How to integrate Kaspersky Threat Data Feels with Splunk

Latest update: September 20, 2022 ID: 13853
 
 
 
 

Kaspersky CyberTrace allows you to check URLs, file hashes, and IP addresses contained in events that arrive in Splunk. The URLs, file hashes, and IP addresses are checked against threat data feeds from Kaspersky Lab, or from other vendors or sources loaded to CyberTrace. During the matching process, Kaspersky CyberTrace determines the indicator category and generates an event supplemented with actionable context.

To install SIEM connector for Splunk:

  1. Download Kaspersky CyberTrace. Find the download files for Kaspersky CyberTrace in this article.
  2. Follow the instructions in the product documentation to install the package.

Please note that SIEM connector for Splunk has been tested with Splunk 8.0 and later. 

 
 
 
 
 
Did you find what you were searching for?
Thank you for your feedback!