icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Code42 for Splunk
SHA256 checksum (code42-for-splunk_306.tgz) a774ca0f1e8cf09d98fd3c775e7cc484c09840805d3449257f54201cf76d97e3
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Code42 for Splunk

Splunk AppInspect Passed
Overview
Details
Code42 For Splunk integrates Splunk and Code42 to provide robust correlation of endpoint and backup data.

Welcome to Code42 for Splunk Apps documentation!

Overview

About Code42 App For Splunk

Author Aplura, LLC. Code42, Inc.
App Version 3.0.6
App Build 206
Vendor Products Code42 Appliance
Has index-time operations false
Creates an index false
Implements summarization Currently, the app does not generate summaries

About Code42 App For Splunk

Code42 App For Splunk allows a Splunk Enterprise administrator to extract information and knowledge from Code42.

Scripts and binaries

This App provides the following scripts:

Release notes

Version 3.0.6

  • Bug

    • [C42-58] - Failure to update credentials on existing input
    • [C42-59] - Splunk Data Error
    • [C42-68] - Modular Input stops execution on errors
    • [C42-79] - Fix Saved Search
    • [C42-80] - Some Searches are RAM inefficient
    • Changed the Restore Forensics page to properly account for backend changes that resulted in it no longer displaying data.
    • Made several query changes to ensure the accuracy of file size and file counts data in all top 10 lists and line graphs.
  • New Feature

    • [C42-72] - Enable Historical Lookback
  • Task

    • [C42-71] - Endpoint Argument Enforcement
  • Improvement

    • [C42-55] - Better Error Handling IN modular input
    • [C42-61] - #1 Use SecurityEventsLocation API resource instead of PlanSummary and Storage API resources
    • [C42-63] - #2 Use cursors by Plan for SecurityDetectionEvent resource
    • [C42-64] - #3 Cache Authentication Tokens by Storage Node
    • [C42-65] - #4 Skip users who have been deactivated after we have all their events
    • [C42-66] - #5 Increase the default and maximum allowed Sync Frequency
    • [C42-67] - #6 Attempt to use RestoreHistory API resource instead of RestoreRecord
    • [C42-69] - Better KVStore initialization handling
    • [C42-73] - Verbiage Fix
    • [C42-78] - Additional Compatibility Updates
    • DEVICE_SCAN_RESULT and PERSONAL_CLOUD_SCAN_RESULT events are both no longer included in any of the charts/tables in the Removable Media and Cloud Service dashboards, respectively.
    • On the main overview page, the large green numbers displaying users and devices now only reflect active users and devices.
    • Standardized all Top 10 lists to always show a table File counts and Total file sizes.
    • All charts on the screen except Top 10 style charts are now updated and filtered to display the data of the selected user.
    • Standardized all dashboards to now default to a time window of previous 7 days.
    • Changed the dropdown user-picker filter at the top of dashboards to a textbox.
    • Added EventGen tab in Application Configuration to facilitate enable/disable of event generators.

Version 3.0.5

  • Minor JS updates for Certification

Version 3.0.4

  • Bug

    • [C42-54] - Incorrect Import

Version 3.0.3

  • Bug

    • [C42-53] - Force HTTPS

Version 3.0.2

  • Bug

    • [C42-51] - Modular Input Pagination

Version 3.0.1

  • Bug

    • [C42-48] - App Certification Failure

Version 3.0.0

  • Bug

    • [C42-27] - Track Cursor with SecurityDetectionEvents in Checkpoint
    • [C42-28] - Security Events Not Indexed at time of incident
    • [C42-29] - Dashboard Restore Forensics Username Dropdown
    • [C42-30] - Macro Error on Removable Media and Cloud Service Page
    • [C42-32] - TypeError Decoding Checkpoint IDs
  • New Feature

    • [C42-2] - Modular Input
    • [C42-3] - Application Configuration
    • [C42-4] - Documentation
    • [C42-5] - Branding Icons
    • [C42-6] - Checklist / Health Checks
    • [C42-7] - Dashboard - Instance
    • [C42-8] - Dashboard - Restore Forensics
    • [C42-9] - Dashboard - Cloud Service
    • [C42-10] - Dashboard - Removable Media
    • [C42-11] - Dashboard - Security
    • [C42-14] - Create CIM Fields for Data
    • [C42-18] - Eventgen
    • [C42-19] - Dashboard - Files Opened
  • Task

    • [C42-31] - Dashboard - Add Size and Count Breakdowns to Security Dashboards
    • [C42-33] - Dashboard - Overview Add CtC Panel
    • [C42-34] - Dashboard - Instance Restore
    • [C42-46] - Modify Server Alert Panels on Overview Dashboard
  • Improvement

    • [C42-20] - Dashboard - Security Enhancements
    • [C42-21] - Dashboard - Removable Media Enhancements
    • [C42-23] - Dashboard - Restore Enhancements
    • [C42-24] - Dashboard - Cloud Service Enhancements
    • [C42-25] - Update Modular Input to use kvstore (ifconfigured) for checkpoints
    • [C42-26] - Update Modular INput to use string.printable encoding of security event idsn
    • [C42-37] - Overview changes
    • [C42-38] - Instance -> Device Overview
    • [C42-39] - Instance -> Device Status Report
    • [C42-40] - Instance -> Device Restore Forensics
    • [C42-41] - Security -> Security Overview
    • [C42-42] - Security -> Removable Media
    • [C42-43] - Security -> Cloud Service
    • [C42-44] - Security -> Restore Forensics
    • [C42-45] - Security -> File Upload

About this release

Version 3.0.6 of Code42 App For Splunk is compatible with:

Splunk Enterprise versions 6.6, 7.0, 7.1, 7.2
Platforms Splunk Enterprise
Vendor Platform Code42 Enterprise / Small Business

Compatability

Known Issues

Version 3.0.6 of Code42 App For Splunk has the following known issues:

  • None

Support and resources

Questions and answers

Access questions and answers specific to Code42 App For Splunk at https://answers.splunk.com . Be sure to tag your question with the App.

Support

Support is available via email at enterprise-support@code42.com. Responses vary on working days between working hours.

Installation and Configuration

Software requirements

Splunk Enterprise system requirements

Because this App runs on Splunk Enterprise, all of the Splunk Enterprise system requirements apply.

Download

Download Code42 App For Splunk at https://splunkbase.splunk.com/app/3736/.

Installation steps

NOTE: Where referenced, TA-Code42ForSplunk and IA-Code42ForSplunk are located on Splunkbase.

Deploy to single server instance

Follow these steps to install the app in a single server instance of Splunk Enterprise:

  1. Download the Code42 App For Splunk package from https://splunkbase.splunk.com/app/3736/
  2. Install the App via the recommended installation methods (CLI, Web GUI)
  3. Restart Splunk.
  4. Download IA-Code42ForSplunk from https://splunkbase.splunk.com
  5. Install IA via the recommended installation methods (CLI, Web GUI)
  6. Navigate to IA-Code42ForSplunk/App_Config to setup modular input settings.

Deploy to Splunk Cloud

  1. Have your Splunk Cloud Support handle this installation.

Deploy to distributed deployment

Install to search head

  1. Download the Code42 App For Splunk package from https://splunkbase.splunk.com/app/3736/
  2. Install the App via the recommended installation methods (CLI, Web GUI, Deployment Server)

Install to indexers

  1. Download the TA-Code42ForSplunk package from https://splunkbase.splunk.com.
  2. Install TA-Code42ForSplunk onto the indexers per your environment.

Install to universal forwarders

  1. There is no installation to Universal Forwarders.

Install to Heavy Forwarders

  1. Download the IA-Code42ForSplunk package from https://splunkbase.splunk.com.
  2. Install IA-Code42ForSplunk onto a heavy forwarder in your environment.
  3. Configure the Modular Input with the required settings.

Deploy to distributed deployment with Search Head Clustering

  1. Place the App into the deploy_apps folder on the Deployer Server.
  2. Follow the instructions to install to a Heavy Forwarder. This Step is REQUIRED in a clustered SH environment!
  3. Deploy the App to the Search Head Cluster. DO NOT install IA-Code42ForSplunk to the Cluster!

User Guide

Configure Code42 App For Splunk

  • Install the App according to your environment (see steps above)
  • Navigate to App > IA-Code42ForSplunk > Administration > Application Configuration

Application Configuration Dashboard

To configure the Code42 application you should start on the Application Configuration page (Administration > Application Configuration)*[]:

Application Configuration

On this screen you can set the base index as well as a flag that specifies that the application is configured. In the future there will be additional configurations available.

Proxy Configuration

If you have configured a proxy server you can view the configuration under this tab. These are proxy server configurations that are being used by existing modular inputs for the Code42 application. You can also delete existing proxy configurations on this tab.

Encrypted Credentials

You can view/delete existing credentials on this tab. These are credentials that are being used by existing modular inputs in the Code42 application. These credentials are the credentials used to connect to Code42 appliances.

Code42

On this screen you can view and make any changes to existing modular inputs. As you make changes and tab between fields the modular input is modified.

Creating New Proxy Configurations

If you need to use a proxy as part of the connection to the Code42 appliance configure it here.

  • To create a new proxy server configuration, click the Create New Proxy button and fill in the following fields:

    • Proxy Name: Name for the proxy configuration. This name will be used as the proxy name in the modular input configuration.
    • Host: Proxy host name or IP.
    • Port: Port used to connect to the proxy server.
    • Username: Username used to connect to the proxy server.
    • Password: Password for the username specified above.
    • Use SSL: Should SSL be used for the proxy configuration?

Creating New Credentials

By default creating a new modular input with a username and password specified will create the necessary encrypted credentials. However if you want to create encrypted credentials manually follow this process:

  • To create a new encrypted credential, click the Create New Credential button and fill in with the appropriate username and password.
  • The realm is the application name where the encrypted credential is created + the username.

NOTE: By default creating a new modular input will automatically create a new encrypted credential so this process is not necessary unless you need a new credential for another purpose.

Creating New Code42 Inputs

NOTE: You will need to configure a new modular input for each appliance

  • To create a new data input, click the Create New Modular Input button and fill in the following fields. Those with a red asterisk on the screen are required.
    • Modular Input Name: Name for the data input configuration.
    • Hostname and port: The hostname or IP address and port of the Code42 appliance. By default you can specify hostname:443.
    • Username: The username used to connect to the appliance. This user should have a of role of Security Center User, Customer Cloud Admin, or Server Admin.
    • Password: The password for the previously specified username.
    • Toggle all data keys: Check to select all data keys.
    • Data keys: List of endpoints available on the Code42 appliance. Check the data key if you wish to pull event data.
    • Historical Lookback: This is the number of days to lookback for Security Events. Default is 60.
    • Interval: The number of seconds indicate how often the input will poll for new data. This setting must be at least 60.
    • Index: This sets the index for data to be written to. This setting should be changed from default, which normally writes to the main index, to a specified index for best performance.
    • Use Proxy: Indicates if a proxy should be use for communication with the Code42 appliance.
    • Proxy Name: Enter the name of the proxy stanza to use with the input.
  • After creating the modular input you may need to disable/re-enable the input in Settings > Data Inputs > Code42 App For Splunk to activate the input.

NOTE: When configuring the modular input through the Application Configuration dashboard, the password is automatically encrypted into the credential store. If you need to change the credential, create a new credential, and reference the host/user pair in the modular input configuration. An encrypted credential is required for this Splunk App.

Indexes

By default all events will be written to the main index. You should change the index in the configuration files to match your specific index.

Troubleshoot Code42 App For Splunk

  1. Check the Monitoring Console (>=v6.5) for errors
  2. Visit the Application Health dashboard

Full Data Reset

If you experiencing issues, and would like to reset the Code42 Data to factory install, there are few steps to take.

  1. Disable the input.
  2. Clear the indexed data. This is covered in the Splunk documentation
  3. Clear the KVStore that is tracking the cursors using the search |`code42_zero_cursors`
  4. Enable the input.

Lookups

Code42 App For Splunk contains three automatically generated lookups.

The following lookup files are generated automatically from saved searches every hour.

  • code42_users.csv
  • code42_computers.csv
  • code42_alertlog.csv

Event Generator

Code42 App For Splunk does make use of an event generator. This allows the product to display data, when there are no inputs configured.

The stanzas are:

  • code42_org.eventgen
  • code42_security.eventgen
  • code42_computer.eventgen
  • code42_restore.eventgen
  • code42_user.eventgen
  • code42_alertlog.eventgen

Acceleration

  1. Summary Indexing: No
  2. Data Model Acceleration: No
  3. Report Acceleration: No

Third Party Notices

Version 3.0.6 of Code42 App For Splunk incorporates the following Third-party software or third-party services .

  1. Please see full documentation for attributions.

Release Notes

Version 3.0.6
Jan. 16, 2019

Performance improvements and dashboard optimizations.

126
Installs
404
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2019 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.