Splunk Search

How to create a correlation search based on data provided by SANS Threat Intelligence?

Kitag345
Explorer

 

Hello,

I would like to request guidance on how to create a correlation search based on data provided by SANS Threat Intelligence from https://isc.sans.edu/block.txt

The malicious IPs from "block.txt" are updated regularly. How can my correlation search track that change in real-time? What queries to use?

Notes: The SANS Threat Intel has already been enabled. 

 

 

Tags (1)
0 Karma
1 Solution

nyc_jason
Splunk Employee
Splunk Employee

consider using the PAVO Getwatchlist add-on, then you can do this:

nyc_jason_0-1676655724605.png

Or for performance, schedule the search every 30min, and pipe it to a lookup. then run your search using the lookup for matches.

View solution in original post

nyc_jason
Splunk Employee
Splunk Employee

consider using the PAVO Getwatchlist add-on, then you can do this:

nyc_jason_0-1676655724605.png

Or for performance, schedule the search every 30min, and pipe it to a lookup. then run your search using the lookup for matches.

Get Updates on the Splunk Community!

Advanced Splunk Data Management Strategies

Join us on Wednesday, May 14, 2025, at 11 AM PDT / 2 PM EDT for an exclusive Tech Talk that delves into ...

Uncovering Multi-Account Fraud with Splunk Banking Analytics

Last month, I met with a Senior Fraud Analyst at a nationally recognized bank to discuss their recent success ...

Secure Your Future: A Deep Dive into the Compliance and Security Enhancements for the ...

What has been announced?  In the blog, “Preparing your Splunk Environment for OpensSSL3,”we announced the ...