Deployment Architecture

Add Threat Intelligence to Enterprise Security search head cluster

clarkwh2
Explorer

We have looked at adding some threat intelligence apps to our Enterprise Security instance and have decided that we can consume the information that we are looking for via TAXII feed. The instructions on this page (docs.splunk.com/Documentation/ES/3.3.0/Install/Configureblocklists) lay out how to configure this in Splunk Web but don't provide any instructions on how to add them directly in a conf file which is what you have to do in a search head cluster. So my question is:

Where is the config file to make add these feeds and are there instructions on how to make these changes directly in the conf files?

bluger_splunk
Splunk Employee
Splunk Employee

Hi clarkwh2 --

The conf file used to store TAXII feed configurations is ../local/inputs.conf. An example entry would look like:

[threatlist://<input_name>]
description = TAXII description
disabled = false
interval = 86400
post_args = collection="<taxii_collection>" earliest="-1y" taxii_username="user" taxii_password="pass"
type = taxii
url = <url to taxii discovery service>

Docs pertaining to the available options for this modular input can be found in SA-ThreatIntelligence, under README/inputs.conf.spec

Hope this helps,

~Brian

Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...