Skip to main content

Splunk Generic

This Playbook is part of the Splunk Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This is a generic playbook to be executed for the Splunk Notable Generic incident type. The playbook performs all the common parts of the investigation, including notifying the SOC, enriching the data for indicators and users, calculating the severity, assigning the incident, notifying the SIEM admin for false positives and more.


This playbook uses the following sub-playbooks, integrations, and scripts.


  • Entity Enrichment - Generic v2
  • Calculate Severity - Standard


This playbook does not use any integrations.


  • GenerateInvestigationSummaryReport
  • AssignAnalystToIncident


  • setIncident
  • send-mail
  • closeInvestigation
  • extractIndicators

Playbook Inputs#

NameDescriptionDefault ValueRequired
EnrichDetermines whether to enrich all indicators in the incident. Default is True.trueOptional
OnCallSet to true to assign only the user that is currently on shift. Default is False. Requires Cortex XSOAR v5.5 or later.falseOptional
SocEmailAddressThe SOC team's email address.Optional
SocMailSubjectThe subject of the email to send to the SOC.XSOAR Summary report, ID -Optional
SiemAdminEmailAddressThe SIEM admin's email address.Optional
UseCalculateSeverityDetermines whether to use the Calculate Severity playbook to calculate the incident severity. Default is True. If the playbook isn't used, the severity is determined by the Splunk severity value.trueOptional
SiemAdminMailSubjectThe subject of the email to send to the SIEM admin.Adjustment/Exclusion for notableOptional

Playbook Outputs#

There are no outputs for this playbook.

Playbook Image#

Splunk Generic