Splunk ES
Last updated
Last updated
Splunk Enterprise Security provides the security practitioner with visibility into security-relevant threats found in today's enterprise infrastructure. Splunk Enterprise Security is built on the Splunk operational intelligence platform and uses the search and correlation capabilities, allowing users to capture, monitor, and report on data from security devices, systems, and applications. As issues are identified, security analysts can quickly investigate and resolve the security threats across the access, endpoint, and network protection domains.
Before initiating the installation process, it's important to verify if your data is CIM-compliant (normalization process) for all sources using multiple methods, including:
Required Apps/Addons
& &
Optional
Configure → General settings
Distributed Configuration Management
Domain Analysis
Large Email Threshold
Configure Microsoft 365 index
Top 1 million site source
Configure → All configurations → Data → CIM Setup
Configure → All configurations → Data → Assets and identities
Asset Lookups → New → LDAP Lookup
Identity Lookups → New → LDAP Lookup
Correlation Setup → Enable for all sourcetypes
Configure → Threat intelligence:
Threat intelligence sources
Proxy and parser settings → Parse domain from URL
Security Content → Content Management
Type: Event-based detection
Security Content → Security use case library
Search Macros
o365-index-value
aws-index-value
linux_auditd
linux_hosts
sysmon
List all ES Correlation Searches
Uninstall Splunk ES (Linux)
Troubleshoot
Docs
Lantern