May 24, 2017
David Greenwood

Anomali Reports: Analyse Splunk Events To See If You've Been Breached

<p><a href="">Anomali Reports</a> analyses your companies IT activity against millions of Indicators of Comprimise (IOCs) stored in Threatstream. Each week a Threat Analysis report is automatically generated for you to review. Reports are delivered via web and email and they highlight the most critical security incidents, alerting you to potential security breaches and attacks in process.</p><p>You can use Anomali Reports with lots of data sources with Anomali Link. We also have a number of SIEM integrations including Arcsight, QRadar, and Splunk too. In this post I&#39;ll show you how to use Anomali Reports with Splunk in 3 simple steps.</p><p style="text-align: center;"><img alt="" src="" /></p><h3>1. Sign up for a free Anomali Reports account</h3><p><img alt="" src="" /></p><p>You can sign up for a free account at: <a href="" target="_blank"></a></p><p>Once you&#39;ve signed up you&#39;ll be assigned a username and API key.</p><h3>2. Download and configure the Anomali Link Splunk App</h3><p>You can download the latest version of the Anomali Link Splunk App from: <a href="" target="_blank"></a></p><p>Once downloaded, install the app on a standalone Splunk Search Head in the normal way. Once installed on Splunk you will be prompted to configure the settings for the app.</p><p><img alt="" src="" /></p><p>Select "Anomali Reports" as the destination.</p><p><img alt="" src="" /></p><p>If you are a Splunk Enterprise Security customer or a Anomali Threatstream Customer (with the Threatstream Splunk App installed) you can use the relevant data model. Otherwise select "Do not use any data model". Selecting this option relies on your Splunk events being tagged with either tag=web or tag=network. <a href="" target="_blank">Read more about configuring Splunk tags here</a>.</p><p><img alt="" src="" /></p><p>You must then add the "Username" and "API Key" generated during step 1 when you created your account. Leave the other fields as the defaults.</p><p><img alt="" src="" /></p><p>Finally, test the connection between Splunk and Anomali Reports works correctly by selecting "Check Anomali Link Status" on . You should see a success message like the screenshot above.</p><h3>3. Your first report, of many</h3><p><img alt="" src="" /></p><p>Splunk events will now be sent to Anomali Reports for matching against known threats. All you need to do is sit tight, we&#39;ll email you when your report is ready. You&#39;ll be able to view it online or download it in PDF and CSV formats to share.</p><p>Your Threat Analysis Report will contain potential threats we&#39;ve identified within your environment including:</p><ul><li>Malware domains and hashes</li><li>C2 domains</li><li>DDOS IPs</li><li>+ much more</li></ul><h3>Need some help?</h3><p>If you have any questions or suggestions about Anomali Reports, please do let me know via the Anomali Forum: <a href="" target="_blank"></a></p><p>If you&#39;re not a Splunk user, sign up for a free Anomali Reports account for detailed instructions on connecting to other data sources and SIEM integrations: <a href="" target="_blank"></a></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.