November 18, 2019 by Ed Smith
Need to quickly narrow down Zeek logs from a mountain, to a hill, to a handful?
Want to avoid hours of work mapping Corelight key-value pairs for ingest?
Our recently updated Corelight App for Splunk may be just what you’re looking for. It accelerates SOC workflows by providing guided hunting workflows using dashboards and filters that enable analysts to quickly narrow down and pivot across Zeek logs. It’s also a great demonstration of how Zeek data sent into the Splunk platform can be leveraged to find encrypted malicious traffic, DNS exfiltration, hidden malware and other network risks.
In addition we’ve released an updated technology add-on (TA) that automatically normalizes Corelight security data for easier ingest into the Splunk platform. The TA can be used standalone or in conjunction with the new app — a tool worth checking out if you’re a Corelight + Splunk shop.
The Corelight App for Splunk works with Corelight sensors as well as open source Zeek. The app requires the above mentioned TA for Corelight data, or the Splunk Add-on for open source Zeek data. You can download the app and either TA for free on Splunkbase.
To learn more about Corelight’s integration with Splunk software and how it helps incident responders and threat hunters work faster and more effectively, please read our joint solution data sheet, watch our webinar on Threat Hunting in Splunk with Zeek or check out the screenshots of the app below:
Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.
Find IOCs from external sources matched in network traffic.
See situations flagged by the Notice policy for further investigation.
Log hunting workflow
Accelerate your hunt by narrowing down many logs to only the logs that matter.
Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.
Corelight egress monitor
Find risky North/South user connections to weak SSL versions.
Ed Smith - Senior Product Marketing Manager, Corelight