icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

Thank You

Downloading Splunk ES Content Update
SHA256 checksum (splunk-es-content-update_3200.tgz) a993c64a6531e60d2f7c28c3f3053e4a07efaa7771ec18984cc5dd22dbe07cb7 SHA256 checksum (splunk-es-content-update_3190.tgz) 17946a2c272f66dc681debe2b5d25f455830b728fe8ad663edc08638cfa97546 SHA256 checksum (splunk-es-content-update_3180.tgz) 1707f53c74794489a555b8a448842c3a764775392c31aac30dd24540c5603c6e SHA256 checksum (splunk-es-content-update_3170.tgz) 0f9cf756ffdd4a54d6cc1b01450bf3f71f2609d15a9a7367d979d7635568c019 SHA256 checksum (splunk-es-content-update_3160.tgz) 5df87970960d713f1168d2a59b558bacba3b622190b3f94294702f9328e8b22d SHA256 checksum (splunk-es-content-update_3150.tgz) 63acd6e23e1ce3459333fbdcafbf4114bf1a49da6155e1427ace61965ea833cd SHA256 checksum (splunk-es-content-update_3140.tgz) 7aace28987f2bc959109fab0c96bc65f24bef33a21037106b0ecaac76661e6bf SHA256 checksum (splunk-es-content-update_3130.tgz) 2fb1a8a5e3ff4cba79b33542ad963713bd2d731b1700503960d72397280ca2fe SHA256 checksum (splunk-es-content-update_3120.tgz) 4c2fadb2e08532160c6a335da5569649dd2db1c033a458a6a64205aaa8dc4d00 SHA256 checksum (splunk-es-content-update_3110.tgz) c5177f6e4864e779389f86c5ccea4253790a9373ea3155e9685e660cf4437a90 SHA256 checksum (splunk-es-content-update_3100.tgz) bfa6973e33b43f8093f85e1930199a07d61306e010b887f6a05c32eff71ae9ed SHA256 checksum (splunk-es-content-update_390.tgz) 128966e8e3f57ca5708d7a3646d8932f03515dc7810cb4ef90cd71134e6fa078 SHA256 checksum (splunk-es-content-update_309.tgz) f0d4d07f6a9dcbac8087bb7bf38dc9c2de40b8839274b858c378d4848eac36f8 SHA256 checksum (splunk-es-content-update_308.tgz) 28e94723d6c0cc98a13051ba1f57046eb6ca2e64a1651ab8604dbcbea902eabc SHA256 checksum (splunk-es-content-update_307.tgz) 85834066120230032b4f90e007321c040c82f2afb5948226cf3cd807a536e46d SHA256 checksum (splunk-es-content-update_306.tgz) 79e38d5fd17715b982ba27cc47d9b9ee35cca7faca335607edab6421404c6f0d SHA256 checksum (splunk-es-content-update_305.tgz) ea738eceff8e4b0366000183686678f13859f0da7dcb5f7c14165ceee56956cc
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Splunk ES Content Update

Splunk Built
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
The Splunk ES Content Update (ESCU) app delivers pre-packaged Security Content. ESCU provides regular Security Content updates to help security practitioners address ongoing time-sensitive threats, attack methods, and other security issues.

Security Content consists of tactics, techniques, and methodologies that help with detection, investigation, and response. Security Content enables security teams to directly operationalize detection searches, investigative searches, and other supporting details. ESCU can generate Notable Events in Splunk Enterprise Security. Security Content also contains easy-to-read background information and guidance, for key context on motivations and risks associated with attack techniques, as well as pragmatic advice on how to combat those techniques.

The analytic stories and their searches are also available at https://github.com/splunk/security-content.

For more information please visit the Splunk ES Content Update user documentation.

Release Notes

Version 3.20.0
April 29, 2021


Version 3.19.0
April 15, 2021

## New Analytic Stories
- Bits Jobs
- Domain Trust Discovery

## New Detections
- BITSAdmin Download File
- BITS Job Persistence
- PowerShell Start-BitsTransfer
- DSQuery Domain Discovery
- Disable Registry Tool
- Disable Show Hidden Files
- Disable Windows Behavior Monitoring
- Disable Windows SmartScreen Protection
- Disabling CMD Application
- Disabling ControlPanel
- Disabling Firewall with Netsh
- Disabling FolderOptions Windows Feature
- Disabling NoRun Windows App
- Disabling SystemRestore In Registry
- Disabling Task Manager
- AWS Excessive Security Scanning
- Malicious Powershell Executed As A Service (Thank you Ryan Becwar for contributing)

## Updates:
- Clop Common Exec Parameter detection updated

Version 3.18.0
March 29, 2021

Version 3.17.0
March 16, 2021

Version 3.16.0
March 4, 2021

Version 3.15.0
Feb. 18, 2021

Version 3.14.0
Feb. 4, 2021

Version 3.13.0
Jan. 27, 2021

Version 3.12.0
Jan. 19, 2021

New Detections
* AWS detect users creating keys with encrypt policy without MFA
* BCDEdit Failure Recovery Modification
* AWS network access control list created with all open ports
* AWS network access control list deleted
* Detect new open S3 Buckets over AWS CLI
* O365 bypass MFA via trusted IP
* Detect hosts connecting to dynamic domain providers

* AWS detect users with kms keys performing encryption against S3 buckets
* Detect new open S3 buckets

* Circle CI Config updates
* Increase in testing coverage
* Added notable alert action configurations to all savedsearches

Version 3.11.0
Jan. 7, 2021

New Detections:
* Multi-factor authentication disabled (o365)
* Excessive Authentication Failures Alert (o365)
* PST Export Alert (o365)
* Detect high number of login failures from a single source
* Detect Supernova Webshell (used in SUNBURST)

* High number of login failures from a single source detection
* Deprecated AWS Searches that have been translated.
* Circle CI Config updates
* Increase in testing coverage

Version 3.10.0
Dec. 18, 2020

New Stories
* Sunburst Malware
* Office 365 Detections

New Detections
* Windows AdFind Exe
* Sunburst Correlation DLL and Network Event
* O365 Suspicious Admin Email Forwarding
* O365 Suspicious Rights Delegation
* O365 Suspicious User Email Forwarding

* Updates to response tasks and backend to handle multi-token replacement
* Analytic Story name added to annotations

Version 3.9.0
Dec. 4, 2020

New Detections
* Ryuk Test Files Detected
* Windows connhost exe started forcefully
* Windows DisableAntiSpyware Registry
* Windows Security Account Manager Stopped

To view the all the release notes, please visit : https://github.com/splunk/security-content/releases/tag/v3.9.0

Note: We have also updated the app versioning of ESCU

Version 3.0.9
Nov. 10, 2020


Version 3.0.8
Oct. 20, 2020


Version 3.0.7
Sept. 21, 2020

Release notes: https://docs.splunk.com/Documentation/ESSOC

Version 3.0.6
Aug. 28, 2020

Release notes: https://docs.splunk.com/Documentation/ESSOC

Version 3.0.5
Aug. 5, 2020

Release notes: https://docs.splunk.com/Documentation/ESSOC


Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.