Splunk Enterprise Security

Threat List Activity dashboard?

vanadisc
Engager

Hello,

As the title suggests, I have some general questions regarding the threat list activity dashboard.

Q1: Where does it get input from?
Q2: Does it use a database? if so, what are they?
Q3: How does it correlate data?

any other detailed information (scenarios..etc) about this dashboard are appreciated

I apologize beforehand if my questions sound very basic. I'm just a beginner who's trying to get a better understanding of splunk's workings, and the documentation provided for this specific dashboard is not enough in my opinion.

thank you in advance!

mdessus_splunk
Splunk Employee
Splunk Employee

The threat lists input comes from various sources. You can view or modify them from Configure / Data enrichment / Threats lists.
It is based on lookups (try | inputlookup threatlist_lookup_by_cidr for example), so stored in files (all sources are merged in one or several lookups), and for the correlation, it is based on lookup functions.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...