icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading DTEX InTERCEPT Insider Risk Intelligence and Endpoint Telemetry - Splunk App
SHA256 checksum (dtex-intercept-insider-risk-intelligence-and-endpoint-telemetry-splunk-app_301.tgz) 3ac5b2842fbb1baa3adb1bef2145e0a95b9b73b0313c5df2415f33f2dd483976 SHA256 checksum (dtex-intercept-insider-risk-intelligence-and-endpoint-telemetry-splunk-app_300.tgz) 57a8d2cf62b103f5aba7b2d7a2378f4c29e5d687c55ba25ec5a8f910f34bf989 SHA256 checksum (dtex-intercept-insider-risk-intelligence-and-endpoint-telemetry-splunk-app_210.tgz) 60717a5c5e8510fd0e7183912b3f9adbdab37101db570af83b09e58ed9fbae6d SHA256 checksum (dtex-intercept-insider-risk-intelligence-and-endpoint-telemetry-splunk-app_100.tgz) d6f668ca4a5b97b04cc23a91e0ed9d367edc39d664030744f8a1118c15363c06
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

DTEX InTERCEPT Insider Risk Intelligence and Endpoint Telemetry - Splunk App

Splunk Cloud
Overview
Details
DTEX InTERCEPT provides contextual human activity intelligence and endpoint telemetry as a single, noise-free data source that surfaces insider threats, predicts data loss events, and identifies external attempts to compromise an enterprises workforce.

Together, Splunk and DTEX are delivering continuous threat posture analysis for every user, real-time endpoint visibility at enterprise scale, and dynamic zero trust policy enforcement aligned with continuous risk scoring. These actionable and holistic deliverables are helping hundreds of customers
accelerate security response times and root cause analysis, drive faster event resolution with advanced analytics and reporting, and decrease manual security and IT operations.

The Splunk App for DTEX InTERCEPT works in conjunction with the Splunk Add-on to ingest ‘Indicators of Intent’ and deliver pre-packaged dashboards and visualizations that provide SOC teams a holistic, more contextually rich understanding of how user activity is influencing what’s happening in their environment and if those behaviors are creating risks to data, users and operational processes.

DTEX InTERCEPT Insider Risk Intelligence and Endpoint Telemetry - Splunk App

Splunk and DTEX Systems have partnered to accelerate zero-trust security operations with insider risk intelligence and endpoint telemetry ignored by NGAV, UEBA and DLP tools.

DTEX InTERCEPT™ brings a previously unavailable data source to SOC, IR and threat intelligence teams while multiplying the value of Splunk ES and SOAR. It’s lightweight, cloud-native, privacy-by-design architecture scales to thousands of endpoints and servers in hours, collects only 3-5 MB of data per user each day with low CPU usage and zero impact on employee efficiency.

Only DTEX InTERCEPT delivers the context and intelligence that answers the Who, What, When, Where and How related to any potential insider threat situation, compromised account event or data loss scenario without invading personal privacy.

Insider threats, data loss events and account compromise follow a pattern of activity. DTEX analysts have identified and codified the insider equivalent: the Insider Threat Kill Chain, which encompasses the five steps present in nearly all insider attacks to provide organization-wide user visibility that highlights every step of the kill chain, rather than just focusing on the moment of exfiltration.

Visit our website or contact us to learn more about the DTEX Workforce Cyber Intelligence & Security Platform.

INSTALLATION

Splunk App Installation Guide

DATA MODEL CONFIGURATION

  • The Data Models used in this application are accelerated with 1 months period. Admin can enable/disable acceleration or change the acceleration period by the following steps:
    1. On Splunk’s menu bar, Click on Settings -> Data models
    2. From the list for Data models, click “Edit” in the "Action" column of the row for the Data model for which acceleration needs to be enabled or disabled.
    3. From the list of actions select Edit Acceleration. This will display pop-up menu for Edit Acceleration.
    4. Check or uncheck Accelerate check box to "Enable" or "Disable" data model acceleration respectively.
    5. If acceleration is enabled, select the summary range to specify acceleration period.
    6. To save acceleration changes click on save button.

REBUILDING DATA MODEL

  • In case there is no need to use the already indexed accelerated Data Model, the Data Model can be configured to rebuild from scratch for the specified acceleration period. Data Model can be rebuilt by the following steps:
    1. On Splunk’s menu bar, Click on Settings -> Data models.
    2. From the list for Data models, expand the row by clicking “>" arrow in the first column of the row for the Data model for which acceleration needs to be rebuild. This will display an extra Data Model information in "Acceleration" section.
    3. From the "Acceleration" section click on "Rebuild" link.
    4. Monitor the status of "Rebuild" in the field "Status" of "Acceleration" section. Reload the page to get latest rebuild status.

LOG FILES

  • Application setup logs are written in $SPLUNK_HOME/var/log/dtexubi.log

SAVED SEARCHES

  • This application contains savedsearches.conf which contains search queries used in Visualization Dashboards.

Release Notes

Version 3.0.1
Sept. 30, 2020

RELEASE NOTES

  • Version 3.0.1:

    • Fixed the issue in drilldowns for User Dashboard
  • Version 3.0.0:

    • Made app Python 2 and 3 compatible to support Splunk 8.0.
    • Updated dashboards as per new category IDs.
    • Added and improved dashboard drilldowns.
    • Updated 'Alerts' dashboard for better user experience.
    • Fixed minor bugs.
Version 3.0.0
Aug. 28, 2020
  • App Python 2 and 3 compatible to support Splunk 8.0.
  • Updated dashboards based on MITRE framework categories.
  • Added and improved dashboard drilldowns.
  • Updated 'Alerts' dashboard for better user experience.
  • Fixed minor bugs.
Version 2.1.0
Aug. 7, 2019

Fixed filter bug for Alerts Dashboard and Incident Report Dashboard

Version 1.0.0
Aug. 21, 2017
50
Installs
352
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.