The ThreatConnect App for Splunk Enterprise gives Splunk users the ability to leverage customizable threat intelligence integrated into Splunk from their ThreatConnect accounts. ThreatConnect provides the ability to aggregate threat intelligence from multiple sources (open source, commercial, communities, and internally created), analyze and track identified adversary infrastructure and capabilities, and put that refined knowledge to work in Splunk identifying threats targeting your organization.
The download of the ThreatConnect App for Splunk Enterprise includes a sample set of data for demo purposes. You may use this to preview the basic functionality of the application without a ThreatConnect API account. If you wish to trial the ThreatConnect App for Splunk with a live connection to the latest customizable threat intelligence data, please register for a free no-obligation trial of ThreatConnect here.
Once your Organization has been licensed for API access, you will need to create an API User within your Organization prior to Splunk interfacing with the ThreatConnect API.
There are a few options for installing the ThreatConnect App for Splunk Enterprise. For more information in installing Splunk Apps, reference the Splunk documentation located here.
Resources Page
* initial add of the Resources page
Threat Lookup
* bug fix for output when no results are found
Workflow Actions
* added additional CIM compliant lookups
Debug
added timestamp to debug file
added additional debugging
Indicator Download
displays output count for each indicator result on download
updated savedsearch to fix improper cron format
* added digest so results of previous jobs can be viewed
Main Dashboard
* added time picker on main dashboard
* new drilldown action for Trigger column which links to search for indicator
* new drilldown action for Owner column which links to ThreatConnect.com owner page.
Indicator Dashboard
* Indicator table at the bottom has new quick link switcher. This allows a full width tables without losing dashboard real estate.
DB Data
* new quick link switcher on multiple dashboards. (including address indicator map)
Debug
* added new debug command "| script tc_debug TCDEBUG"
Updated to fix default install directory.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.