icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading SOC Prime Attack Detective App for Splunk
SHA256 checksum (soc-prime-attack-detective-app-for-splunk_202.tgz) ec2925e6191156c636f44afc66cf904936d320d8300583b10e1869bcba0a359c SHA256 checksum (soc-prime-attack-detective-app-for-splunk_201.tgz) 98b2bff0cb4155e0e9fdacc3507f1f65f92b21797253edfac9dd3eab56efa478 SHA256 checksum (soc-prime-attack-detective-app-for-splunk_200.tgz) a383d485b8beb6d0045817b5f94f30bc396f5ef0d8b56485a0a03462210c0a9c SHA256 checksum (soc-prime-attack-detective-app-for-splunk_102.tgz) a549c7c35d1ea6fc7465258d9c5d9f29c592ddc0d1910a9beb152b448a546f70 SHA256 checksum (soc-prime-attack-detective-app-for-splunk_101.tgz) cea72ba0324d6fab8dba0c6b75ed01b3d569e5cf458af538edbcf2e10e06fc89 SHA256 checksum (soc-prime-attack-detective-app-for-splunk_100.tgz) 94f7738b53fa69975fcb9ac4b64a212c61c01221ec7781f1a09d0d404ad4247c
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

SOC Prime Attack Detective App for Splunk

Splunk Cloud
Overview
Details
SOC Prime Attack Detective App for Splunk connects your on-prem Splunk instance to Attack Detective on the SOC Prime Platform.

Attack Detective (https://tdm.socprime.com/attack-detective/) intelligently and automatically queries security logs in the customer's security platform to identify data sources and then scan them in real time to provide cyber defenders with a holistic view of the organization’s cybersecurity posture, which enables smart data orchestration and next-gen automated threat hunting. Scans use prioritized detection content from Threat Detection Marketplace and correlate results with MITRE ATT&CK®.

Explore the outcomes consolidated into the detected ATT&CK techniques along with the impacted assets, services, and accounts. Analyze potential threat actors and adversary tools in use.

Instantly visualize a heatmap with triggered ATT&CK tactics and techniques and time of access for particular threat actors to find out if they can be attributed to a relevant attack.

Validate the risks by running selected queries in your Splunk instance and
mark the outcomes based on the displayed behavior to prioritize your detection procedures.

Requirements

SIEM: Splunk v. 9.x or higher.
Note: If you have an all-in-one Splunk environment, use this guide to install the app. If you have a distributed Splunk environment, please contact SOC Prime support for help with installation since it may be specific to your configuration.

Configuration

After installation, create an index for the App and configure getting the searches from Attack Detective on the Inputs tab:

  1. Select SOC Prime Attack Detective App for Splunk in the main Apps menu.
  2. Create an index for this app:
    2.1 In your Splunk header menu, open Settings > Indexes (in the Data section).
    2.2 Click the New index button.
    2.3 Give the index a name like socprime.
    2.4 Click Save.
    2.5 Configure data rotation for this newly created index according to your organization's policies.
  3. Select the Inputs tab.
  4. Click Create New Input.
  5. Fill in the parameters:
  6. Name: Provide a descriptive name for this data input
  7. Interval: Time interval of input in seconds. The default value is 30
  8. Index: a technical parameter that should not be changed. Please, keep the Default value
  9. Attack Detective API key: The API key generated when configuring the Data Plane integration on the SOC Prime Platform
  10. Parallel Jobs Count: The number of searches that can be run simultaneously. Please, set it according to the performance of your Splunk instance
  11. Splunk REST API host and port: May be necessary for remote execution. Format: ["<splunk_host>:<port>"]. Default: ["localhost:8089"]
  12. Splunk REST API username: May be necessary for remote execution
  13. Splunk REST API password: May be necessary for remote execution
  14. Splunk REST API token: May be necessary for remote execution

Before the First Data Audit or Scan

The index created during the configuration is filled by the results of a special search run each hour. This data is used by Attack Detective to speed up data audits and scans. If you're going to run data audits or scans that cover time periods before the app has been installed (like for the last 7 or 30 days), you need to run the Reports search manually at least for the same period, which will generate all audit data historically for each day of the period. To do this:
1. In the App menu, go to Reports.
2. Click Open in Search for SOC Prime Attack Detective Data Audit EventCodes with Indexes - Filling the Trend.
3. Select the same or greater time period as will be used for your data audit or scan in the calendar picker next to the Run button.
4. Run the search.
5. The search can take a long time depending on the selected period. You can send the job to the background. To do this:
5.1 Go to Job > Send Job to Background in the menu under the search query.
5.2 The Send Job to Background window appears. Optionally, you can set the Email when complete checkmark and enter your email to receive an email notification when the job is finished.
5.3 Click the Send to Background button.
6. Wait until the search is finished. After that, the index socprime will be populated with trended historical data, so you can run a Data Audit or Scan for the same period.

Note that the map and collect commands are used during Data Audits, and Splunk potentially can recognize them as risky.

All configurations related to investigations are made in Attack Detective on the SOC Prime Platform. Before installing the SOC Prime Attack Detective App for Splunk, make sure to configure your on-prem Splunk Data Plane on the SOC Prime Platform.

To learn more, see the Attack Detective User Guide (to open the Guide, you need to be logged in to your SOC Prime Platform account).

Release Notes

Version 2.0.2
Oct. 2, 2025
  • 2.0.2 — Made multiple updates:
    • Improved interaction with SOC Prime API
    • Implemented changes to comply with the updated Splunk Cloud Platform compatibility
Version 2.0.1
Feb. 17, 2025
  • 2.0.1 — Made multiple updates:
    • Improved interaction with Splunk by optimizing and speeding up the process of running searches
    • Implemented changes to comply with the updated Splunk Cloud Platform compatibility
Version 2.0.0
Nov. 29, 2024
  • 2.0.0 — Made multiple updates:
    • Improved interaction with Splunk by optimizing and speeding up the process of running searches
    • Added dashboards that show the status of running searches in real time
    • Improved the speed of Data Audit. The Data Audit was refactored from scratch and all necessary data is trending in the App to speed up the Data Audit by Attack Detective.
    • Added the Splunk Rest API authentication token parameter to input settings as an authentication option
    • Now, after installing the app, you need to create a Splunk index for it. Note that if you upgrade from v1.0.0, you need to create an index as well
Version 1.0.2
Aug. 21, 2024
  • 1.0.2 - Fixed bugs
Version 1.0.1
April 3, 2024
  • 1.0.1 - Implemented changes to comply with the updated Splunk Cloud Platform compatibility
Version 1.0.0
July 18, 2023
  • 1.0.0 — Initial release of the SOC Prime Attack Detective App for Splunk

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.