Security

Optiv Threat Intel fields

zigity12
Engager

Hello friends.

I've recently installed optiv threat intel on my splunk indexer on my home network - trying to make it use logs from my DNS (Pihole).

I currently just get this: alt text

Here's an example of a log entry in how I have the fields defined.

alt text

I'm trying to ascertain if I've set it up incorrectly, or if I just don't have any malicious activity on my network and "no news is good news."

I'm relatively new to splunk - but I can run searches for top and rare for the dest_ip field - so I at least think I have the fields setup correctly. Any light someone could cast on this would be much appreciated.

Tags (1)
0 Karma
1 Solution

derekarnold
Communicator

App author here,
You need to install the companion app, Optiv_TA_threat. See the included Readme pdf for detailed instructions. Post here if you get stuck. The companion app is the one that actually pulls the feeds from the internets.

View solution in original post

derekarnold
Communicator

App author here,
You need to install the companion app, Optiv_TA_threat. See the included Readme pdf for detailed instructions. Post here if you get stuck. The companion app is the one that actually pulls the feeds from the internets.

zigity12
Engager

Thanks so much for your reply.

I got the add on app installed - I didn't realize it was required, missed that in the readme.

I'm still sitting on "no results found" - the heart of my question I guess is, is "no results found" code for "it's not working" or is it code for "there's no malicious traffic" (or both?)

Thanks so much for your time.

0 Karma

derekarnold
Communicator

The app pulls the threat feeds down 4x per day. has the app been running that long? also check the troubleshooting tab

0 Karma

zigity12
Engager

That must have been it! The splash page is populating with data now. Thanks so much Derek!

One last question if you have the time - alt text

The large dashes above each section are where an alert would be displayed if an ip or domain shows up in my DNS logs, right?

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...