icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading ThreatQuotient Add-on for Splunk
SHA256 checksum (threatquotient-add-on-for-splunk_303.tgz) f43f6dabcfb18f6e9b059e1c21df0b0a34c264b1c16c840a7099e87632f87faf SHA256 checksum (threatquotient-add-on-for-splunk_302.tgz) 9b13146f080450f6cbd36f9df6a58d81af3061677bb41122fdb5ba5c1b5d53a8 SHA256 checksum (threatquotient-add-on-for-splunk_301.tgz) 0f6142d8e10ed594adb3d4bc0c6728e0a7476f862db15c75865a75455bb06b24 SHA256 checksum (threatquotient-add-on-for-splunk_300.tgz) 7c02cbf6db5b02432fd95a916c0fc54b5ac2149b0abdfc592e4f08d5d3a215c4 SHA256 checksum (threatquotient-add-on-for-splunk_280.tgz) 64f5b2d6a616c3e6d78a4a691e5218f9aa8ae202b6d66c5118566a586cc8513a SHA256 checksum (threatquotient-add-on-for-splunk_270.tgz) 470d6c4958c7a6377ede20e0e15f0c863fcddea4c5b05b507d58af604518e09f SHA256 checksum (threatquotient-add-on-for-splunk_260.tgz) 829e2947487f4da31b9226004702644eee53cafb76a7d9fc49c9def7b9d2f1bf SHA256 checksum (threatquotient-add-on-for-splunk_251.tgz) 16798eb072fa34af4e2a45399fb9c71d0d5dcfb3abb28f4a2b534fbd1a10fd03 SHA256 checksum (threatquotient-add-on-for-splunk_250.tgz) 7d9e62b3fa3d0fc147d6344e3dc2dd3fe3d6c66eda6a2ce2f1037c15cd771d41 SHA256 checksum (threatquotient-add-on-for-splunk_241.tgz) a33a9bdfe21b48daef32384b8b4f8b4602d199d105bfbf49c51953127d1ed62d SHA256 checksum (threatquotient-add-on-for-splunk_240.tgz) abc2733d9f9ae3a52def2fef05d5deb0e440f129eb313ef82b77f1882720defb SHA256 checksum (threatquotient-add-on-for-splunk_230.tgz) 37f99db36555b5bd0697bb06dc2d3c98ea32f3ebdedf6917ce7bb76e184e5b2a SHA256 checksum (threatquotient-add-on-for-splunk_220.tgz) 7c8bb418c9ef6cee309032b5c40c3cff1c60db1fa91bc3239343b451bd426a2c SHA256 checksum (threatquotient-add-on-for-splunk_210.tgz) a7c518391bc6f3c70af2719642a16601c356641c8c29cec4ad23a08214f10af8 SHA256 checksum (threatquotient-add-on-for-splunk_200.tgz) 8387e70300c697a7bd62a5a6f4e876257a655c8acd9b9707ad879e4142733f28 SHA256 checksum (threatquotient-add-on-for-splunk_112.tgz) 4580ced2f10c469aaad9f771a4d06ce51ab0b8b78002164aa8cdc4a8b996a17b SHA256 checksum (threatquotient-add-on-for-splunk_111.tgz) ca061f0eaa0a77571123178539115c7d554ae06b4391e2554a0f321be74eab3e SHA256 checksum (threatquotient-add-on-for-splunk_110.tgz) 608c09231eeecae3035bcb2b2cb6b9544abcf6ab39b26bc161e3e76b79e554dc SHA256 checksum (threatquotient-add-on-for-splunk_101.tgz) 2144d96e754ea8f8365714767724ef73929c380a42021aed88496cfe0067dd29 SHA256 checksum (threatquotient-add-on-for-splunk_100.tgz) 1fc6d2efbf64b6c10e2e1a7596fc347aff5e7e8c66436a745c4496f0473e27b5
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

ThreatQuotient Add-on for Splunk

Splunk Cloud
Overview
Details
The new ThreatQuotient App for Splunk improves on our previous capability while incorporating feedback collected from our customers around functionality and deployability.

Note: The new ThreatQuotient Add-on for Splunk requires the ThreatQuotient App for Splunk as well as ThreatQ version 5.11 or later.

ThreatQuotient Splunk Support Documentation
See the Splunk Documentation located on the ThreatQuotient Help Center for more information.

https://helpcenter.threatq.com/Integration_Documentation/app/Splunk.htm

Functionality includes:

Ingestion of ThreatQ Data into Splunk
Enable users to customize what data is ingested by leveraging ThreatQ exports and Splunk input filters. Customization continues for advanced users with the ability to modify leveraged indexes and Splunk saved searches that drive the ThreatQuotient App for Splunk to meet the needs of their environment.

Matching of Splunk Events with ThreatQ Indicators
Provide context on possible malicious activity by matching Splunk Events with ThreatQ indicators. Matching is customizable by ThreatQ indicator status and score to meet the differing needs of customer environments and workflows.

Reporting of Matches in Splunk back to ThreatQ as Sighting Events
Sighting events in ThreatQ will show indicator matches from Splunk and will be grouped by indicator.

Workflow Actions
Users can modify ThreatQ data based on any indexed indicators within Splunk.

Workflow actions include:
- ThreatQ: Add Indicator
- ThreatQ: Update Indicator Status
- ThreatQ: Lookup Indicator
- ThreatQ: Mark as False Positive
- ThreatQ: Mark as True Positive

Note: Support for ingesting ThreatQ data into Splunk Enterprise Security will be leveraged in the additional workflows provided within that application.

Deployability

The ThreatQuotient App for Splunk has been re-designed to scale to our customers' growing needs, supporting installations in Splunk deployments of all sizes.

Release Notes

Version 3.0.3
Sept. 9, 2025

ThreatQ Add-on 3.0.3
- Release Notes: Upgraded Splunk AoB version to v4.5.0.

Version 3.0.2
July 29, 2025

ThreatQ Add-on 3.0.2
- Release Notes: Added compatibility for Splunk 10.
- Build Link: https://drive.google.com/file/d/1J6kxG8fhaba5q0ZMbMK2wFXaEEETc-gQ/view?usp=drive_link

Compatibility Matrix:
- Browser: Google Chrome, Mozilla Firefox
- OS: Platform Independent
- Splunk Enterprise version: 10.0.x, 9.4.x, 9.3.x, 9.2.x and 9.1.x
- Supported Splunk Deployment: Splunk Cluster, Splunk Standalone, and Distributed Deployment

Version 3.0.1
May 27, 2025

ThreatQ Add-on 3.0.1
- Fixed the data format causing issues for dashboard panels.

Compatibility Matrix:
- Browser: Google Chrome, Mozilla Firefox
- OS: Platform Independent
- Splunk Enterprise version: 9.4.x, 9.3.x, 9.2.x and 9.1.x
- Supported Splunk Deployment: Splunk Cluster, Splunk Standalone, and Distributed Deployment

Version 3.0.0
Feb. 19, 2025

3.0.0
- Resolved cloud compatibility issues.
- Resolved a data case sensitivity issue.
- Added support for Splunk Enterprise and Cloud versions 9.3.x and 9.4.x.
- Updated the minimum ThreatQ version to 5.11.0.

Version 2.8.0
July 25, 2024

ThreatQ Add-on 2.8.0
- Release notes
- Upgraded Add-on Builder framework version to 4.2.0
- Fixed Splunk connectivity issues by replacing the session key with credentials and requests library

Version 2.7.0
Nov. 15, 2023

Upgraded Add-on Builder framework version to 4.1.3.

Version 2.6.0
May 23, 2023
  • Moved “Alert Actions” and “Workflow Actions” to the ThreatQuotient App for Splunk
  • Restricted initial data collection to last 90 days
  • Removed usage of Proxy while checking KVStore status
  • Removed the “Verify SSL Certificate” checkbox from the Configuration page. Navigate to the $SPLUNK_HOME/etc/apps/TA- threatquotient-add-on/bin/threatq_const.py and change VERIFY_SSL to False if certificate validation is not required.
Version 2.5.1
Jan. 31, 2023
  • minor bug fix
Version 2.5.0
May 17, 2022

ThreatQ Splunk Add-on App 2.5.0:
- Minor bug fixes
- Updated the app with AOB version 4.1.0

Version 2.4.1
Nov. 11, 2021

Removed Whitelisted status as the default option within the Indicator Status of the input configuration when creating a new input.

Version 2.4.0
Sept. 15, 2021
  • Fixed an issue where attempting to fetch import-timeout resulted in a 401 error on the Heavy Forwarder
  • Added custom fields and custom attributes support to the KVStore.
Version 2.3.0
Nov. 10, 2020
  • Fixed an authentication issue with kvstore configuration
  • Malware Family attribute data will be stored in the kvstore if available for ThreatQ Indicators
  • Removed username and password dependency for kvstore data collection for the localhost
Version 2.2.0
July 21, 2020

TA-threatquotient-add-on: Version 2.2.0
- Added new Splunk KVStore Rest configuration tab. This configuration tab is required if users save data to KVStore.
- Additional options Enable Index and Pull all Indicators available under input configuration

Version 2.1.0
June 8, 2020

TA-threatquotient-add-on: Version 2.1.0
- Import timeout is now configurable from UI
- PaginationsupportforinitialimportofThreatQdata
- Updated default frequency for ThreatQ Exports from 300 to 900

Version 2.0.0
Feb. 20, 2020

Python 3 Support :
The ThreatQuotient App for Splunk and ThreatQuotient Add-on for Splunk is now compatible with Python 3. Supported versions include:
Splunk 7.2.x
Splunk 7.3.x
Splunk 8.x (Python 2 & 3)

Notable Bugs Fixed:
We have fixed an issue with the Add-on App where:
Creating an indicator in Splunk would occasionally result in the creation of an indicator with an incorrect type within the ThreatQ platform.

ThreatQuotient Splunk Support Documentation:
See the Splunk Documentation located on the ThreatQuotient Help Center for more information.
https://helpcenter.threatq.com/Content/Developer_Resources/Integrations/About_Splunk_Integrations.htm.

Version 1.1.2
Dec. 6, 2019

Certificate-based errors will no longer appear in the Splunk log. They will now be added as a warning in the ThreatQ application log.

Version 1.1.1
Aug. 16, 2019

We have fixed an issue where Splunk credential parsing was generating a 500 error and leaving the configuration page in an unusable state.

Version 1.1.0
June 19, 2019

Common Information Model (CIM) Support

The ThreatQuotient Splunk integration now includes support for the Common Information Model (CIM). For users who map third party data (firewall events, logs, for example) to Splunk's data models in CIM, this App provides optimized performance by leveraging those data models. As such, we now support the CIM Data Model Search.

Enterprise Security (ES) Support Enhancement

Enterprise Security (ES) support now provides single-click enablement within the ThreatQ App for Splunk application settings.

Notable Bugs Fixed
We have fixed issues where:

Users could not re-enable and use searches without crashing Splunk ES search head.
threatq_match_indicators searches failed to complete. All saved search queries for matching can now accept an optional argument called indicator_types that allows users to match only specific indicator types from ThreatQ.

Version 1.0.1
May 7, 2019

Version 1.0.1:
During authentication, users can now specify whether to verify or disable the SSL certificate.

Version 1.0.0
March 5, 2019

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.