This add-on allows Splunk to send data to the Advanced Threat Analytics Platform as an alert action.
Documentation is also available here.
Before performing Splunk integration setup procedures, ensure that you have the integration information from ATA for your specific user:
Once saved, the Advanced Threat Analytics Security Operations add-on for Splunk is installed and ready to be set up.
Within any alert, you can specify security events to be sent to the ATA Platform when the alert is fired.
Open or create your alert, select Add Actions, select the ATA IR Portal Alert Action dropdown, and fill in the alert dialog box.
After adding the Action, you will be able to add additional fields that can be customized on a per-Alert basis. These fields are optional and include the following. Any of these fields that are sent, with the exception of Title and Event Grouping can be used for searching and filtering on the ATA IR Portal.
For app support please contact firstname.lastname@example.org
Add app icons / logos
Splunk's App Certification program uses a specific set of criteria to evaluate the level of quality, usability and security your app offers to its users. In addition, we evaluate the documentation and support you offer to your app's users.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.