

Common open source threat feeds including phishtank, zeus blacklists.Threat Intelligence feeds (inside DA-ESS-ThreatIntelligence directory).MaxMind GeoIP ASN IPv4/IPv6 database (Only support old database format).alexa_top_one_million_sites (retired and no maintenance).cisco_top_one_million_sites (Cisco Umbrella 1 Million).Non-Threat Intelligence feeds (Log enrichment feeds or other feeds useful for use case development and investigation inside SA-ThreatIntelligence directory):.

In fact, KV Store is key-value pair stored in MongoDB, which can be retrieved via inputlookup command.īy default, Splunk Enterprise Security comes with 2 main feed types: If this option is enabled, Splunk will further process the feed and save into Threat collection KV store. Then, we will further check the detail configuration page, and notice the “ Is Threat Intelligence” option. Some of these feeds are disabled by default. Now, let’s take a look of default threat intelligence feed by navigating Enterprise Security -> Configure -> Data Enrichment-> Intelligence Downloads. As a result of Splunk Enterprise Security app installation, there are 2 different nf which can be located in DA-ESS-ThreatIntelligence and SA-ThreatIntelligence directory.
#SPLUNK SA CIM DOWNLOAD#
Manager Stage 1 – download feedsįirstly, manager will download feeds ( including local threat intel) defined in nf based on the configured interval and store it into $SPLUNK_DB/modinputs/threatlist directory. In short, Threat intelligence manager is a python script located at DA-ESS-ThreatIntelligence/bin/threat_intelligence_manager.py.
