Installing Splunk Enterprise Security Essentials

Note: This topic focuses on the on-premises installation process of Splunk Enterprise Security Essentials. If you are in a Splunk cloud environment, Splunk products version compatibility matrix manages the installation process. If you are in an on-premises environment, you must be an experienced user capable of installing, configuring, and administering Splunk software to follow the installation process. If you need training on the Splunk platform and Splunk Enterprise Security, see Education Courses for Enterprise Security Customers.
Note: Contact Splunk Support if you want to upgrade to Splunk Enterprise Security Premier from Splunk Enterprise Security Essentials.
If you have Splunk Enterprise Security installed, you can upgrade to a higher version. To upgrade to Splunk Enterprise Security version 8.3 or higher, see the product documentation:
Install Splunk Enterprise Security
  1. Create a backup copy of the pre-upgrade version of Splunk Enterprise Security on your system as a precaution. For more information, see Upgrading Enterprise Security in a search head cluster environment.
  2. Install Splunk Enterprise Security on a single search head or a search head cluster environment. For more information, see Install Splunk Enterprise Security and see Installing Enterprise Security in a search head cluster environment.
  3. Download and deploy technology add-ons on the forwarders bInstalling Enterprise Security in a search head cluster environment ased on your configuration. For more information, see Deploy technology add-ons to Splunk Enterprise Security.
  4. Install and configure the Splunk App for Stream on the Splunk Enterprise Security search head to capture and analyze network traffic data. For more information, see Integrate Splunk Stream with Splunk Enterprise Security.
  5. Configure and deploy custom indexes for event storage. For more information, see Configure and deploy indexes for Splunk Enterprise Security.
  6. Assign users, roles, and capabilities for Splunk Enterprise Security. For more information, see Users and roles for Splunk Enterprise Security and Capability reference for Splunk Enterprise Security.You can also manage custom roles and capabilities in Splunk Enterprise Security. For more information, see Add custom roles and manage capabilities in Splunk Enterprise Security.
  7. Configure data models to populate dashboards and views and provide detection results. For more information, see Configure data models for Splunk Enterprise Security.
Configure Threat Intelligence Management
  1. Determine if Threat Intelligence Management (Cloud) complies with your organizational standards. For more information, see Determining if Threat Intelligence Management (Cloud) complies with your organization’s standards.
  2. Get started with Threat Intelligence Management by configuring data source integrations and threat lists. For more information, see Overview of threat intelligence in Splunk Enterprise Security
Configure Splunk AI Assistant for Security
  1. Choose whether you want to opt out of data sharing for the AI Assistant. See Opt out of data sharing for the AI Assistant in Splunk Enterprise Security
  2. Select between Frontier or Splunk-hosted models for the AI Assistant to use based on your organization's compliance requirements. For more information, see Choose which models the AI Assistant uses in Splunk Enterprise Security.