icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.
Log4Shell Vulnerability: Information and guidance for you. Get resources.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Fidelis Cybersecurity Add-on for Splunk
SHA256 checksum (fidelis-cybersecurity-add-on-for-splunk_125.tgz) 3540d85ac31e0d49e49ac343ecfdb422222433126ad2f51c33c057366835da0d
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate


Fidelis Cybersecurity Add-on for Splunk

This app is NOT supported by Splunk. Please read about what that means for you here.
Fidelis Cybersecurity Add-on for Splunk will listen for Syslog messages from Fidelis Cybersecurity on specific port and index it into Splunk.

- UPDATE 2019.01 -
The Fidelis CyberSecurity App for Splunk and Fidelis CyberSecurity Technology Add-On were originally developed and published to Splunkbase to support an example dashboard for Fidelis Network Alert Data. This App and its associated Technology Add-On will also provide a template for customers to use in environment where the Splunk Enterprise Security application is not in use.
The Default configuration of the Fidelis Cybersecurity App leverages example Policies and Rules that were specifically selected to provide data for the example dashboards related to specific Advanced Threats and may not reflect current Policies or Rules included within the Fidelis Insight Feeds today.
As Customer Specific Rules developed for DLP, Site specific use cases, and Individual Subscriptions to Threat Intelligence Feeds will differ greatly from Fidelis Insight Rule names; the example dashboards are not designed or intended to provide any functionality related to Client specific rules without modification and personalization to the App and TA components.
Please Note : This application is not intended to be used in environments currently leveraging Splunk Enterprise Security at this time. An example Technology Add-On is currently in development that will provide a template for this specific use case in the future.


Fidelis Cybersecurity Add-on for Splunk will listen for Syslog messages from Fidelis Cybersecurity on specific port and index it into Splunk.


  • Splunk version >= 6.3
  • If using a forwarder, it must be a HEAVY forwarder( we use the HF because the universal forwarder does not include python)
  • The forwarder system must have network access (HTTP/HTTPS) to Fidelis Cybersecurity Command post which is to be Splunked.
  • Fidelis user ID, password, Command Post URL and Command Post Port Number for collecting data from Fidelis Cybersecurity Commandpost.

Recommended System configuration

  • Splunk forwarder system should have 4 GB of RAM and a quad-core CPU to run this app smoothly.

Topology and Setting up Splunk Environment

  • This app has been distributed in two parts.

1) Add-on app, which listens for Syslog messages from Fidelis Cybersecurity.
2) Main app for visualizing Fidelis Cybersecurity data.

  • This App can be set up in two ways:
    1) Standalone Mode: Install main app and Add-on app.

    • Here both the app resides on a single machine.
    • Main app uses the data collected by Add-on app and builds dashboard on it

2) Distributed Environment: Install the main app and Add-on app on search head. Add-on app on forwarder and Indexer.

 * Configure Add-on app on forwarder.
 * Main app on search head uses the received data and builds dashboards on it.

Installation in Splunk Cloud

  • In Splunk cloud we recommend, install Add-on app on internal premises forwarder, Splunk cloud indexer, and Splunk cloud search head. But configure only on internal premises forwarder.

Installation of App

  • This app can be installed through UI using "Manage Apps" or extract zip file directly into /opt/splunk/etc/apps/ folder.

Configuration of App

  • If you are using index different than "main", please change the index name into inputs.conf and macros.conf files. By default the app will ingest data into main index

  • After installation, go to the Apps->Manage Apps->Set up Technology Add-on for Fidelis Cybersecurity. New setup screen will open which will ask for Fidelis Cybersecurity Command post details. Provide Port to listen for Fidelis Alert traffic, Protocol, Command Post URL, Command Post Port Number, User Name and password for Fidelis Cybersecurity Command post and save them.

  • Splunk REST API will encrypt the password and store it in Add-on's folder itself in encrypted form, REST modular script will fetch these credentials through REST API to connect to the Fidelis Cybersecurity Commandpost.
  • Restart the Splunk

Upgrade App

  • Follow standard steps to upgrade the app.
  • The setup form in the new version of the app has an option called "Enable Data Inputs" which is checked by default. If user is upgrading from the previous version and wants to use same Data Inputs, this checkbox should be explicitly unchecked.

CIM Compatibility

This app is compatible with CIM 4.x >=


  • Email support will be provided as best effort.


The main app dashboard can take some time before the data is returned which will populate some of the panels. A good test to see that you are receiving all of the data we expect is to run this search after several minutes:

search `fidelis_get_xps_event` | stats count by sourcetype

In particular, you should see these sourcetypes:

If you don't see these sourcetypes, have a look at the log file $SPLUNK_HOME$/var/log/TA-Fidelis-Analytics/fidelis.log.

Release Notes

Version 1.2.5
Aug. 10, 2017

Corrected label on setup page.

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.