Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
Chronicle app icon

Chronicle

This app enables the end-user to search, analyze, and ingest the enterprise security data stored in the Chronicle using investigative, reputation, and ingestion actions

Built by Splunk LLC
soar product badge

Compatibility
Not Available
Platform Version: 6.4, 6.3
Rating

0

(0)

Log in to rate this app
Ranking

#11

in Investigative
This app enables the end-user to search, analyze, and ingest the enterprise security data stored in the Chronicle using investigative, reputation, and ingestion actions

Supported Actions

  • test connectivity: Validate the asset configuration for connectivity using supplied configuration
  • list ioc details: Return any threat intelligence associated with the specified artifact
  • list iocs: List all of the IoCs discovered within the enterprise within the specified time
  • list assets: List all of the assets that accessed the specified artifact within the specified time
  • list events: List all of the events discovered within the enterprise on a particular device within the specified time
  • domain reputation: Derive the reputation of the specified domain artifact (The reputation can be either of 'Malicious', 'Suspicious', and 'Unknown')
  • ip reputation: Derive the reputation of the specified destination IP address artifact (The reputation can be either of 'Malicious', 'Suspicious', and 'Unknown')
  • list alerts: List all of the security alerts tracked within the enterprise on particular assets and|or users for the specified time
  • list rules: List the latest versions of the rules created in the Detection Engine within the enterprise
  • list detections: List all the detections for the specific versions of the given Rule ID(s)
  • on poll: Action handler for the on poll ingest functionality

Categories

Created By

Splunk LLC

Type

connector

Downloads

24,755

Resources

Login to report this app listing
OSZAR »