

- #USING SPLUNK ENTERPRISE SECURITY INSTALL#
- #USING SPLUNK ENTERPRISE SECURITY UPDATE#
- #USING SPLUNK ENTERPRISE SECURITY MANUAL#
- #USING SPLUNK ENTERPRISE SECURITY DOWNLOAD#
This manual is written for a user capable of installing, configuring, and administering Splunk software. For more information on licensing, see Licensing for Splunk Enterprise Security
#USING SPLUNK ENTERPRISE SECURITY DOWNLOAD#
If you purchase Splunk Enterprise Security, you can download the app from Splunkbase. You can capture, monitor, and report on data from devices, systems, and applications across your environment. Enterprise Security uses correlation searches to provide visibility into security-relevant threats and generate notable events for tracking identified threats. This app has passed Splunk AppInspect and is cloud ready.Splunk Enterprise Security uses the Splunk platform's searching and reporting capabilities to provide the security practitioner with an overall view of their organization's security posture. If not, you can simply submit an issue or feature request.


If you are familiar with Splunk on a technical level, feel free to fork the GitHub branch and submit a pull request. This add-on is developed and maintained under my personal GitHub account and is not affiliated with or sanctioned by the Splunk or CrowdStrike teams.
#USING SPLUNK ENTERPRISE SECURITY UPDATE#
#USING SPLUNK ENTERPRISE SECURITY INSTALL#

I created the SA-CrowdStrikeDevices supporting add-on for Splunk Enterprise Security to streamline the process of populating the asset database with information provided by CrowdStrike. The next issue becomes, how can this device data be configured for Splunk ES? SA-CrowdStrikeDevices: The Easy Button CrowdStrike provides rich information about the devices it is deployed to that we can use in the asset database. To tackle the first challenge of using a good data source, CrowdStrike device data can be brought into Splunk along with the standard detection events. Trying to find the right data source to use becomes a challenge and is compounded by the SPL and lookup tables that are needed to create and maintain the database. The ChallengeĮven if you have been using Splunk ES for some time you may find that you still have an empty or incomplete asset database. Having your asset database configured is also strongly recommended if you plan to use Risk Based Alerting with Splunk ES. A properly configured asset database will provide a security analyst with a wealth of context when investigating security incidents. It also can provide rich context about the operating system, device type (server, workstation, etc.), and even if the system has vulnerabilities. In Splunk Enterprise Security, the Asset & Identity framework is a fundamental component that allows for an IP to map to a hostname. I have been working with Splunk Enterprise Security (ES) for over 5 years now and a recurring theme I run into with customers is that setting up Assets and Identities is hard! You may feel the same way, not knowing where to turn. Quickly populate your asset database with data from CrowdStrike.
