Splunk Enterprise Security

Correlating Carbon Black Watchlist Alerts on Splunk Enterprise Security

akulg
Engager

Hi, our company does not yet have Splunk enterprise security, but we are considering getting it. Currently, our security posture includes a stream of EDR data from Carbon Black containing the EDR events and watchlist hits. We want to correlate the watchlist hits to create incidents. Is this something Splunk Enterprise Security can do right out of the box, given access to the EDR data? If so, how can do we do this in the Splunk Enterprise Security dashboard?

 

Labels (2)
0 Karma

Bhumi
Path Finder

Hello @akulg 

If I understand your requirement correctly, you're looking to correlate Carbon Black data which will be indexed in Splunk with the  watchlist (threat feeds). If there’s a match, an incident should be created. And looking for a way  to  implementing this functionality within Enterprise Security. 

Yes, there is a framework in the ES known as THREAT INTELlIGENCE which will help you to 
 enhance your security monitoring by integrating threat intelligence into your deployment, allowing you to correlate indicators of suspicious activity and known or potential threats with your events. This addition provides valuable context for your analysts' investigations.

Splunk Enterprise Security supports various types of threat intelligence, enabling you to incorporate your own as well.

Please refer the below doc for more information. 
https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_intelligence/Using_threat_intelligenc...

Let me know if you have any further questions!!

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Thanks for the Memories! Splunk University, .conf25, and our Community

Thank you to everyone in the Splunk Community who joined us for .conf25, which kicked off with our iconic ...