<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/707474#M12228</link>
    <description>&lt;P&gt;There is an app for this, too:&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/635" target="_blank"&gt;https://splunkbase.splunk.com/app/635&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 23 Dec 2024 03:02:27 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2024-12-23T03:02:27Z</dc:date>
    <item>
      <title>Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253163#M1837</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I added a new threat intelligence source in Splunk Enterprise Security (&lt;A href="https://ransomwaretracker.abuse.ch/feeds/csv/"&gt;https://ransomwaretracker.abuse.ch/feeds/csv/&lt;/A&gt; ). The download works fine and the list is stored in /opt/splunk/etc/aps/SA-TreatIntelligence/local/data. Then the list is included in the threat collection 'ip_intel' but at this step, I lose important information which is in the list, but not in the collection.&lt;/P&gt;

&lt;P&gt;So I would like to use the downloaded list as a lookup. I tried to create a lookup in SA-ThreatIntelligence/lookpus/ and modified some parameters, but no data is copied in.&lt;/P&gt;

&lt;P&gt;Any idea on how to do that?&lt;/P&gt;

&lt;P&gt;PS: I am using Splunk 6.2.4 and ES 3.3.2&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 12:02:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253163#M1837</guid>
      <dc:creator>Olivier44</dc:creator>
      <dc:date>2016-07-12T12:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253164#M1838</link>
      <description>&lt;P&gt;I think the info you miss is in an other intel list you can try the &lt;CODE&gt;all_threat_intel&lt;/CODE&gt; macro to see if you can find the info you are looking for. In the column threat_collection you can find list/macro that the info is in.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2016 09:10:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253164#M1838</guid>
      <dc:creator>aholzel</dc:creator>
      <dc:date>2016-07-14T09:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253165#M1839</link>
      <description>&lt;P&gt;I already used the all_threat_intel macro but I miss information too. The list I download has 9 fields and I need them all. (Firstseen (UTC),Threat,Malware,Host,URL,Status,Registrar,IP address(es),ASN(s),Country)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:16:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253165#M1839</guid>
      <dc:creator>Olivier44</dc:creator>
      <dc:date>2020-09-29T10:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253166#M1840</link>
      <description>&lt;P&gt;Hi Oliver, did you ever get round to solving this?&lt;/P&gt;

&lt;P&gt;I'm having the same issue with &lt;A href="http://ransomwaretracker.abuse.ch/feeds/csv/"&gt;http://ransomwaretracker.abuse.ch/feeds/csv/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I've tried renaming the fields using regex and the field transforms, but no luck so far!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2017 14:20:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253166#M1840</guid>
      <dc:creator>kerryc</dc:creator>
      <dc:date>2017-01-05T14:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253167#M1841</link>
      <description>&lt;P&gt;Hello, I have not resolved this issue. I am still in the same version of Splunk but may be it is better in the last versions... &lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2017 10:18:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253167#M1841</guid>
      <dc:creator>Olivier44</dc:creator>
      <dc:date>2017-01-06T10:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253168#M1842</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;

&lt;P&gt;I'm using Enterprise splunk and trying to use the inbuilt threat intel feeds in splunk, let say iblocklist_tor, i have enabled it and it is getting downloaded at path location opt/splunk/etc/aps/SA-TreatIntelligence/local/data. But while i'm doing the lookup for it i'm not able to do it with my firewall logs getting no hits, what i'm trying is&lt;/P&gt;

&lt;P&gt;index=firewall[| inputlookup iblocklist_tor.csv]&lt;/P&gt;

&lt;P&gt;but not getting any result, the csv getting generated having delimiter as (:). can you please help me out with this hot wot get this done.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;BR /&gt;
Vinod Yadav,Hi Team,&lt;/P&gt;

&lt;P&gt;I'm also using splunk enterprise, i have enabled few in built threat intel source,let say iblocklist_tor. I'm seeing the file is getting downloaded with a delimiter as(:). How can i lookup the list of IP addresses in my firewall logs.&lt;/P&gt;

&lt;P&gt;I'm trying to search like&lt;/P&gt;

&lt;P&gt;index=firewall[| inputlookup iblocklist_tor.csv]&lt;/P&gt;

&lt;P&gt;but not getting any event hit. can you please help me out with the steps what i'm missing here.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;BR /&gt;
Vinod Yadav&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 02:02:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253168#M1842</guid>
      <dc:creator>vinod50rao</dc:creator>
      <dc:date>2017-05-15T02:02:02Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253169#M1843</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;

&lt;P&gt;I'm using Enterprise splunk and trying to use the inbuilt threat intel feeds in splunk, let say iblocklist_tor, i have enabled it and it is getting downloaded at path location opt/splunk/etc/aps/SA-TreatIntelligence/local/data. But while i'm doing the lookup for it i'm not able to do it with my firewall logs getting no hits, what i'm trying is&lt;/P&gt;

&lt;P&gt;index=firewall[| inputlookup iblocklist_tor.csv]&lt;/P&gt;

&lt;P&gt;but not getting any result, the csv getting generated having delimiter as (:). can you please help me out with this hot wot get this done.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;BR /&gt;
Vinod Yadav&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 02:02:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/253169#M1843</guid>
      <dc:creator>vinod50rao</dc:creator>
      <dc:date>2017-05-15T02:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/707431#M12225</link>
      <description>&lt;P&gt;This should help:&lt;BR /&gt;&lt;A href="https://docs.splunk.com/Documentation/ES/7.3.2/Admin/Useintelinsearch" target="_blank"&gt;https://docs.splunk.com/Documentation/ES/7.3.2/Admin/Useintelinsearch&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Dec 2024 16:59:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/707431#M12225</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2024-12-21T16:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to use a downloaded threat intelligence source as a lookup?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/707474#M12228</link>
      <description>&lt;P&gt;There is an app for this, too:&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/635" target="_blank"&gt;https://splunkbase.splunk.com/app/635&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 03:02:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-use-a-downloaded-threat/m-p/707474#M12228</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2024-12-23T03:02:27Z</dc:date>
    </item>
  </channel>
</rss>

