Determination of decision step logic for incident response in an information technology environment

    公开(公告)号:US11995571B1

    公开(公告)日:2024-05-28

    申请号:US17961533

    申请日:2022-10-06

    Applicant: Splunk Inc.

    CPC classification number: G06N5/04 G06N5/02 G06Q10/06316 G06F8/34

    Abstract: Described herein are improvements for generating courses of action for an information technology (IT) environment. In one example, a method includes determining that a decision step occurs between a one step and two or more other steps of a first course of action associated with an incident type in the information technology environment. The method further includes determining possible outputs of the one step that, when used as input to the decision step, cause the first course of action to proceed from the decision step to respective steps of the two or more other steps. The method also includes incorporating logic into the decision step to direct the course of action to respective steps of the two or more other steps based on one or more of the possible outputs.

    Analyzing data across tenants of an information technology (IT) and security operations application

    公开(公告)号:US11895126B1

    公开(公告)日:2024-02-06

    申请号:US16657964

    申请日:2019-10-18

    Applicant: Splunk Inc.

    CPC classification number: H04L63/1416 G06F9/451 H04L63/0281 H04L63/1441

    Abstract: An information technology (IT) and security operations application is described that enables cross-tenant analyses of data to derive insights that can be used to provide actionable information across the application including, for example, action recommendations, threat confidence scores, and other incident data enrichments. The generation and presentation of such information to users of an IT and security operations application can enable analyst teams to more efficiently and accurately respond to various types of incidents in IT environments, thereby improving the overall operation and security of the IT environments. Furthermore, because of the shared use of an IT and security operations application concurrently by any number of separate tenants, such cross-tenant analyses can be performed in near real-time and on an ongoing basis to deliver relevant insights.

    Expediting processing of selected events on a time-limited basis

    公开(公告)号:US11593477B1

    公开(公告)日:2023-02-28

    申请号:US16779465

    申请日:2020-01-31

    Applicant: Splunk Inc.

    Abstract: Techniques are described that enable an IT and security operations application to prioritize the processing of selected events for a defined period of time. Data is obtained reflecting activity within an IT environment, wherein the data includes a plurality of events each representing an occurrence of activity within the IT environment. A severity level is assigned to each event of the plurality of events, where the events are processed by the IT and security operations application in an order that is based at least in part on the severity level assigned to each event. Input is received identifying at least one event of the plurality of events for expedited processing to obtain a set of expedited events, and the identified events are processed by the IT and security operations application before processing events that are not in the set of expedited events.

    Identifying evidence within an information technology (IT) operations platform

    公开(公告)号:US11416561B1

    公开(公告)日:2022-08-16

    申请号:US16429044

    申请日:2019-06-02

    Applicant: Splunk Inc.

    Abstract: Techniques are described for enabling analysts and other users of an IT operations platform to identify certain data objects managed by the platform (for example, events, files, notes, actions results, etc.) as “evidence” when such data objects are believed to be of particular significance to an investigation or other matter. For example, an event generated based on data ingested from an anti-virus service and representing a security-related incident might include artifacts indicating an asset identifier, a hash value of a suspected malicious file, a file path on the infected endpoint, and so forth. An analyst can use various interfaces and interface elements of an IT operations platform to indicate which of such events and/or artifacts, if any, represent evidence in the context of the investigation that the analyst is conducting. In response, the IT operations platform can perform various automated actions.

Patent Agency Ranking