Collaborate on investigations in Splunk Enterprise Security
As a security analyst, you can share information on investigations and findings with other analysts to collaborate on identifying root cause and security threats through knowledge sharing.
You can add details and evidence to your investigation such as actions, and notes. You can add findings or other events that add insight to the investigation.
Use notes and upload files to add relevant information like links to online press coverage, tweets, or screenshots. Additionally, you can record important investigation steps that you take, such as phone, email, or chat conversations as notes on the investigation.
You can also leverage features such as IDs and shared views to collaborate on open findings and investigations. Select the unique ID for investigations such as ES-11005 to copy the link to the investigation and share it with other analysts.
Assign a finding or an investigation to an analyst
Owners are unassigned by default, and you can assign findings and investigations to any user with an administrator, ess_admin, or ess_analyst role.
Follow these steps to assign a finding or an investigation to an analyst:
- In Splunk Enterprise Security, go to the Mission Control page.
- Select a finding or an investigation from the analyst queue to which you want to assign an owner.
- In the details page, go to the Owner drop-down and assign an owner to the finding or the investigation. Alternatively, select Assign to me by selecting the three dots Actions menu next to the finding or the investigation and assign it to yourself.
- (Conditional) If your Splunk Enterprise Security administrator customized the analyst queue settings to require notes, you'll need to select Save changes and then enter a note in the resulting Add note dialog box.
- Select Save changes to save your note.
Create and share notes on an investigation
View all notes from the included findings of an investigation
View notes from the findings or finding groups that are included in an investigation to get the complete context of linked findings when reviewing investigations. All notes from all included findings are automatically transferred to the investigation and streamline the investigation process so that you don't have to re-enter data into investigations.
Follow these steps to view all notes in an investigation:
- In Splunk Enterprise Security, select the investigation that you want to review from the analyst queue in the Mission Control page.
- Use either of the following options to view information on the finding or finding group from an investigation:
- Select View details to open the Investigation Overview page.
- On the side panel, scroll to the Notes section to view the notes from all the included findings.
Note: When an investigation is started from a finding that includes notes and you modify or update the notes, those notes are displayed consistently between the investigation and the associated findings or finding groups. Similarly, finding groups also automatically include all notes from all included findings. - If you want to view any finding or finding group associated with the investigation from the Notes section, select the title of the finding or finding group from the Notes section.
Create specialized notes for advanced investigations in Splunk Enterprise Security
Create specialized notes that include artifacts using searches, timelines, and other structured information such as collapsible or expandable sections to conduct advanced investigations in Splunk Enterprise Security.
Each of these artifacts use fenced code blocks or three backticks ``` that must appear before the artifact in the note and at the end of the content. For more information on Markdown syntax such as headings, lists, emphasis, or tables, see Markdown cheatsheet.
-
SPL or Splunk-SPL artifact: Structured processing language that groups commands together to search, filter, analyze, and visualize data in Splunk deployments.
-
Timeline artifact: Visualization to highlight patterns or a cluster of events distributed over time, which allows you to identify trends, spikes, and gaps in a chronological order.
-
Collapse sections artifact: Commands to organize and manage large multi-file search results or adjust lines for events through hide or show panels.
SPL artifact
- Searches that other analysts might copy and run.
- Hand-off notes that display how evidence was gathered.
- Reusable triage steps embedded in investigative notes.
- Investigation summaries that refer to one or two primary searches.
```spl
index=authentication user="alice"
| table _time user src action app
| sort - _time
```
The following image displays how the SPL artifact is displayed in an investigation note:
Splunk-SPL artifact
Use Splunk-SPL artifacts for generated assistant-style content when you want to mirror product-generated examples or preserve the artifact name used in system-generated output.
Use Splunk-SPL artifacts in investigation notes only when you want consistency with generated assistant content and color corrected formatting.
```splunk-spl
index=authentication user="alice"
| table _time user src action app
| sort - _time
```
Timeline artifact
Use Timeline when you want to display the sequence of investigation events in a structured, readable format. Timeline is specifically useful for analyst handoff, incident progression, and milestone tracking.
- Use valid JSON for the body of the timeline block.
- Use double quotes for all keys and string values.
- Do not use trailing commas.
- Keep timestamp, title, and content as strings.
The body of a timeline block is a JSON array. Each object in the array becomes one timeline entry.
- timestamp
- title
- content
```timeline
[
{
"timestamp": "string",
"title": "string",
"content": "string"
}
]
```
```timeline
[
{
"timestamp": "Apr 13, 2026 10:15 AM",
"title": "Alert triggered",
"content": "An alert was generated for suspicious authentication activity."
},
{
"timestamp": "Apr 13, 2026 10:22 AM",
"title": "User contacted",
"content": "The analyst contacted the user and confirmed the activity was unexpected."
},
{
"timestamp": "Apr 13, 2026 10:35 AM",
"title": "Containment started",
"content": "The affected account password was reset and active sessions were reviewed."
}
]
```
Collapse sections artifact
Use collapse-section artifacts when you want notes to be easily scannable and contain detailed information for analysts.
- Extended triage notes.
- Embedded searches.
- Detailed remediation plans.
- Supporting evidence that does not dominate the note body.
- The block body must be valid JSON.
- The content field is a JSON string, not a raw multi-line block.
- Line breaks inside content must be represented as
\n. - You must use escape for double quotes inside content to prevent them from being interpreted as the end of the string or field.
Required structure
```collapse-section
{
"heading": "string",
"content": "string",
"additionalProps": {
"defaultOpen": true,
"disabled": false
}
}
```
AdditionalProps
The additionalProps is an optional argument to create a Collapse section artifact and includes the following arguments:
defaultOpen: Optional argument that accepts eithertrueorfalsevalues. Atruevalue expands the collapsed section when the page is loaded.Disabled: Optional argument that accepts eithertrueorfalsevalues . Atruevalue turns on the ability to expand the collapsed section.
Example of collapse section artifact in note
```collapse-section
{
"heading":"Remediation plan",
"content": "
1. Reset the affected account password.\n
2. Revoke active sessions.\n
3. Review related authentications.\n
4. Monitor for recurrence over the next 24 hours.",
"additionalProps":
{
"defaultOpen": false
"disabled":false}
}
```
Use dynamic field tokens in Splunk Enterprise Security
Use dynamic field tokens in investigation notes to automatically display investigation details based on the context of the investigation without manually rewriting the same values.
$disposition$ , then the note reflecting that field updates to the current disposition.
Examples of dynamic tokens used in investigation notes
Following are some examples of tokens that can be used in investigation notes:
- $status$
- $disposition$
- $urgency$
- $severity$
- $security_domain$
- $incident_id$
- $incident_create_time$
- $incident_update_time$
- $risk_object$
- $risk_object_type$
- $risk_score$
- $rule_title$
- $rule_description$
- $search_name$
- $source$
- $creator$
- $creator_realname$
- $next_steps$
Example of dynamic token used in an investigation note
Current status: $status$
Current disposition: $disposition$
Urgency: $urgency$
Severity: $severity$
Edit or delete notes in an investigation
Edit or delete existing notes in an investigation by selecting the drop-down menu next to the note and then selecting the Edit or Delete option.
All changes to the notes can be tracked in the audit logs. For example, you can use the following search to identify any modifications to notes included in an investigation.
index=_audit source=mc_notes | rex "(?<timestamp>[\d.]+),(?<incident_id>[\w-]+),(?<user>[\w_]+),(?<model>[\w]+),(?<command>[\w]+),(?<diff>.+)" | eval time=_time | table time, user, source, incident_id, diff, command
Upload files to an investigation
Upload files to add relevant information such as links to online press coverage, tweets, or screenshots.
Follow these steps to upload files to an investigation:
- In Splunk Enterprise Security, select the Mission Control page.
- From the Analyst queue, go to the specific investigation to which you want to add notes and select the investigation.
- Select View details and go to the investigation Overview page.
- Go to the Files section and select Upload files.
Note: All file types are supported. You can also choose to drag and drop your file for upload.
Copy links to an investigation
Copy links to an investigation to share details of the information with other analysts.
Follow these steps to copy links to an investigation:
- In Splunk Enterprise Security, select the Mission Control page.
- From the Analyst queue, select the investigation for which you want to share the link.
- Select the ellipses drop-down in the investigation details panel, and then select Copy link to copy the investigation link on your clipboard and share it with other analysts or users.
Make files available to Splunk SOAR
If your Splunk Enterprise Security environment is paired with your Splunk SOAR environment, you can use Splunk Enterprise Security files in apps and playbooks. For example, you might create a playbook that takes files you specify and detonates them in a sandbox.
The word SOAR displays next to the name of files available in Splunk SOAR.
For information on pairing with Splunk SOAR, see Pair Splunk Enterprise Security with Splunk SOAR.
Follow these steps to make a file available to Splunk SOAR:
- In Splunk Enterprise Security, select the Mission Control page.
- From the Analyst queue, go to the investigation with the specific file and select the investigation.
- Select View details and go to the investigation Overview page.
- Go to the Files section and locate the file.
- Select the three dots associated with that file and select Make available to SOAR.
Follow these steps to use files available in Splunk SOAR:
- In Splunk Enterprise Security, select the Mission Control page.
- From the Analyst queue, go to the investigation with the specific file and select the investigation.
- Select View details and go to the investigation Overview page.
- Go to the Files section and locate the file.
- Select the three dots associated with that file and select Copy SOAR vault ID.
If you want to run a playbook that uses files in this section, you must make all files available to SOAR. If you add files later and want to include those in playbook runs, make those new files available to SOAR and run the playbook again.
Delete files from Splunk Enterprise Security, Splunk SOAR, or both
Deleting a file removes it entirely from Splunk Enterprise Security, from Splunk SOAR, or from both.
If you are using this file in another investigation, that copy of the file is not removed.
Follow these steps to delete a file:
- In Splunk Enterprise Security, select the Mission Control page.
- From the Analyst queue, go to the investigation with the specific file and select the investigation.
- Select View details and go to the investigation Overview page.
- Go to the Files section and locate the file.
- Select the three dots associated with that file and select Delete file.
See also
For more information on collaborating to review findings and investigations in Splunk Enterprise Security, see the product documentation:
- Configure users and roles in the Splunk Enterprise Security Installation and Upgrade Manual.
- Manage analyst workflows using the analyst queue in Splunk Enterprise Security
- Manage saved views in Splunk Enterprise Security
- Managing access to investigations in Splunk Enterprise Security