Use Network Behavior Analytics for Splunk to identify malware and suspicious behavior within your networks. Before installing the application, you should be capturing DNS requests from your name servers or infrastructure, and ideally logging IP network traffic from your firewalls or Splunk Stream.
Install the application within Splunk by browsing to Apps > Manage Apps > Find more apps online, and searching for Network Behavior Analytics, or uploading the package to your Search Head.
Once installed, please follow the configuration and activation steps found within https://docs.alphasoc.com/sources/splunk/.
By default, this application uses the AlphaSOC Analytics Engine running in a secure enclave in Google Cloud Platform to score network traffic and uncover threats. To deploy an on-premise virtual appliance, please contact support@alphasoc.com to receive a package and deployment instructions.
The AlphaSOC Analytics Engine API endpoints and source code are audited annually by NCC Group. We have also published a white paper which details the secure enclave architecture and security controls.
Support is available via email to support@alphasoc.com or by leaving a message via +1 (888) 978-4915. While we respond to most support cases immediately, we aim to respond via email within 2 hours.
This release adds support for indexing of Sigma alerts as type=alert_raw
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.