Splunk® Enterprise Security

Administer Splunk Enterprise Security

Configure proxy server settings in Splunk Enterprise Security

Configure a proxy in Splunk Enterprise Security to create threat lists and extract and customize intelligence data.

If your Splunk Enterprise Security deployment receives data from threat intelligence platforms through a proxy, you must apply the same proxy server settings to all the [threatlist] stanzas in the inputs.conf configuration file. Use Splunk Enterprise Security to configure the proxy server settings for all [threatlist] stanzas.

The proxy settings only impact data source integrations present within the Splunk Enterprise Security app. Data source integrations from the threat intelligence management (cloud) system provide data directly to the data source platforms.

Follow these steps to configure a proxy:

  1. In Splunk Enterprise Security, select Configure and then Intelligence.
  2. In the Threat intelligence management section, select Proxy and parser settings.
  3. Use the following table to configure the proxy server settings:
    Setting Description Example
    Proxy server Proxy server IP address The proxy server cannot be a URL. For example, 10.10.10.10 or server.example.com.
    Proxy port Port to access the proxy server 8956
    Proxy user Proxy user credential for the proxy server. Only basic and digest authentication methods are supported.
    The user must correspond to the name of a credential stored in Credential management. This is a required field.
    Proxy user realm Splunk Enterprise Security secure storage realm of the corresponding proxy user. Used to build the ID of the Splunk Enterprise secure storage array. (Optional) This value is different from remote site credentials.

See also

For more information on threat intelligence sources, see the product documentation:

Last modified on 26 September, 2024
Overview of threat intelligence in Splunk Enterprise Security   Configure threat intelligence sources in Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 8.0.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters