Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
BloodHound Enterprise for Splunk SOAR app icon

BloodHound Enterprise for Splunk SOAR

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to identify quickly, and defenders can use BloodHound to identify and eliminate those same attack paths. The SOAR integration with BloodHound Enterprise (powered by SpecterOps) lets defenders see all Attack Path findings from BloodHound as Splunk SOAR events. This enables rapid remediation of these risks within your environment. All actions support all BloodHound products unless otherwise noted.

soar product badge

Latest Version 1.0.2
July 24, 2025
Compatibility
Not Available
Platform Version: 7.0, 6.4, 6.3
Rating

0

(0)

Log in to rate this app
Support
BloodHound Enterprise for Splunk SOAR support icon
Not Supported
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to identify quickly, and defenders can use BloodHound to identify and eliminate those same attack paths. The SOAR integration with BloodHound Enterprise (powered by SpecterOps) lets defenders see all Attack Path findings from BloodHound as Splunk SOAR events. This enables rapid remediation of these risks within your environment. All actions support all BloodHound products unless otherwise noted. Supported Actions [BHE Only] Pull Attack Path finding details: Queries the BloodHound Enterprise API to collect new and updated findings for your environment. Test Connectivity: Validate connectivity to the BloodHound environment specified by the supplied configuration. Fetch asset information: Pull information related to an asset from the BloodHound API. Does path exist: Determines whether a valid Attack Path exists between two objects within BloodHound. Get object ID: Fetch an object's ID from its name.

Supported Actions

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • on poll: Pull Attack Path Finding Details
  • fetch asset information: Pull information related to an asset from the API (works in Enterprise or CE)
  • does path exist: Pull a path between two objects (works in Enterprise or CE)
  • get object id: Fetch object id from asset's name

Categories

Created By

SOAR Community

Type

connector

Downloads

86

Resources

Log in to report this app listing