Anomali Reports: Analyse Splunk Events To See If You’ve Been Breached

Anomali Reports analyses your companies IT activity against millions of Indicators of Comprimise (IOCs) stored in Threatstream. Each week a Threat Analysis report is automatically generated for you to review. Reports are delivered via web and email and they highlight the most critical security incidents, alerting you to potential security breaches and attacks in process.

You can use Anomali Reports with lots of data sources with Anomali Link. We also have a number of SIEM integrations including Arcsight, QRadar, and Splunk too. In this post I’ll show you how to use Anomali Reports with Splunk in 3 simple steps.

1. Sign up for a free Anomali Reports account

You can sign up for a free account at: https://reports.anomali.com/registration

Once you’ve signed up you’ll be assigned a username and API key.

2. Download and configure the Anomali Link Splunk App

You can download the latest version of the Anomali Link Splunk App from: https://splunkbase.splunk.com/app/3151/

Once downloaded, install the app on a standalone Splunk Search Head in the normal way. Once installed on Splunk you will be prompted to configure the settings for the app.

Select “Anomali Reports” as the destination.

If you are a Splunk Enterprise Security customer or a Anomali Threatstream Customer (with the Threatstream Splunk App installed) you can use the relevant data model. Otherwise select “Do not use any data model”. Selecting this option relies on your Splunk events being tagged with either tag=web or tag=network. Read more about configuring Splunk tags here.

You must then add the “Username” and “API Key” generated during step 1 when you created your account. Leave the other fields as the defaults.

Finally, test the connection between Splunk and Anomali Reports works correctly by selecting “Check Anomali Link Status” on https://reports.anomali.com/report-download . You should see a success message like the screenshot above.

3. Your first report, of many

Splunk events will now be sent to Anomali Reports for matching against known threats. All you need to do is sit tight, we’ll email you when your report is ready. You’ll be able to view it online or download it in PDF and CSV formats to share.

Your Threat Analysis Report will contain potential threats we’ve identified within your environment including:

  • Malware domains and hashes
  • C2 domains
  • DDOS IPs
  • + much more

Need some help?

If you have any questions or suggestions about Anomali Reports, please do let me know via the Anomali Forum: https://forum.anomali.com/

If you’re not a Splunk user, sign up for a free Anomali Reports account for detailed instructions on connecting to other data sources and SIEM integrations: https://reports.anomali.com/registration


Originally published at www.anomali.com.