<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOC threat hunting in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703318#M238388</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273671"&gt;@mackey&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;this solution is if you don't have Enterprise Security.&lt;/P&gt;&lt;P&gt;If you have ES, you can add your IOC list to the threat intelligence lookups.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Fri, 01 Nov 2024 13:33:58 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-11-01T13:33:58Z</dc:date>
    <item>
      <title>IOC threat hunting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703304#M238380</link>
      <description>&lt;P&gt;We deal with hundreds of iocs ( mostly flagged IP's) that come in monthly, and we need to check them for hits in our network. We do not want to continue using summary search one at a time. Is it possible to use lookup table ( or any other way) to search hundreds at a time or does this have to be done one at a time. I am very new to splunk and still learning. I am needing to see if we have had any traffic from these or to these IP's.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 06:18:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703304#M238380</guid>
      <dc:creator>mackey</dc:creator>
      <dc:date>2024-11-01T06:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: IOC threat hunting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703307#M238382</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273671"&gt;@mackey&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if you have these IOCs in a lookup table you can run a very simple search:&lt;/P&gt;&lt;P&gt;if your lookup is called my_ioc.csv and the ip list is in a column alled ip, you could run:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=* [ | inputlookup my_ioc.csv | rename ip AS query | fields query ]&lt;/LI-CODE&gt;&lt;P&gt;in this way you execute a search for all the ips listed in your lookup in full text search on all your events.&lt;/P&gt;&lt;P&gt;If instead you want to search these ips in pre-defined fields, you have only to change the field name in the subsearch, es. if you want to search in the src field, you could run:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=* [ | inputlookup my_ioc.csv | rename ip AS src | fields src ]&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 10:49:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703307#M238382</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-01T10:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: IOC threat hunting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703311#M238385</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273671"&gt;@mackey&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is your Org using Enterprise Security of Splunk?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 11:08:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703311#M238385</guid>
      <dc:creator>Bhumi</dc:creator>
      <dc:date>2024-11-01T11:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: IOC threat hunting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703318#M238388</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273671"&gt;@mackey&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;this solution is if you don't have Enterprise Security.&lt;/P&gt;&lt;P&gt;If you have ES, you can add your IOC list to the threat intelligence lookups.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2024 13:33:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703318#M238388</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-01T13:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: IOC threat hunting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703368#M238398</link>
      <description>&lt;P&gt;I have access to ES yes.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 04:24:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703368#M238398</guid>
      <dc:creator>mackey</dc:creator>
      <dc:date>2024-11-02T04:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: IOC threat hunting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703369#M238399</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273671"&gt;@mackey&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have ES, it has a framework called "THREAT INTELLIGENCE" for managing threat feeds, detecting threats, and sending alerts. You should explore this functionality, as it can be quite beneficial. Additionally, there are several other high-quality sources of threat data available in that&amp;nbsp; which just need to be activated if required OR if you have your own custom feeds, you can also integrate them as custom lookups in threat intelligence.&lt;/P&gt;&lt;P&gt;As mentioned by&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;you have two options , explore it as per your requirement.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more info on this , please refer the below docs:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_intelligence/Using_threat_intelligence_in_Splunk_Enterprise_Security" target="_blank"&gt;https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_intelligence/Using_threat_intelligence_in_Splunk_Enterprise_Security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://dev.splunk.com/enterprise/docs/devtools/enterprisesecurity/threatintelligenceframework/" target="_blank"&gt;https://dev.splunk.com/enterprise/docs/devtools/enterprisesecurity/threatintelligenceframework/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.splunk.com/en_us/pdfs/feature-brief/splunk-threat-intelligence-management.pdf" target="_blank"&gt;https://www.splunk.com/en_us/pdfs/feature-brief/splunk-threat-intelligence-management.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this helps, accept the answer by upvoting !!&lt;BR /&gt;&lt;BR /&gt;Happy Splunking !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Nov 2024 05:03:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/IOC-threat-hunting/m-p/703369#M238399</guid>
      <dc:creator>Bhumi</dc:creator>
      <dc:date>2024-11-02T05:03:48Z</dc:date>
    </item>
  </channel>
</rss>

