icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Code42 Insider Risk
SHA256 checksum (code42-insider-risk_200.tgz) b1aec78e9782b286cda572fd51ad48c8e2661ef9d61bbe4911962d5129ad2212 SHA256 checksum (code42-insider-risk_144.tgz) b895ad7fb7d6a60ac114e082ca559781f4202a42bb4f24d7541c3a96f0872be0 SHA256 checksum (code42-insider-risk_143.tgz) e25c6d2e7be3b43578f9922085faa176b23e1d377e20768636c8a10ff5721347 SHA256 checksum (code42-insider-risk_142.tgz) ef1c5b77a848acf202b171c931f4242fc50e4b05c05172ecf581f19f485c3809 SHA256 checksum (code42-insider-risk_141.tgz) 2a944d38bf43aedf13d87b697f434e3448ac71932cbd93de79a796d5ca4daa10 SHA256 checksum (code42-insider-risk_140.tgz) 095b563a6c95ec8dd5cf05693990b271a9f5d72ff0cfdca09c4f7ff35b6980a4 SHA256 checksum (code42-insider-risk_131.tgz) 503973796557c2298ceb1328d2f7a27f76dba5a76ff5c750b6e4809e3de9864c SHA256 checksum (code42-insider-risk_130.tgz) 059dbfb7811a54a384cb3785d4420c9dfb3b84b965585ea5af239e3fab7b4879 SHA256 checksum (code42-insider-risk_121.tgz) 7eb80e4efdf7d39b4e80aafc0a006c23c34f429632e34556a2af215455e2e531 SHA256 checksum (code42-insider-risk_110.tgz) 64444cbb5cfde3d5ccd8f485e3affb4bf17a5924c73955d9fa622cdd97aff0f5 SHA256 checksum (code42-insider-risk_101.tgz) 0da77986c3fce767396a05380167c1f66308f46f6f6aef607a13b36bc7dd0354 SHA256 checksum (code42-insider-risk_100.tgz) ff508b139af9f37b68667215d68e649934d2fdb0244d4031484b1c73eb01f025
To install your download
To install apps and add-ons from within Splunk Enterprise
  1. Log into Splunk Enterprise.
  2. On the Apps menu, click Manage Apps.
  3. Click Install app from file.
  4. In the Upload app window, click Choose File.
  5. Locate the .tar.gz file you just downloaded, and then click Open or Choose.
  6. Click Upload.
  7. Click Restart Splunk, and then confirm that you want to restart.
To install apps and add-ons directly into Splunk Enterprise
  1. Put the downloaded file in the $SPLUNK_HOME/etc/apps directory.
  2. Untar and ungzip your app or add-on, using a tool like tar -xvf (on *nix) or WinZip (on Windows).
  3. Restart Splunk.
After you install a Splunk app, you will find it on Splunk Home. If you have questions or need more information, see Manage app and add-on objects.

Flag As Inappropriate

splunk

Code42 Insider Risk

Splunk Cloud
Overview
Correlate actionable risk insights to speed insider threat response.

Code42 integrates with Splunk to deliver valuable file exfiltration events to custom dashboards for correlation and triage within the Splunk Security Operations Suite.

Code42’s insider risk detection lenses surface insights for subsets of users more likely to put data at risk, such as users with access to proprietary information or departing employees. Extracting this data into dashboards within Splunk provides actionable insights that can be applied to existing SOC workflows to substantiate insider threat investigations and speed response.

Overview
https://www.code42.com/insider-threat-ecosystem/splunk/

Support Documentation
https://code42.com/r/support/splunk-insider-threat

Code42 Incydr Trial
https://www.code42.com/trial/

Release Notes

Version 2.0.0
Feb. 13, 2025

This is a major update for the Incydr App for Splunk. Please carefully review your configuration after upgrading, as some things have changed.

Note that the format for the URL used in your configuration has changed from the console url (e.g. "console.us.code42.com") to the API url (e.g. "api.us.code42.com"). All existing configurations must be updated to the new URL format.

Changes

  • The Incydr App is now backed by up-to-date Code42 APIs.
  • Alerts are now Alert Sessions. This brings parity with the Incydr web console and substantial changes to the data model.
    • Note that sessions may be updated after they are initially ingested. If this occurs, the add-on will ingest that same session again. Ensure that your searches for alerts are deduplicated on the sessionId key in order to avoid double-counting the same session.
  • Device health data is now based on the Agent Health data available in the Incydr console.
  • Support for V1 file events is removed.
Version 1.4.4
Sept. 25, 2024
Version 1.4.3
July 17, 2024

Added:
- When configuring a File Events input, you can specify a page size. If a page size is not specified, the app will use the maximum allowed page size of 10 000.

Version 1.4.2
March 8, 2024

Fixed:
- If Splunk receives an "invalid page token error" while processing, it will fallback to filter based on the timestamp of the last event processed. Previously, ingest would restart processing from 90 days back when it encountered this error, which would result in duplicate events being ingested and delayed processing of new events

Version 1.4.1
Aug. 29, 2023

Version 1.4.1:

Fixed:
- A bug where enabling V2 file events was still calling deprecated V1 endpoints when running a saved search query.

Version 1.4.0
April 19, 2023

Version 1.4.0:

Added:
- Support for ingesting Incydr File Events in the new V2 format.
- A number of new c42-file-exposure calculated fields that enable seamless searching for event values across events in either V1 or V2 format.

Version 1.3.1
June 2, 2022

Branding updates.

Version 1.3.0
April 8, 2022

Version 1.3.0:

Added:
- Support for using a Saved File Event Search as an input filter for the File Exposure input (enabling flexible custom ingest criteria beyond just a minimum riskSeverity threshold).

Changed:
- The "Newly Added High Risk Users" panel of the dashboard has been updated to track risk activity of users recently added to any Watchlist.

Fixed:
- A bug in Alert and Audit Log input checkpointing that was causing duplicate events to be ingested.

Version 1.2.1
Feb. 1, 2022

Version 1.2.1:

ACTION REQUIRED: To continue ingesting data, you must update your account configuration for API client authentication.

Added:
- Support for proxies

Changed:
- Code42 authentication now uses API Clients (https://code42.com/r/support/splunk-auth) instead of user credentials.
- Alerts input now filters by RiskSeverity instead of Severity. If previously ingesting HIGH Severity alerts, you'll now include HIGH and CRITICAL alerts.
- File Exposure input now filters by RiskScore, enabling ingestion of all event types.

Fixed:
- An issue where the Device Health input triggered rate-limiting on Forensic Search endpoints. A configurable polling rate limit is added to the Device Health input configuration.
- Event checkpointing frequency, improving the ingestion rate.
- A mismatch issue between the High Risk Employee event results drill-down and the dashboard.

Version 1.1.0
Sept. 7, 2021

Version 1.1.0 introduces:

  • Three new Code42 modular inputs:
    -- Alerts
    -- Audit Log
    -- Device Health

  • A new Incydr Overview Dashboard highlighting insider risk activity across your organization.

Version 1.0.1
June 30, 2020

Fixes a problem with the Removable Media dashboard displaying the incorrect information.

Version 1.0.0
June 30, 2020

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.