Splunk® Mission Control

Investigate and Respond to Threats in Splunk Mission Control

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Get started with Threat Intelligence Management in Splunk Mission Control

Threat Intelligence Management is a cloud-native system that provides threat intelligence data to Splunk Mission Control. With Threat Intelligence Management, you can detect, manage, and assess threats by enriching incident data.

Enriching incident data is a process of correlating internal data with intelligence sources and providing additional context to observables. An observable is a piece of data indicating that an event has occurred or been observed on a computer system, network, or other digital entity. Threat Intelligence Management records observables, which can be malicious or benign, as part of an incident. Using this additional context, such as the identity of an attacker, their capabilities and motivation, and indicators of compromise (IOCs), Threat Intelligence Management assigns priority scores to observables. You can investigate the risk posed by observables using priority scores.

By investigating risk with threat intelligence data, you can better defend against threats, such as advanced persistent threats (APTs) and zero-day threats, and make more informed decisions for your security operations center (SOC).

Access intelligence data

You can investigate observables in the Intelligence tab of your incident investigation in Splunk Mission Control. To access intelligence data, you must do the following:

  1. Activate intelligence sources. See Activate intelligence source integrations from Splunk Mission Control to import threat intelligence data into Threat Intelligence Management.
  2. Create an intelligence workflow. See Create an intelligence workflow.
  3. Activate the intelligence workflow you want to use. See Activate a threat intelligence workflow.

After you have access to threat intelligence data, you can start managing observables and reviewing their priority scores.

Last modified on 11 March, 2024
PREVIOUS
Use Splunk Mission Control data in Splunk SOAR (Cloud) playbooks
  NEXT
Activate intelligence source integrations from Splunk Mission Control to import threat intelligence data into Threat Intelligence Management

This documentation applies to the following versions of Splunk® Mission Control: Current


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters