Splunk Enterprise Security

Sonultra TAXII: How to add Threat Intelligence to my Splunk ES via the HISAC taxii discovery service?

michaeltayo
Explorer

I am trying to add Threat Intelligence to my Splunk ES via the HISAC taxii discovery service

I have set up the Intelligence Download with configs:
TYPE: taxii
URL: https://members.nhisac.org/taxii-discovery-service

POST ARGUMENT: collection="" earliest="-90d" taxii_username=""
taxii_password="PASSWORD"

In the Threat Intel Audit tab, the status is "TAXII feed polling starting" and has not changed.

Does anyone know if this is the correct way to do this?

Labels (2)

comrumino
Engager

Splunk is moving from using Stix/Taxii to using the TA TruStar. To get intel feeds, such as H-ISAC, the TruStar TA is the way to go. 
https://www.trustar.co/splunk-siem-and-trustar
https://splunkbase.splunk.com/app/5542/

I hope this helps!

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Community Feedback

We Want to Hear from You! Share Your Feedback on the Splunk Community   The Splunk Community is built for you ...

Manual Instrumentation with Splunk Observability Cloud: Implementing the ...

In our observability journey so far, we've built comprehensive instrumentation for our Worms in Space ...