Splunk Enterprise Security

Enterprise Security Threat Intelligence - Lookup population?

HeinzWaescher
Motivator

Hi,

I'm starting with ES Threat Intelligence and am wondering, how threat intel data is populated to the KV stores used in the correlation search "Threat Activity Detected".

As a simple example I manually added an entry to local_email_intel (which is of course enabled).
Now I'm expecting the email address to appear in the KV store threatintel_by_email, which is used in the threat matching search for email. But threatintel_by_email is still empty, although I waited for a while for background jobs. I can't find the entered email address in the Threat Artifacts dashboard as well.

What is my mistake here? What kind of background job do we need/wait for to make my entry available for threat detection?

Thanks in advance 🙂

 

Labels (1)
0 Karma

HeinzWaescher
Motivator

It looks like disabling and re-enabling the local_email_intel source via the management interface does the trick. But I don't think this should be the way to go 🙂

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

🍂 Fall into November with a fresh lineup of Community Office Hours, Tech Talks, and Webinars we’ve ...

Transform your security operations with Splunk Enterprise Security

Hi Splunk Community, Splunk Platform has set a great foundation for your security operations. With the ...

Splunk Admins and App Developers | Earn a $35 gift card!

Splunk, in collaboration with ESG (Enterprise Strategy Group) by TechTarget, is excited to announce a ...