How to download the SIEM connector for Splunk

 

Kaspersky Threat Data Feeds

 
 
 
 

How to download the SIEM connector for Splunk

Back to article list
2019 Feb 07 ID: 13853
 
 
 
 

Kaspersky CyberTrace for Splunk (SIEM connector) allows you to check URLs, file hashes, and IP addresses contained in events that arrive in Splunk. The URLs, file hashes, and IP addresses are checked against threat data feeds from Kaspersky Lab, or from other vendors or sources loaded to CyberTrace. During the matching process, Kaspersky CyberTrace determines the indicator category and generates an event supplemented with actionable context.

To install SIEM connector for Splunk:

  1. Download Kaspersky CyberTrace for Splunk. 
  2. Follow the instructions in the product documentation to install the package. 

Download Kaspersky CyberTrace for Splunk:

  • The .msi file for Windows can be downloaded here.
  • The .zip file for Windows can be downloaded here.
  • The .rpm file for Linux can be downloaded here.
  • The .deb file for Linux can be downloaded here.
  • The .tgz file for Linux can be downloaded here.

Please note that SIEM connector for Splunk has been tested with Splunk 6.5 and later. 

 
 
 
 
Was this information helpful?
Yes No
Thank you
 
 
 

 
 

How can we improve this article?

Your feedback will be used for content improvement purposes only. If you need assistance, please contact technical support.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.

OK