
Unfortunately, just like in your other question, the configuration of the alert rules is not held in a repository and therefore can’t be queried with the search language. Once an incident is generated some information is logged as an audit event, but again that does not include information about the alert configuration/ownership itself.
You should be able to use the Incident API to get this information, although it would require a CURL command or a script outside of Logpoint. Alternatively, perhaps a SOAR action could do that too - we do use some of the incident API when we use a SIEM incident to trigger into SOAR.
The list of incidents ( https://LogPoint-IP/incidents ) includes “username” and “assigned to” as the information. You can use https://LogPoint-IP/get_users to get a list of all the Logpoint users and their IDs.
I appreciate that that’s not in the search at all though and you would have to some external processing afterwards - perhaps you can raise an idea for us in the idea portal and describe what you would like to see / what you can do in Splunk? I think it would be great if we could do this without using the API externally...
2 comments