The Nasuni Connector for Splunk enables security and operations teams to monitor, investigate, and respond to storage-related events across their Nasuni environment. By ingesting and parsing syslog data from Nasuni Edge Appliances and the Nasuni Management Console (NMC), the app normalizes and enriches events for efficient search, correlation, and integration with Splunk SOAR workflows.
With visibility into file activity, system operations, and security alerts, including ransomware protection and antivirus alerts, teams can accelerate incident response, strengthen audit capabilities, and improve overall data security posture.
Ingested Event Types Include:
-System & operational events – General syslog activity from Edge Appliances and NMC
-Ransomware protection alerts – Detection and mitigation events from Advanced Ransomware Protection
-File system audit events – File access, modification, and deletion tracking
-Snapshot activity – Success and failure of snapshot operations
-Antivirus alerts – Threat detections from integrated antivirus scanning
Categories
SIEM, Threat Intel
Created By
Nasuni, an official Splunk Partner
Resources
Log in to report this app listing