Welcome to the new Splunkbase! To return to the old Splunkbase, click here.

COLLECTION

Getting Started with Security

These are the best apps to help you get started with security.

Detect

Use these apps and add-ons to detect threats in your environment

Splunk Security Essentials app icon
Splunk Security Essentials
By Splunk LLC
Get started with Splunk for Security with Splunk Security Essentials (SSE). Explore security use cases and discover security content to start address threats and challenges. Security Content Library Find security content for Splunk Cloud and Splunk's SIEM and SOAR offerings and deploy out-of-the-box security detections and analytic stories to enhance your investigations and improve your security posture. Cybersecurity Frameworks Identify gaps in your defenses and take control of your security posture with automatic mapping of data and security detections to MITRE ATT&CK® and Cyber Kill Chain® framework. Data and Content Introspection Gain visibility of the data coming into your environment to add context and telemetry to security events. Enrich your security detections with metadata and tags from the Security Content Library. Security Data Journey Get prescriptive security and data recommendations and establish a data strategy to develop a security maturity roadmap. We have changed the security content delivery endpoint for ESCU to comply with Splunk guidance. This means that if you have SSE version 3.7.1 or lower, the last supported ESCU version is ESCU 4.22.0. In order to get the latest ESCU version, you will need to upgrade SSE to version 3.8.0. Learn more: Download the Product Brief : https://www.splunk.com/pdfs/product-briefs/splunk-security-essentials.pdf Try out Splunk Security Essentials: https://www.splunk.com/en_us/form/splunk-security-essentials-online-demo.html Check out the Documentation site: https://docs.splunk.com/Documentation/SSE
platform
Not Available
rating
(56)
Splunk Security Essentials support icon
splunk supported app
Enrich

Supplement your data with threat intelligence

TruSTAR Unified app icon
TruSTAR Unified
By Splunk LLC
TruSTAR integration for TruSTAR + Enterprise Security Customers. Note: The TruSTAR product is no longer sold by Splunk. Support for the TruSTAR product and this app is per policy stated here: https://www.splunk.com/en_us/legal/splunk-software-support-policy.html [see section titled, "Splunk Intelligence Management (TruSTAR Legacy System)"] Installation Docs: https://docs.splunk.com/Documentation/SIM/current/Apps/Splunk#Integrate_Splunk_Intelligence_Management_with_Splunk_Enterprise_Security_deployments_to_improve_detection_and_triage (video) Using this app to improve detection & triage: https://lantern.splunk.com/Splunk_Product_Learning_Guides/Splunk_Int_Mgmt/UnifiedApp_UseCase?mt-learningpath=intelmgmtunifiedappconfig# This app is compatible with both Splunk ES Cloud and "on-prem" / "self-managed" deployments. This app is not certified for installation / use on FEDRAMP ES Cloud deployments. The TruSTAR platform is not FEDRAMP certified. ** Notes to SplunkCloud SRE: - This app must be installed on Enterprise Security searchheads (NOT IDM), and includes a modinput, which must be allowed to run on the searchhead. This app will not work on an IDM, indexer, or a search head which does not have Enterprise Security. - This app's modinput contains checks to ensure that it will only run on the cluster Captain when installed on an ES SHC. - The modinput fetches cyber threat observables from TruSTAR's REST API and posts them to the searchheads' kvstores using the kvstore "batch_save" endpoint, not an index as most modinputs do. This is why it must run on the searchheads, not an IDM. There is no config option that would allow the user to tell the modinput to post the observables to that endpoint on a different host, it's hard-coded to post to "localhost". - This app is compatible with ES SHC, but its ES SHC compatibility is implemented in a way which requires replicating "inputs.conf" from all Splunk apps on the stack to all nodes in the SHC by setting "conf_replication_include.inputs = true" in "server.conf". This is standard for all Splunk apps created using Splunk's Addon Builder. If this behavior is problematic for other Splunk apps on the user's SHC, user will need to decide which app they prefer to use: TruSTAR Unified or the app with which that conflicts. See SINT-3685 for more details / information. - The app contains modactions that need to be available on all ES SHC nodes, so the app needs to be installed on all SHC nodes. References for exceptions to "no modinputs on SHs policy": - Case #1685202 "Vet and Install TruSTAR App for Splunk ES." (Circa April 7, 2020) (TruSTAR App for Splunk ES was this app's predecessor) - Case # 2646540
platform
Not Available
rating
(2)
TruSTAR Unified support icon
splunk supported app
Respond

Use these Splunk SOAR apps to help respond to threats

OSZAR »