The Splunk Threat Intelligence App streamlines security operations by automating the enrichment and response of threat intelligence within Splunk. It extracts and de-duplicates key indicators of compromise (IOCs)—including IP addresses, domains, and file hashes—from raw security logs and submits them to the threatbook.io API for threat verdiction. Malicious IOCs are enriched with detailed intelligence and stored in a user-defined target index, while a dedicated dashboard provides clear visibility into threats across the environment. Analysts can correlate enriched intelligence with raw logs for deeper investigation and leverage the data to drive automated response actions, such as blocking malicious entities. Built-in de-duplication and API-aware processing ensure efficiency and optimized performance.
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources