This TA enables rapid acquisition and parsing of Harpoon Security Event logs and provides integrations into Enterprise Security as well as workflows to enable pivoting and aggregation from other CIM compliant data sources.
This app require Common Information Model (https://splunkbase.splunk.com/app/1621/) installed and configured for worflow functionality
Memory Injection correlation search must be enabled within Enterprise Security for generation of notable events.