• Skip to primary navigation
  • Skip to content
  • Skip to footer
Security Content Security Content
  • Detections
  • Analytic Stories
  • Playbooks
  • Blog
  • About
    • Type
      • Investigation
      • Response
    • Use Case
      • Endpoint
      • Enrichment
      • Phishing
    • D3fend Technique Category
      • Credential Eviction
      • File Analysis
      • File Eviction
      • Identifier Analysis
      • Message Analysis
      • Network Isolation
      • Restore Access
      • Restore Object
    • Soar App
      • AD LDAP
      • AWS IAM
      • Azure AD Graph
      • Carbon Black Response
      • Cisco Umbrella
      • CrowdStrike OAuth API
      • Cylance
      • Falcon Host API
      • G Suite for GMail
      • Jira
      • LDAP
      • MS Graph for Office 365
      • Palo Alto Networks Firewall
      • Panorama
      • Phantom
      • PhishTank
      • Reversing Labs
      • SMTP
      • SSH
      • ServiceNow
      • Splunk
      • Splunk Attack Analyzer Connector for Splunk SOAR
      • Threat Grid
      • TruSTAR
      • VirusTotal
      • VirusTotal v3
      • WildFire
      • Windows Defender ATP
      • Windows Remote Management
      • Zscaler
      • urlscan.io

    Splunk

    Name SOAR App D3FEND Use Case
    Hunting Splunk, Reversing Labs, Carbon Black Response, Threat Grid, Falcon Host API    
    Log4j Splunk Investigation Splunk    
    Risk Notable Import Data Splunk    
    Risk Notable Preprocess Splunk    
    Splunk Identifier Activity Analysis Splunk Identifier Activity Analysis Enrichment
    Splunk Message Identifier Activity Analysis Splunk Identifier Activity Analysis Phishing
    Splunk Notable Related Tickets Search Splunk   Enrichment
    • Twitter
    • GitHub
    • Feed
    © 2024 Splunk Threat Research Team (STRT). Powered by Jekyll & Minimal Mistakes.