8D8A982C5B01068/image-dimensions/305x278/is-moderation-mode/true?v=v2" width="305" height="278" role="button" title="Screenshot 2023-07-20 at 11.05.40 am.png" alt="Screenshot 2023-07-20 at 11.05.40 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can happen due to the below:-&lt;/P&gt;
&lt;P&gt;1. Default Splunk Generic Playbook - This playbook has a step that extracts indicators from the entire incident context. You can modify the "&lt;SPAN&gt;Extract indicators from incident" step to focus specific fields inside the Splunk alert.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. Indicator Extract Rules for Incident Type - Reconfigure the rule to prevent indicator extraction on "Incident Creation". Screenshot below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-07-20 at 11.20.39 am.png" style="width: 313px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/51808i05E0FCF802AB7251/image-dimensions/313x120/is-moderation-mode/true?v=v2" width="313" height="120" role="button" title="Screenshot 2023-07-20 at 11.20.39 am.png" alt="Screenshot 2023-07-20 at 11.20.39 am.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;For more information on Indicator Extraction, refer -&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.11/Cortex-XSOAR-Administrator-Guide/Indicator-Extraction" target="_blank" rel="noopener"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.11/Cortex-XSOAR-Administrator-Guide/Indicator-Extraction&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jul 2023 01:32:19 GMT</pubDate>
    <dc:creator>jfernandes1</dc:creator>
    <dc:date>2023-07-20T01:32:19Z</dc:date>
    <item>
      <title>splunk notable hash</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/splunk-notable-hash/m-p/548006#M2282</link>
      <description>&lt;P&gt;Hello, i get some problems during setup my splunk to xsoar:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem i get is xsoar take the notable event hash filed like it was a file hash and i didn't want it in my playbook.&lt;/P&gt;
&lt;P&gt;Some of you has already face this issue ? do you have resolved it ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Cortex XSOAR" id="Cortex_XSOAR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 09:57:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/splunk-notable-hash/m-p/548006#M2282</guid>
      <dc:creator>valenting</dc:creator>
      <dc:date>2023-07-03T09:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: splunk notable hash</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/splunk-notable-hash/m-p/548588#M2294</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/300931"&gt;@valenting&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I checked the incoming Splunk notable event mapper and didn't see any out of the box mapping to file fields, which is leading me to think it is happening within the playbook you are using. Can you see from which automation in the playbook that could be happening with? If you can locate that, that behavior can be switched off through the advanced section of the automation by setting "Indicator Extraction Mode" to "None".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is also worth checking the incoming mapper that you're using, as that could have been modified to extract that field as a file hash indicator.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 16:22:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/splunk-notable-hash/m-p/548588#M2294</guid>
      <dc:creator>mcooley</dc:creator>
      <dc:date>2023-07-07T16:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: splunk notable hash</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/splunk-notable-hash/m-p/550110#M2356</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/300931"&gt;@valenting&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is the default behaviour for all XSOAR incidents. The below screenshot shows Splunk Event Hashes being extracted as file hashes.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-07-20 at 11.05.40 am.png" style="width: 305px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/51807iB8D8A982C5B01068/image-dimensions/305x278/is-moderation-mode/true?v=v2" width="305" height="278" role="button" title="Screenshot 2023-07-20 at 11.05.40 am.png" alt="Screenshot 2023-07-20 at 11.05.40 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This can happen due to the below:-&lt;/P&gt;
&lt;P&gt;1. Default Splunk Generic Playbook - This playbook has a step that extracts indicators from the entire incident context. You can modify the "&lt;SPAN&gt;Extract indicators from incident" step to focus specific fields inside the Splunk alert.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. Indicator Extract Rules for Incident Type - Reconfigure the rule to prevent indicator extraction on "Incident Creation". Screenshot below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-07-20 at 11.20.39 am.png" style="width: 313px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/51808i05E0FCF802AB7251/image-dimensions/313x120/is-moderation-mode/true?v=v2" width="313" height="120" role="button" title="Screenshot 2023-07-20 at 11.20.39 am.png" alt="Screenshot 2023-07-20 at 11.20.39 am.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;For more information on Indicator Extraction, refer -&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.11/Cortex-XSOAR-Administrator-Guide/Indicator-Extraction" target="_blank" rel="noopener"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.11/Cortex-XSOAR-Administrator-Guide/Indicator-Extraction&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 01:32:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/splunk-notable-hash/m-p/550110#M2356</guid>
      <dc:creator>jfernandes1</dc:creator>
      <dc:date>2023-07-20T01:32:19Z</dc:date>
    </item>
  </channel>
</rss>

