Configure threat intelligence sources in Splunk Enterprise Security
Configure threat intelligence sources to get intelligence data in Splunk Enterprise Security. You can configure sources by activating the intelligence sources included with Splunk Enterprise Security, or by manually adding new sources and then activating them.
Activate an intelligence source
-
(Optional) Set up firewall rules for the new source. You might want to use a proxy server to collect the intelligence before forwarding it to Splunk Enterprise Security and allow the IP address for the proxy server to access Splunk Enterprise Security. The IP addresses for these sources can change. See Configure proxy server settings in Splunk Enterprise Security.
-
Add the new source. See Add new threat intelligence sources in Splunk Enterprise Security.
The following threat intelligence sources are activated by default:
- Mozilla Public Suffix List
- MITRE ATT&CK Framework
- ICANN Top-level Domains List
- In Splunk Enterprise Security, select Configure and then Threat intelligence.
- From the table on the Data sources page, select a source that you want to activate.
- For a Cloud source, do the following:
- For a Native source stored in the Splunk Enterprise Security application, do the following:
Deactivate an intelligence source
- In Splunk Enterprise Security, select Configure and then Threat intelligence.
- From the table on the Data sources page, select a source that you want to deactivate.
- For a Cloud source, select Deactivate.
- For a Native source stored in the Splunk Enterprise Security application, select the toggle switch to Deactivate the source.
- Select Save changes.