<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Installing Boss of the SOC (BOTS) Investigation Workshop in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Installing-Boss-of-the-SOC-BOTS-Investigation-Workshop/m-p/390734#M173864</link>
    <description>&lt;P&gt;I believe that by default the home paths, if you didn't customize your installation are:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Windows&lt;/STRONG&gt; &lt;BR /&gt;
C:\Program Files\Splunk&lt;/P&gt;

&lt;P&gt;e.g.,  C:\Program Files\Splunk\etc\apps&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Linux&lt;/STRONG&gt;&lt;BR /&gt;
/opt/splunk&lt;/P&gt;

&lt;P&gt;e.g., /opt/splunk/etc/apps &lt;/P&gt;

&lt;P&gt;So if I'm, understanding correctly, you would put that app in one of these directories. &lt;/P&gt;

&lt;P&gt;Where the BOTS1.0 data set is concerned you would install the prerequisite apps, download the data that you want to explore, either the attack only or the full data set. I would recommend, like they do, using the app pre-indexed data set. Also extract this app and place it in the apps folder, and restart Splunk. &lt;/P&gt;

&lt;P&gt;You should then be able to find the data in the Search app by searching: &lt;/P&gt;

&lt;P&gt;index=botsv1 earliest=0 &lt;/P&gt;

&lt;P&gt;**edited to answer both questions. &lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2019 14:40:53 GMT</pubDate>
    <dc:creator>mstephenson716</dc:creator>
    <dc:date>2019-10-09T14:40:53Z</dc:date>
    <item>
      <title>Installing Boss of the SOC (BOTS) Investigation Workshop</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Installing-Boss-of-the-SOC-BOTS-Investigation-Workshop/m-p/390733#M173863</link>
      <description>&lt;P&gt;Despite the number of links:&lt;BR /&gt;
&lt;A href="https://www.splunk.com/blog/2018/05/25/boss-of-the-soc-bots-investigation-workshop-for-splunk.html"&gt;https://www.splunk.com/blog/2018/05/25/boss-of-the-soc-bots-investigation-workshop-for-splunk.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;One first installs the app:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/3985/"&gt;https://splunkbase.splunk.com/app/3985/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You are then directed to Copy/Move the entire extracted BOTS directory into the $SPLUNK_HOME/etc/apps directory.&lt;/P&gt;

&lt;P&gt;How can I find the exact path for my own environment? This directory does not appear to exist.&lt;/P&gt;

&lt;P&gt;and secondly the dataset:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://explore.splunk.com/BOTS_1_0_datasets"&gt;http://explore.splunk.com/BOTS_1_0_datasets&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;For which you must register. It will take you to a GitHub link. Then what?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2018 23:05:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Installing-Boss-of-the-SOC-BOTS-Investigation-Workshop/m-p/390733#M173863</guid>
      <dc:creator>therevenant</dc:creator>
      <dc:date>2018-12-31T23:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: Installing Boss of the SOC (BOTS) Investigation Workshop</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Installing-Boss-of-the-SOC-BOTS-Investigation-Workshop/m-p/390734#M173864</link>
      <description>&lt;P&gt;I believe that by default the home paths, if you didn't customize your installation are:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Windows&lt;/STRONG&gt; &lt;BR /&gt;
C:\Program Files\Splunk&lt;/P&gt;

&lt;P&gt;e.g.,  C:\Program Files\Splunk\etc\apps&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Linux&lt;/STRONG&gt;&lt;BR /&gt;
/opt/splunk&lt;/P&gt;

&lt;P&gt;e.g., /opt/splunk/etc/apps &lt;/P&gt;

&lt;P&gt;So if I'm, understanding correctly, you would put that app in one of these directories. &lt;/P&gt;

&lt;P&gt;Where the BOTS1.0 data set is concerned you would install the prerequisite apps, download the data that you want to explore, either the attack only or the full data set. I would recommend, like they do, using the app pre-indexed data set. Also extract this app and place it in the apps folder, and restart Splunk. &lt;/P&gt;

&lt;P&gt;You should then be able to find the data in the Search app by searching: &lt;/P&gt;

&lt;P&gt;index=botsv1 earliest=0 &lt;/P&gt;

&lt;P&gt;**edited to answer both questions. &lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 14:40:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Installing-Boss-of-the-SOC-BOTS-Investigation-Workshop/m-p/390734#M173864</guid>
      <dc:creator>mstephenson716</dc:creator>
      <dc:date>2019-10-09T14:40:53Z</dc:date>
    </item>
  </channel>
</rss>

