About the Splunk Add-on for Bit9 Carbon Black
|Vendor Product(s)||Carbon Black Server (CBS) 4.2+|
The Splunk Add-on for Bit9 Carbon Black allows a Splunk platform administrator to collect notifications and event data in JSON format from Bit9 Carbon Black servers over a pub/sub bus. The add-on collects watchlist hit, feed hit, new binary instance, and binary file upload complete notifications, as well as raw endpoint events. After the Splunk platform indexes the events, you can consume the data using the prebuilt panels included with the add-on. This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security and the Splunk App for PCI Compliance.
Note: This add-on consumes Carbon Black event data from a JSON file. In order to get the Carbon Black event data into JSON format, you must download and run a utility from Bit9.
Download the Splunk Add-on for Bit9 Carbon Black from Splunkbase at http://splunkbase.splunk.com/app/2790.
Discuss the Splunk Add-on for Bit9 Carbon Black on Splunk Answers at http://answers.splunk.com/answers/app/2790.
Source types for the Splunk Add-on for Bit9 Carbon Black
This documentation applies to the following versions of Splunk® Supported Add-ons: released