Splunk Enterprise Security

Threat List Activity dashboard?

vanadisc
Engager

Hello,

As the title suggests, I have some general questions regarding the threat list activity dashboard.

Q1: Where does it get input from?
Q2: Does it use a database? if so, what are they?
Q3: How does it correlate data?

any other detailed information (scenarios..etc) about this dashboard are appreciated

I apologize beforehand if my questions sound very basic. I'm just a beginner who's trying to get a better understanding of splunk's workings, and the documentation provided for this specific dashboard is not enough in my opinion.

thank you in advance!

mdessus_splunk
Splunk Employee
Splunk Employee

The threat lists input comes from various sources. You can view or modify them from Configure / Data enrichment / Threats lists.
It is based on lookups (try | inputlookup threatlist_lookup_by_cidr for example), so stored in files (all sources are merged in one or several lookups), and for the correlation, it is based on lookup functions.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...