icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Mandiant Digital Threat Monitoring Add-on for Splunk
SHA256 checksum (mandiant-digital-threat-monitoring-add-on-for-splunk_100.tgz) 5b9294e5e766ec9324d6ad0f11a5c3f95bd6a7ac80e03b5f5049478bb2fb409a
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Mandiant Digital Threat Monitoring Add-on for Splunk

Overview
Details
Unlock the full value of your Mandiant Digital Threat Monitoring intelligence by bringing it directly into Splunk. This add-on enriches your security analytics by automatically ingesting high-value external threat alerts, including compromised credentials and dark web activity. Centralizing this data provides your security team with a unified view for immediate triage and investigation. It allows for powerful correlation between external threats and internal security events, dramatically accelerating response times. Empower your analysts to move faster and make more informed decisions by integrating Mandiant's critical intelligence into your core operational workflow.

Mandiant Digital Threat Monitoring Add-on for Splunk

Overview

The Mandiant Digital Threat Monitoring Add-on for Splunk provides a seamless integration to ingest and visualize alerts from the Mandiant Digital Threat Monitoring service. This add-on allows users to configure multiple data inputs, to periodically fetch alerts. A dedicated dashboard offers a comprehensive overview of the ingested alerts, enabling security analysts to quickly identify and act on potential threats.

Compatibility Matrix

Splunk Version OS
9.2, 9.3, 9,4 Linux, Windows

Installation

  1. Download the Mandiant Digital Threat Monitoring Add-on for Splunk package.
  2. Navigate to Apps > Manage Apps in your Splunk instance.
  3. Click on Install app from file.
  4. Select the downloaded package and click Upload.
  5. Restart Splunk for the changes to take effect.

Configuration

Global configurations for the add-on can be accessed by navigating to the add-on's configuration page.

Proxy

If your Splunk instance requires a proxy to connect to external services, you can configure the proxy settings in this section. You will need to provide the proxy host, port, and credentials if required.

Logging

Configure the logging level for the add-on to control the amount of information that is written to the logs. Available levels are typically DEBUG, INFO, WARNING, ERROR, and CRITICAL. The default is usually INFO.

Settings

This section allows you to configure the global settings for the add-on's.

  • Index: Specify the Splunk index where the dashboard will read the alert data from. The default value is dtm.
  • Index sensitive information: By default, sensitive fields such as doc.payment_card, doc.service_account, and topics are not ingested. Check this box to enable the ingestion of this sensitive information.

Inputs

To start ingesting alerts, you need to configure one or more inputs. From the add-on's "Inputs" page, click on Create New Input to open the "Add DTM Alerts" modal.

  • Name: A unique name for this data input. This is used to identify the input in Splunk.
  • Interval: The time interval in seconds for fetching new alerts from the Mandiant API.
  • Index: The Splunk index where the alerts from this input will be stored. The default is default.
  • Global Account: Select the Mandiant API account to use for this input.
  • Minimum M-Score: The minimum M-Score value for an alert to be ingested. The M-Score is Mandiant's proprietary risk score.
  • Alert Status: Filter alerts by their status. You can select one or more statuses to ingest. The "All" option ingests alerts regardless of their status.
  • Alert Types: Filter alerts by their type. You can select one or more alert types to ingest. The "All" option ingests all types of alerts.

Dashboard

The add-on includes a pre-built dashboard to visualize and analyze the ingested alerts.

Overview

The dashboard provides a high-level overview of the alerts over the last 7 days. It includes two main panels:

  • Alerts by Severity: A line chart that displays the trend of alerts over time, categorized by severity (e.g., Low, High). This helps in identifying spikes in alert activity.
  • Alerts by Type: A bar chart that shows the distribution of alerts based on their type, providing a quick look at the most common types of threats detected.

Alerts Table

Below the overview charts, there is a detailed table of the latest alerts. The table provides the following information for each alert:

  • Updated At: The timestamp of when the alert was last updated.
  • Title: A descriptive title of the alert.
  • Type: The type of the alert (e.g., Compromised Credentials, Leaked Web Service Credentials).
  • Monitor: The specific monitor in Mandiant that generated the alert (e.g., Compromised Credentials, Deep & Dark Web).
  • Severity: The severity level of the alert (e.g., Low, High).
  • Confidence: A numerical score indicating the confidence level of the alert.
  • Gemini Summary: A brief summary of the alert.
  • Alert Detail: A View button to navigate to a detailed view of the alert in Mandiant platform.

Functionality and Filters

  • Time Range Picker: The dashboard allows you to select the time range for the data being displayed. The default is the "Last 7 days".
  • Filters: You can filter the alerts displayed in the table using the following dropdown menus:
    • Filter by Severity: Filter alerts by their severity level.
    • Filter by Type: Filter alerts by their type.
    • Filter by Monitor: Filter alerts by the monitor that generated them.
  • Pagination: The alerts table is paginated, allowing you to navigate through a large number of alerts.

Support

For any questions, issues, or feature requests, please contact our support team at: contact@virustotal.com

F.A.Q.

Q: Where can I find my Mandiant API credentials to configure a Global Account?
A: You can find your Mandiant API credentials in your Mandiant Digital Threat Monitoring portal under the API settings section.

Q: What is the M-Score?
A: The M-Score is Mandiant's proprietary risk score that helps to prioritize alerts. A higher score indicates a higher risk.

Q: Can I create multiple inputs with different configurations?
A: Yes, you can create as many inputs as you need, each with its own set of filters for M-Score, Alert Status, and Alert Types, and specify a different index for each if required.

Q: Why are some fields like doc.payment_card not appearing in my events?
A: By default, sensitive information is not indexed to protect privacy and reduce noise. You can enable the ingestion of sensitive fields in the "Settings" under the add-on's configuration page.

Q: How can I customize the dashboard?
A: You can clone the provided dashboard and then edit the cloned version to add, remove, or modify the panels and visualizations to fit your specific needs.

Release Notes

Version 1.0.0
May 30, 2025

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.