INTRODUCTION
In a real Security Operations Center (SOC), detecting threats is only part of the job.
The real value comes from how well you communicate those findings.
This is where reports come in.
Reports help transform raw log data into structured, readable insights that can be shared with analysts, managers, and executives.
In this guide, I will explain what reports are, why they matter, and how to create them step-by-step β from beginner level to SOC L3 advanced reporting.
WHAT IS A REPORT IN SPLUNK
A report in Splunk is a saved search that presents data in a structured and reusable format.
Instead of running the same query again and again, you save it as a report and reuse it anytime.
A report can include:
- A query (SPL)
- A table or visualization
- A time range
- Filters and logic
In simple terms:
π A report = saved detection + structured output
WHY REPORTS ARE IMPORTANT
Reports are critical in SOC operations because they:
- Provide consistent visibility into security events
- Help track trends over time
- Support incident investigations
- Enable communication with non-technical stakeholders
- Create audit and compliance records
Dashboards show live data.
Reports provide structured snapshots of analysis.
BEGINNER LEVEL β CREATING YOUR FIRST REPORT
Step 1 β Run a basic query
Example:
index=botsv3 EventCode=4688
| table _time New_Process_Name Command_Line
This shows process execution logs.
Step 2 β Save as report
Click:
π Save As β Report
Step 3 β Give a name
Example:
Process Activity Report
Step 4 β Choose time range
- Last 24 hours
- Last 7 days
- All time
Step 5 β Save
Now your report is reusable anytime.
INTERMEDIATE LEVEL β ADDING STRUCTURE
Now we improve the report.
1. Add filtering
Example:
| search powershell
This focuses on specific activity.
2. Add logic
Example:
| eval suspicious=if(like(Command_Line,”%enc%”),”YES”,”NO”)
This introduces detection logic.
3. Add aggregation
Example:
| stats count by ComputerName Account_Name
This summarizes data instead of raw logs.
4. Clean output
Example:
| table ComputerName Account_Name count
This makes it readable.
ADVANCED LEVEL β SOC L3 REPORTING
This is where you become professional.
1. Detection-based reports
Instead of generic logs, build reports like:
- PowerShell Abuse Report
- Lateral Movement Report
- Credential Dumping Report
Each report is tied to a MITRE technique.
2. Add MITRE mapping
Example:
| eval MITRE=”T1059.001 β PowerShell Execution”
This aligns your report with industry standards.
3. Use meaningful titles
Example:
β12. SOC L3 β Windows Attack Technique Detections β MITRE T1562.001β
This looks professional and structured.
4. Add descriptions
Every report should explain:
- What it detects
- Why it matters
- What to investigate
5. Use aggregation for executives
Executives donβt want raw logs.
Use:
| stats count by MITRE
This shows trends and impact.
HOW REPORTS DIFFER FROM DASHBOARDS
- Reports = saved queries (static or scheduled)
- Dashboards = visual panels (real-time view)
Reports are used for:
β Documentation
β Sharing
β Auditing
Dashboards are used for:
β Monitoring
β Investigation
SCHEDULING REPORTS (VERY IMPORTANT)
Reports can be automated.
Example use cases
- Daily SOC report
- Weekly threat summary
- Monthly compliance report
How to schedule
While saving report:
- Enable scheduling
- Set frequency (daily/weekly)
- Set time
- Choose time range
Add alerts (optional)
Trigger alerts when:
- Count > threshold
- Suspicious activity detected
EXPORTING REPORTS
Reports can be exported as:
- CSV
This allows sharing with teams and management.
SOC L3 MINDSET FOR REPORTING
At SOC L3 level, reports should answer:
- What happened?
- How many times?
- Which systems are affected?
- Which users are involved?
- What is the risk?
Not just logs β but insights.
COMMON MISTAKES TO AVOID
β Too much raw data
β No structure
β No MITRE mapping
β No explanation
β Cluttered output
FINAL THOUGHT
Reports are not just technical outputs.
They are communication tools that show your ability to:
- Analyze
- Structure
- Explain
- Present
This is what separates SOC L1 from SOC L3.

Comments are closed