Threat Intelligence dashboards
The Threat Activity dashboard provides information on threat activity by matching threat intelligence source content to events in Splunk Enterprise.
Use the available dashboard filters to refine the results displayed on the dashboard panels. The filters do not apply to key security indicators.
|Threat Group||A named group or entity representing a known threat, such as a malware domain.|
|Threat Category||A category of threat, such as advanced persistent threat, financial threat, or backdoor.|
|Search||Used for searching on a value related to fields: Destination, Sourcetype, Source, Threat Collection, Threat Collection Key, Threat Key, Threat Match Field, and Threat Match Value.|
|Time Range||Select the time range to represent.|
|Key Indicators||Displays the metrics relevant to the dashboard sources over the past 48 hours. Key indicators represent summary information, and appear at the top of the dashboard. See Key indicators in Splunk Enterprise Security.|
|Threat Activity Over Time||Displays the count of events by all threat collections over the selected time. The drilldown opens a search with the selected threat collection and scoped to the selected time frame. To review the threat collections, see Supported types of threat intelligence in Splunk Enterprise Security in Administer Splunk Enterprise Security.|
|Most Active Threat Collections||Displays the top threat collections by event matches over the selected time, with a sparkline representing peak event matches. The drilldown opens a search with the selected threat collection.|
|Most Active Threat Sources||Displays the top threat sources over the selected time by event count matches. The drilldown opens a search with the selected threat source.|
|Threat Activity Details||Displays a breakout of the most recent threat matches. Use the event selection box Threat Activity Details with the Advanced Filter option to: |
The reports in the Threat Activity dashboard use fields in the Threat_Intelligence data model. Relevant data sources include threat source event matches in the
threat_activity index along with the associated threat artifacts. See Troubleshoot dashboards in Splunk Enterprise Security in Administer Splunk Enterprise Security.
The Threat Artifacts dashboard provides a single location to explore and review threat content sourced from all configured threat download sources. It provides additional context by showing all threat artifacts related to a user-specified threat source or artifact.
The dashboard offers multiple selection filters and tabs to isolate the threat content.
Begin by changing the Threat Artifact to select from available threat artifact types.
|Threat Artifact||A collection of objects grouped by the threat collection, such as network, file, and service.|
Other available filters will change depending on your selection.
|Threat Artifact selection||Filter by Text: (*) wildcard defaulted||Filter by Drop-down|
|Threat ID||Malware Alias, Intel Source ID, and Intel Source Path||Threat Category, Threat Group|
|Network||IP, Domain||HTTP. Select from: Referrer: User Agent, Cookie, Header, Data, or URL and add a string to search.|
|File||File Name, File Extension, File Path, and File Hash|
|Registry||Hive, Path, Key Name, Value Name, Value Type, and Value Text|
|Service||Name, Descriptive Name:, Description:, and Type|
|User||User, Full Name, Group Name, and Description|
|Process||Process, Process Arguments, Handle Names, and Handle Type|
|Certificate||Serial Number, Subject, Issuer, Validity Not After, and Validity Not Before|
|Address, Subject, and Body|
Use the tabs to review threat source context:
|Threat Overview||Endpoint Artifacts, Network Artifacts, Email Artifacts, Certificate Artifacts|
|Network||HTTP Intelligence, IP Intelligence, Domain Intelligence|
|Endpoint||File Intelligence, Registry Intelligence, Process Intelligence, Service Intelligence, User Intelligence|
The Threat Artifacts dashboard references fields in the threat collection KVStore. Relevant data sources include threat sources such as STIX and OpenIOC documents.
This dashboard references data from the Threat Intelligence KVStore collections. Without the applicable data, the dashboard panels will remain empty. To determine why data is not displaying in the dashboard, follow these troubleshooting steps.
- Confirm that the inputs are properly configured in the Threat Intelligence Downloads and Threat Intelligence Manager pages. Those inputs are responsible for ingesting data from the threat sources and placing it into the KVStore collections.
- Use the Threat Intelligence Audit dashboard panel Threat Intelligence Audit Events to review log entries created by the modular inputs.
For more, see Troubleshoot dashboards in Splunk Enterprise Security in Administer Splunk Enterprise Security.
Protocol Intelligence dashboards
Web Intelligence dashboards
This documentation applies to the following versions of Splunk® Enterprise Security: 4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 5.0.0, 5.0.1, 5.1.0, 5.1.1, 5.2.0, 5.2.1, 5.2.2, 5.3.0, 5.3.1, 6.0.0, 6.0.1, 6.0.2, 6.1.0, 6.1.1, 6.2.0, 6.3.0 Cloud only, 6.4.0, 6.4.1, 6.5.0 Cloud only, 6.5.1 Cloud only, 6.6.0, 6.6.2