Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Task 2.2: Enable migrated Splunk rules in Sentinel

Now that the Splunk data rules have been imported, converted and verified in Microsoft Sentinel, we’ll need to enable the rules so that Sentinel can take over the detection of incidents in your environment.

The following document may help you complete this task.


  1. Return to the Microsoft Sentinel - Analytics panel.

  2. Select the [Splunk Migrated] Multiple Okta Users With Invalid Credentials From The Same IP entry in the list to display the details in the [Splunk Migrated] Multiple Okta Users With Invalid Credentials From The Same IP pane.

    If the right panel is not displayed select the « icon on the right side to display it.

  3. On the [Splunk Migrated] Multiple Okta Users With Invalid Credentials From The Same IP pane, select Edit.

  4. Change Status from Disabled to Enabled and then select the Review + create tab.

    enable_disable_toggle.png

    If there’s an error in the query it will fail the validation and can’t be enabled.

    enable_fail_validation.png

  5. Return to the Microsoft Sentinel - Analytics panel and select the [Splunk Migrated] AWS CreateAccessKey entry in the list to display the details in the [Splunk Migrated] AWS CreateAccessKey pane.

  6. On the right panel select Edit to edit the selected analytics rule.

  7. Change the Status from Disabled to Enabled and then select the Review + create tab.

    This rule does not contain any issues in the Query and will pass validation

    enable_pass_validation.png

  8. Once the Analytics rule has been validated select Save to commit the update of the Analytics rule and then return to the Microsoft Sentinel - Analytics pane.

    The Status of the updated Analytics rule in the list should now be updated to Enabled. If it hasn’t been updated select the Refresh link in the top menu to update the list.

    list_entry_enabled.png