Splunk Enterprise Security

Sonultra TAXII: How to add Threat Intelligence to my Splunk ES via the HISAC taxii discovery service?

michaeltayo
Explorer

I am trying to add Threat Intelligence to my Splunk ES via the HISAC taxii discovery service

I have set up the Intelligence Download with configs:
TYPE: taxii
URL: https://members.nhisac.org/taxii-discovery-service

POST ARGUMENT: collection="" earliest="-90d" taxii_username=""
taxii_password="PASSWORD"

In the Threat Intel Audit tab, the status is "TAXII feed polling starting" and has not changed.

Does anyone know if this is the correct way to do this?

Labels (2)

comrumino
Engager

Splunk is moving from using Stix/Taxii to using the TA TruStar. To get intel feeds, such as H-ISAC, the TruStar TA is the way to go. 
https://www.trustar.co/splunk-siem-and-trustar
https://splunkbase.splunk.com/app/5542/

I hope this helps!

0 Karma
Get Updates on the Splunk Community!

Alpha Launch: AI-Assisted Auto-Schematization for CIM

Streamlining Data Onboarding: Announcing the Alpha Release of AI-Assisted Auto-Schematization For many Splunk ...

Enterprise Security(ES) Essentials or Premier? Let's discuss Splunk ES Editions on ...

  Hi everyone, Last year at .conf25, we shared something exciting: Splunk Enterprise Security is evolving ...

[Puzzles] Solve, Learn, Repeat: Advent of Code - Day 5

Advent of CodeIn order to participate in these challenges, you will need to register with the Advent of Code ...