Searching investigation artifacts with the Analyst queue in Enterprise Security 8.0
You are a Splunk Enterprise Security user or SOC analyst interested in improving your ability to search and manage investigation artifacts. You want to understand the changes in Splunk Enterprise Security 8.0 that encompass investigation workflows, the Analyst queue, and integration with Splunk SOAR for enhanced case management capabilities.
How to use Splunk software for this use case
This video shows you:
- How the Analyst queue in Splunk Enterprise Security 8.0 replaces the previous investigation workbench, streamlining the management of investigations and findings.
- The updated workflow for accessing investigation artifacts, which now appear in the Analyst queue with an enhanced side panel for detailed information.
- New features in the Analyst queue, such as the ability to add notes with text, attachments, images, and URLs to investigations.
- How to use the Analyst queue to access response plans and threat intelligence from Splunk Mission Control, with additional capabilities for SOAR-enabled environments.
- Integration details for Splunk SOAR, enabling automation features that enhance case management workflows.
Next steps
These resources might help you understand and implement this guidance:
- Splunk Help: About Splunk Enterprise Security
- Splunk Lantern Article : Installing and upgrading to Splunk Enterprise Security 8x
- Splunk Lantern Article : Using Enterprise Security 8.0 workflows
- Splunk Lantern Article : Using risk-based alerting and detection in Enterprise Security 8.0
- Splunk Lantern Article : Enabling auto-refresh on the Analyst queue in Enterprise Security
- Splunk Resource: Cybersecurity Defense Analyst Certification Prep Tips

