icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cyber Triage
SHA256 checksum (cyber-triage_104.tgz) dcf084769e10b94bd69195dd1c4853f75c1c567323607ec9a5a29e05026be3df
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Cyber Triage

Overview
Details
This add-on integrates [Cyber Triage](http://www.cybertriage.com) to allow you to collect and analyze endpoint data using Cyber Triage. It will send an agentless collection tool to the remote endpoint, retrieve volatile and file system data, and analyze it for evidence of an intrusion. You can then import the Cyber Triage result back into splunk.

This add-on integrates Cyber Triage to allow you to collect and analyze endpoint data using Cyber Triage. It will send an agentless collection tool to the remote endpoint, retrieve volatile and file system data, and analyze it for evidence of an intrusion.

SETUP

To use this integration, you need the Team version of Cyber Triage (and not the Standalone desktop version).

To configure the integration, you will need to enter:

  • hostname of your Cyber Triage server
  • REST Port of your Cyber Triage server. You can find this in the "Network Settings" tab of the server's option panel.
  • API Key for the Cyber Triage REST API. You can find this in the "Deployment Mode" tab of the server's option panel.
  • Username/Password for an administrative account that can be used to run the collection tool on the endpoints.

STARTING A COLLECTION

After configuring the Cyber Triage add-on, you can start a collection by adding Cyber Triage as a “Trigger Action” for an Alert. You will need to specify the hostname or IP of the target endpoint.

If you configured Cyber Triage so that it uses your own SSL certificate instead of the default one, then change the verify server cert property in the Splunk app to True and place your PEM formatted cert into %SPLUNK_HOME%\etc\auth as cybertriage.pem.

IMPORTING DATA

You can also import your Cyber Triage results back into Splunk so that you can later do searches and correlations. You can do this with the Standard (desktop) and Team versions of Cyber Triage.

You first need to generate a JSON Report from the Cyber Triage dashboard. Next, import it into Splunk with the “Add Data” feature. Pick the JSON and and specify the Application/cybertriage source type. This will map Cyber Triage data to the following CIM data models:

  • Authentication/Failed_Authentication
  • Authentication/Successfull_Authentication
  • Application_State/All_Application_State/Ports
  • Application_State/All_Application_State/Processes
  • Application_State/All_Application_State/Services
  • Change_Analysis/Account_Management/Accounts_Created
  • Network_Traffic/All_Traffic
  • Malware
  • Web

SUPPORT

If you have any problems or need an evaluation copy of Cyber Triage, then please email support@cybertriage.com.

Release Notes

Version 1.0.4
May 30, 2018

- Fixed a bug which caused server certificate verification to always occur.
- Fixed issues related to configuring action options.
- Improved logging when errors occur.
- Fixed app icon

4
Installs
181
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2019 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.