How to integrate Kaspersky Threat Data Feeds with Splunk

Latest update: 7 June 2024 ID: 13853
 
 
 
 

Kaspersky offers the two ways of integrating Kaspersky Threat Data Feeds with Splunk:

Kaspersky CyberTrace

Kaspersky CyberTrace allows you to check URLs, file hashes, and IP addresses contained in events that arrive in Splunk. The URLs, file hashes, and IP addresses are checked against Kaspersky Threat Data Feeds or against feeds from other vendors or sources loaded to CyberTrace. During the matching process, the SIEM connector determines the indicator category and generates an event supplemented with actionable context. The detected events are sent back to Splunk.

To install Kaspersky CyberTrace and integrate it with Splunk:

  1. Download the installation file for Kaspersky CyberTrace from this article.
  2. Install Kaspersky CyberTrace.
  3. Configure the integration with Spunk.

Please note that SIEM connector for Splunk has been tested with Splunk 9.0 and later.

Kaspersky Threat Feed Apps for Splunk

Kaspersky Threat Feed Apps for Splunk are the applications that allow to match observables from events received by Splunk against Kaspersky Threat Data Feeds using built-in Splunk capabilities. The process of importing Kaspersky Threat Data Feeds consists of downloading Kaspersky Threat Data Feeds, converting them to CSV format, and importing them to Splunk.

For details, see the following Online Help pages:

To get the TGZ file for Linux, send a request to intelligence@kaspersky.com.

 
 
 
 
 
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.