icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Code42 Insider Risk
SHA256 checksum (code42-insider-risk_131.tgz) 503973796557c2298ceb1328d2f7a27f76dba5a76ff5c750b6e4809e3de9864c SHA256 checksum (code42-insider-risk_130.tgz) 059dbfb7811a54a384cb3785d4420c9dfb3b84b965585ea5af239e3fab7b4879 SHA256 checksum (code42-insider-risk_121.tgz) 7eb80e4efdf7d39b4e80aafc0a006c23c34f429632e34556a2af215455e2e531 SHA256 checksum (code42-insider-risk_110.tgz) 64444cbb5cfde3d5ccd8f485e3affb4bf17a5924c73955d9fa622cdd97aff0f5 SHA256 checksum (code42-insider-risk_101.tgz) 0da77986c3fce767396a05380167c1f66308f46f6f6aef607a13b36bc7dd0354 SHA256 checksum (code42-insider-risk_100.tgz) ff508b139af9f37b68667215d68e649934d2fdb0244d4031484b1c73eb01f025
To install your download
To install apps and add-ons from within Splunk Enterprise
  1. Log into Splunk Enterprise.
  2. On the Apps menu, click Manage Apps.
  3. Click Install app from file.
  4. In the Upload app window, click Choose File.
  5. Locate the .tar.gz file you just downloaded, and then click Open or Choose.
  6. Click Upload.
  7. Click Restart Splunk, and then confirm that you want to restart.
To install apps and add-ons directly into Splunk Enterprise
  1. Put the downloaded file in the $SPLUNK_HOME/etc/apps directory.
  2. Untar and ungzip your app or add-on, using a tool like tar -xvf (on *nix) or WinZip (on Windows).
  3. Restart Splunk.
After you install a Splunk app, you will find it on Splunk Home. If you have questions or need more information, see Manage app and add-on objects.

Flag As Inappropriate

splunk

Code42 Insider Risk

Splunk Cloud
Overview
Correlate actionable risk insights to speed insider threat response.

Code42 integrates with Splunk to deliver valuable file exfiltration events to custom dashboards for correlation and triage within the Splunk Security Operations Suite.

Code42’s insider risk detection lenses surface insights for subsets of users more likely to put data at risk, such as users with access to proprietary information or departing employees. Extracting this data into dashboards within Splunk provides actionable insights that can be applied to existing SOC workflows to substantiate insider threat investigations and speed response.

Overview
https://www.code42.com/insider-threat-ecosystem/splunk/

Support Documentation
https://code42.com/r/support/splunk-insider-threat

Code42 Incydr Trial
https://www.code42.com/trial/

Release Notes

Version 1.3.1
June 2, 2022

Branding updates.

Version 1.3.0
April 8, 2022

Version 1.3.0:

Added:
- Support for using a Saved File Event Search as an input filter for the File Exposure input (enabling flexible custom ingest criteria beyond just a minimum riskSeverity threshold).

Changed:
- The "Newly Added High Risk Users" panel of the dashboard has been updated to track risk activity of users recently added to any Watchlist.

Fixed:
- A bug in Alert and Audit Log input checkpointing that was causing duplicate events to be ingested.

Version 1.2.1
Feb. 1, 2022

Version 1.2.1:

ACTION REQUIRED: To continue ingesting data, you must update your account configuration for API client authentication.

Added:
- Support for proxies

Changed:
- Code42 authentication now uses API Clients (https://code42.com/r/support/splunk-auth) instead of user credentials.
- Alerts input now filters by RiskSeverity instead of Severity. If previously ingesting HIGH Severity alerts, you'll now include HIGH and CRITICAL alerts.
- File Exposure input now filters by RiskScore, enabling ingestion of all event types.

Fixed:
- An issue where the Device Health input triggered rate-limiting on Forensic Search endpoints. A configurable polling rate limit is added to the Device Health input configuration.
- Event checkpointing frequency, improving the ingestion rate.
- A mismatch issue between the High Risk Employee event results drill-down and the dashboard.

Version 1.1.0
Sept. 7, 2021

Version 1.1.0 introduces:

  • Three new Code42 modular inputs:
    -- Alerts
    -- Audit Log
    -- Device Health

  • A new Incydr Overview Dashboard highlighting insider risk activity across your organization.

Version 1.0.1
June 30, 2020

Fixes a problem with the Removable Media dashboard displaying the incorrect information.

Version 1.0.0
June 30, 2020

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.