Splunk® Enterprise Security

Install and upgrade Splunk Enterprise Security

Acrobat logo Download manual as PDF


This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.
Acrobat logo Download topic as PDF

Configure threat lists

Notable events are produced by the Splunk App for Enterprise Security when traffic to threat-listed sites is detected. Three elements are required for this capability function properly: network traffic data, a correlation search, and a threat list. Traffic from firewall and IDS/IPS systems is matched to threat lists by correlation searches related to each type of network threat. Many threat lists require regular refresh from external sources.

Click Threat Lists under Data Enrichment on the Configure dashboard.

Es-configure threat lists.png

Use the Threat Lists dashboard and the Threat List Settings editor to configure a proxy server for a threat list, to edit an existing threat list, add a new threat list, or change threat list update information.

ES-Threat Lists.png

Threat lists are enabled by default, but won't work until the proxy information is configured for that threat list. When configured, the threat list downloads new information as it is available. If you disable a threat list, it is prevented from downloading any new information. Previously downloaded threat list entries are left in place and will continue to cause notable events to be produced unless the related correlation search is also disabled.

On the dashboard you can click disable next to the threat list name to disable a threat list. Click enable next to a threat list name to enable it again. You can also click clone to copy an existing threat list as a template for another threat list.

Threat list settings

Use Threat Lists to configure the settings for your threat list. Go to Configure > Threat Lists. Click the name of a threat list to view its current settings. The Threat List Settings editor displays the information for the threat list.

ES-Threatlist settings 1.png ES-Threatlist settings 2.png ES-Threatlist settings 3.png

Proxy server set up

Threat lists are enabled by default. You do not have to use a proxy. In a proxy environment, a threat list will not work until you provide proxy server information for it. If your network requires a proxy, you need to specify the proxy information.

To add proxy server information:

1. Go to Configure > Data Enrichment > Threat Lists and click the threat list name.

2. In the Threat List Settings editor, go to the proxy server options section.

ES-Threatlist proxy options.png

3. Enter the server name, port, and user name for your proxy server.

4. Click Save when you are done.

If you do not need a proxy server and wish to remove previously entered configuration, enter blank values into the form fields and click "Save".

All threat lists that are a part of the Splunk App for Enterprise Security are affected by the proxy information entered here.

Add proxy credentials

Use the Threat List Settings editor to add proxy credentials to your Splunk installation. Since a proxy credential may be used for other purposes within the app, it cannot be deleted using the Threat List Settings editor.

  • If you modify only the password associated with a username, the Threat List Settings editor will update the existing credential.
  • If you modify the username or the username and password in combination, the Threat List Settings editor creates a new credential with the new username.
  • If you clear both the username and password in the Threat List Settings editor, the threat list download process will no longer use the proxy credential, but the credential will still exist on the system.

If you are sure that a credential is no longer in use, refer to "DELETE storage passwords" in the REST API Reference, part of the Splunk Enterprise documentation. This manual describes the method Splunk provides to manage securely stored credentials.

Edit a threat list

Use the Threat List Settings editor to modify information about an existing threat list.

To edit a threat list:

1. Go to Configure > Data Enrichment > Threat Lists and click the name of the threat list you want to edit.

2. In the Threat List Settings editor, make changes to the fields describing the threat list.

ES-Threatlist settings 1.png

3. Click Save when you are done.

Note: You need to be an administrator to make these changes.

Enable non-administrators to edit a threat list

As an administrator, make these changes so that non-admin users can edit threat lists.

To allow non-admin users to edit threat lists:

1. Edit metadata/local.meta in both SA-ThreatIntelligence and SplunkEnterpriseSecuritySuite to assign the roles for both of the endpoints "inputs" and "transforms". In the example below, the "power" role is assigned the capabilities necessary to edit threat lists:

[lookups]
access = read : [ * ], write : [ admin,power ]

[transforms]
access = read : [ * ], write : [ admin,power ]

Make the appropriate changes for your deployment in both the inputs and transforms stanzas and save your files.

2. Restart Splunk.

3. Assign the selected role the edit_scripted capability in Settings > Users and Authentication > Roles from Splunk Home.

Add a new threat list

Use the Threat List Settings editor to add a new threat list to your deployment.

To add a new threat list:

1. Go to Configure > Data Enrichment > Threat Lists.

ES-Threat Lists new.png

2. Click New to open the Threat List Settings editor.

3. Enter all the information about your new threat list.

4. Click Save when you are done.

Add a static threat list

You can also add new, regularly updated threat lists. The threat list is a CSV file with the expected format of is ip,description,is_type.

The ip field must be an IPv4 range, even if a single address is intended. Valid examples include:

  * 192.168.1.1-192.168.1.1
  * 192.168.2.0-192.168.2.255

The description field is a free form textual description for this range; it can be the same for all entries in a threat list or it can be unique for each entry. A valid example might be "RFC1918 address".

The is_type field is used to identify this threat list, and should not actually be titled "is_type". For instance, to construct an RFC1918 threat list, the field would be named "is_rfc1918" and each row in the threat list would state "true" for this field.

A completed example:

ip,description,is_rfc1918
192.168.1.1-192.168.1.1,RFC 1918,true
192.168.2.0-192.168.2.255,RFC 1918,true

Place the CSV file in the $SPLUNK_HOME/etc/apps/SA-ThreatIntelligence/lookups directory on the Enterprise Security search head, in order to use it with a correlation search. Each threat list has a corresponding correlation search. See "Create a correlation search for a threat list" in this manual to create the new correlation search.

Some lists, such as the Bogons list, do not need to be regularly updated from an external URL. Create a static list as a CSV file in the format shown.

Note: You can also get additional threat lists from I-BlockList (http://www.iblocklist.com/lists.php).

Create a correlation search for a threat list

When you create a new threat list, you must also create a new correlation search for the threat list. If your new threat list was named "ip_rfc1918.csv", the search string for your new correlation search would look like this:

| `src_dest_tracker` | lookup local=true ip_rfc1918_lookup src OUTPUTNEW src_ip as src_rfc1918_ip,src_is_rfc1918 | lookup local=true ip_rfc1918_lookup dest OUTPUTNEW dest_ip as dest_rfc1918_ip,dest_is_rfc1918 | search dest_is_rfc1918=true OR src_is_rfc1918=true | eval rfc1918_ip=if(dest_is_rfc1918=="true",dest_rfc1918_ip,rfc1918_ip) | eval rfc1918_ip=if(src_is_rfc1918=="true",src_rfc1918_ip,rfc1918_ip) | fields + sourcetype,src,dest,rfc1918_ip

1. Go to Configure > Correlation Searches > New.

2. Enter the search information in the New Correlation Search editor.

3. Paste the search string for your threat list into the Search field of the new correlation search.

4. Save the search.

Decrease threat list frequency

To decrease the frequency of scheduled updates for a threat list, go to Configure > Data Enrichment > Threat Lists. Click on the threat list to edit it. In the "Retry interval" field, increase the time range between updates to decrease the frequency of the updates.

Warning: Do not increase the frequency of the updates (by shortening the time range). You will be blocked from downloading by the threat list vendor.

Last modified on 23 June, 2014
PREVIOUS
Configure the Advanced Filter
  NEXT
Configure data protection

This documentation applies to the following versions of Splunk® Enterprise Security: 3.0, 3.0.1


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters