Splunk SOAR (f.k.a. Phantom)

Example of how to determine if an IP address is malicious with Splunk Phantom?

sloshburch
Splunk Employee
Splunk Employee

Does anyone have examples of how to use Splunk Phantom to determine if an IP address is malicious?

Labels (1)
0 Karma
1 Solution

sloshburch
Splunk Employee
Splunk Employee

The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the Splunk Platform Use Cases manual.

For more information on this and other examples, download the free Splunk Security Essentials app on Splunkbase.


Security teams can use the Splunk Phantom IP Investigate and Report playbook to assess whether an IP address is malicious, and investigate which domains involve that IP address. The playbook uses an IP address to perform a number of investigative steps before it sends you an email notification.

Load data

How to implement: To run the Splunk Phantom IP Investigate and Report playbook, you need a Splunk Enterprise instance from which Phantom can draw data that ingests network communication events.

Although there are several ways to get data into Phantom, this example uses the Phantom App for Splunk on Splunkbase. Verify that the playbook is configured to operate on splunk_events.

Before you run the playbook, verify that Splunk Phantom is receiving data from Splunk Enterprise. Also, verify your asset configurations on the Phantom Asset Configuration page, and that all assets are resolved on the Phantom Resolved Assets page.

Get insights

The Splunk Phantom IP Investigate and Report playbook playbook executes multiple investigative actions to determine if an IP address is malicious, and sends a summary of the output in an email. The playbook will also attempt to find any malicious domains associated with an IP address.

To find the playbook, go to the Phantom main menu, select Playbooks, and search for ip_investigate_and_report.

How to respond: Investigate alerts to get additional context and information about the artifacts surrounding an IP address using the ingested alerts. You can use this data with other playbooks to take action or to automate threat hunting. Consider adding a sandbox action to visit and get further details from any domains discovered. You can also use data from this playbook in Splunk searches.

Help

For more support, post a question to the Splunk Answers community.

View solution in original post

0 Karma

sloshburch
Splunk Employee
Splunk Employee

The Splunk Product Best Practices team helped produce this response. Read more about example use cases in the Splunk Platform Use Cases manual.

For more information on this and other examples, download the free Splunk Security Essentials app on Splunkbase.


Security teams can use the Splunk Phantom IP Investigate and Report playbook to assess whether an IP address is malicious, and investigate which domains involve that IP address. The playbook uses an IP address to perform a number of investigative steps before it sends you an email notification.

Load data

How to implement: To run the Splunk Phantom IP Investigate and Report playbook, you need a Splunk Enterprise instance from which Phantom can draw data that ingests network communication events.

Although there are several ways to get data into Phantom, this example uses the Phantom App for Splunk on Splunkbase. Verify that the playbook is configured to operate on splunk_events.

Before you run the playbook, verify that Splunk Phantom is receiving data from Splunk Enterprise. Also, verify your asset configurations on the Phantom Asset Configuration page, and that all assets are resolved on the Phantom Resolved Assets page.

Get insights

The Splunk Phantom IP Investigate and Report playbook playbook executes multiple investigative actions to determine if an IP address is malicious, and sends a summary of the output in an email. The playbook will also attempt to find any malicious domains associated with an IP address.

To find the playbook, go to the Phantom main menu, select Playbooks, and search for ip_investigate_and_report.

How to respond: Investigate alerts to get additional context and information about the artifacts surrounding an IP address using the ingested alerts. You can use this data with other playbooks to take action or to automate threat hunting. Consider adding a sandbox action to visit and get further details from any domains discovered. You can also use data from this playbook in Splunk searches.

Help

For more support, post a question to the Splunk Answers community.

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...