Use DNS Analytics for Splunk to identify malware and suspicious behavior within your networks. Before installing the application, you should be capturing DNS requests from your name servers or infrastructure.
Install the application within Splunk by browsing to Apps > Manage Apps > Find more apps online, and searching for DNS Analytics, or uploading the package to your Search Head.
Once installed, please follow the configuration and activation steps found within https://www.alphasoc.com/docs/, which includes a data provider wizard you can use to download add-ons and get data into the app.
By default, the application uses the AlphaSOC cloud to score DNS events. To deploy an on-premise virtual appliance, please contact firstname.lastname@example.org to receive a package and deployment instructions.
The DNS Analytics API endpoints and source code are audited quarterly by NCC Group.
Support is available via email to email@example.com or by leaving a message via +1 (888) 978-4915. While we respond to most support cases immediately, we aim to respond via email within 2 hours.
- Splunk ES 4.6.0+ Notable Events integration
- Improved search performance and enhancements
Splunk's App Certification program uses a specific set of criteria to evaluate the level of quality, usability and security your app offers to its users. In addition, we evaluate the documentation and support you offer to your app's users.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.