Splunk Search

How to create a correlation search based on data provided by SANS Threat Intelligence?

Kitag345
Explorer

 

Hello,

I would like to request guidance on how to create a correlation search based on data provided by SANS Threat Intelligence from https://isc.sans.edu/block.txt

The malicious IPs from "block.txt" are updated regularly. How can my correlation search track that change in real-time? What queries to use?

Notes: The SANS Threat Intel has already been enabled. 

 

 

Labels (1)
Tags (1)
0 Karma
1 Solution

nyc_jason
Splunk Employee
Splunk Employee

consider using the PAVO Getwatchlist add-on, then you can do this:

nyc_jason_0-1676655724605.png

Or for performance, schedule the search every 30min, and pipe it to a lookup. then run your search using the lookup for matches.

View solution in original post

nyc_jason
Splunk Employee
Splunk Employee

consider using the PAVO Getwatchlist add-on, then you can do this:

nyc_jason_0-1676655724605.png

Or for performance, schedule the search every 30min, and pipe it to a lookup. then run your search using the lookup for matches.

Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...