Splunk Search

How to create a correlation search based on data provided by SANS Threat Intelligence?

Kitag345
Explorer

 

Hello,

I would like to request guidance on how to create a correlation search based on data provided by SANS Threat Intelligence from https://isc.sans.edu/block.txt

The malicious IPs from "block.txt" are updated regularly. How can my correlation search track that change in real-time? What queries to use?

Notes: The SANS Threat Intel has already been enabled. 

 

 

Labels (1)
Tags (1)
0 Karma
1 Solution

nyc_jason
Splunk Employee
Splunk Employee

consider using the PAVO Getwatchlist add-on, then you can do this:

nyc_jason_0-1676655724605.png

Or for performance, schedule the search every 30min, and pipe it to a lookup. then run your search using the lookup for matches.

View solution in original post

nyc_jason
Splunk Employee
Splunk Employee

consider using the PAVO Getwatchlist add-on, then you can do this:

nyc_jason_0-1676655724605.png

Or for performance, schedule the search every 30min, and pipe it to a lookup. then run your search using the lookup for matches.

Get Updates on the Splunk Community!

Index This | Divide 100 by half. What do you get?

November 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

❄️ Celebrate the season with our December lineup of Community Office Hours, Tech Talks, and Webinars! ...

Splunk and Fraud

Watch Now!Watch an insightful webinar where we delve into the innovative approaches to solving fraud using the ...