<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228448#M67565</link>
    <description>&lt;P&gt;I looked at it but was not looking to add any apps that weren't built by splunk or splunk supported. Would I be able to install this app on my local machine and extract the information I would need to compare my data against specific threat lists? &lt;/P&gt;</description>
    <pubDate>Mon, 21 Sep 2015 20:00:37 GMT</pubDate>
    <dc:creator>santorof</dc:creator>
    <dc:date>2015-09-21T20:00:37Z</dc:date>
    <item>
      <title>Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228446#M67563</link>
      <description>&lt;P&gt;I just completed importing a CSV file as a threat intelligence lookup list. I followed Splunk documentation (6.2) and one of the details for threats by IP address is that IPs and descriptions are required. The file I was given only had IP addresses, so I changed under parsing options to only look at the first column for IPs with nothing defining descriptions. My question is, how can I test that this threat intelligence document is being parsed against my data and would files only with IPs still function without a description field? &lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 17:59:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228446#M67563</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-09-18T17:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228447#M67564</link>
      <description>&lt;P&gt;Have you seen the &lt;CODE&gt;GetWatchList&lt;/CODE&gt; app?&lt;/P&gt;

&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/635/"&gt;https://splunkbase.splunk.com/app/635/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 19:26:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228447#M67564</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-09-18T19:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228448#M67565</link>
      <description>&lt;P&gt;I looked at it but was not looking to add any apps that weren't built by splunk or splunk supported. Would I be able to install this app on my local machine and extract the information I would need to compare my data against specific threat lists? &lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2015 20:00:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228448#M67565</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-09-21T20:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228449#M67566</link>
      <description>&lt;P&gt;Yes, that is the whole point; you give it the URL where it can get the threatlist and it does the rest.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2015 07:45:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228449#M67566</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-09-22T07:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228450#M67567</link>
      <description>&lt;P&gt;Sorry I did not make it clear. I have a local copy of splunk with no data I use as my test environment. The real data and infrastructure is what I don't want to install the app on. If it was xml or dashboard logic I could extract it from my local version but because its a command I dont believe it will help me with the real data. &lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2015 12:19:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228450#M67567</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-09-25T12:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228451#M67568</link>
      <description>&lt;P&gt;This is how I would do it (assuming that an existing threat intel field exists, called the-threat-intel-list.csv):&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Upload "Update.csv" into search app &lt;/LI&gt;
&lt;LI&gt;Change permissions on Update to App level&lt;/LI&gt;
&lt;LI&gt;Once App viewable, you will be able to delete Update once done&lt;/LI&gt;
&lt;LI&gt;Craft Splunk search to load in previous threat list, then append on the Update file (assuming updates go on the end) - this will NOT make any permanent changes at this point, merely display the output :
| inputlookup the-threat-list.csv | inputlookup append=t Update.csv
4a. Dedup on certain columns, if desired (quoted only if special characters, such as periods or spaces, in field names) &lt;/LI&gt;
&lt;LI&gt;Inspect search results to ensure columns match up properly (generally not a problem, in Splunk, beware if updating a CSV from python)&lt;/LI&gt;
&lt;LI&gt;When confident list is as desired, write out to file:
| inputlookup the-threat-list.csv | inputlookup append=t Update.csv | dedup [field to dedup if desired] | outputlookup the-threat-list.csv&lt;/LI&gt;
&lt;LI&gt;Inspect file was written as intended:
| inputlookup the-threat-list.csv&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Fri, 25 Sep 2015 12:53:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228451#M67568</guid>
      <dc:creator>sheamus69</dc:creator>
      <dc:date>2015-09-25T12:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228452#M67569</link>
      <description>&lt;P&gt;I did the above but have more questions. The threat list(the-threat-list) does show all the IP's I want to filter out by. So my logic is comparing these ip's in the IP field to a field called IP in my sourcetype firewall for example(checking for hits manually). Would I use the diff command to compare the IP field from the-threat-list to my sourcetype firewall field=IP for any matches? Just not sure how to go about it. I also tried to do the threatlookup command with files that are being pulled down from a url but got no results. &lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2015 19:34:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228452#M67569</guid>
      <dc:creator>santorof</dc:creator>
      <dc:date>2015-09-25T19:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228453#M67570</link>
      <description>&lt;P&gt;HI Ninjas,&lt;/P&gt;

&lt;P&gt;I upload custom threat intelligence. file_name, description,url&lt;BR /&gt;
the threat activity detected notable is triggering successfully against custom threat intelligence that I have upload previously. &lt;BR /&gt;
Now I want to remove those threat intelligence feeds. that threat activity detected should not trigger against  that custom feeds.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 17:05:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228453#M67570</guid>
      <dc:creator>rashid47010</dc:creator>
      <dc:date>2019-04-23T17:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Importing a CSV file as a threat intelligence lookup list, how can I test that this file is being parsed against my data?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228454#M67571</link>
      <description>&lt;P&gt;This anti-open-source bias is silly and severely limiting, but it is your system.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 19:43:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Importing-a-CSV-file-as-a-threat-intelligence-lookup-list-how/m-p/228454#M67571</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-04-23T19:43:37Z</dc:date>
    </item>
  </channel>
</rss>

