Splunk Integration

Integration of AIR with Splunk is possible via a feature called "Post Actions".

  • When Splunk generates an alert for an incident, it sends a JSON payload to the URL provided in Workflow Actions,

  • The payload that is POSTed contains important information about the alert such as the Host Name, IP Address, and other alert specific details,

  • Upon receiving this JSON data, AIR parses the payload and extracts IP address or Hostname from it, and automatically assigns an acquisition task to the endpoint in question. The acquisition profile that will be used for this task is provided when you create a trigger.

Steps to Integrate

  • Visit the Triggers page in Binalyze AIR

  • Click the "+ New Trigger" button on the upper right corner

  • Provide a self-explanatory name (examples: RDP Brute Force Trigger, Phishing Detected Trigger, and etc.)

  • Select "Splunk: Generic Splunk Webhook Parser" as the parser for this trigger

  • Select an Acquisition Profile that will be used when this trigger is activated by Splunk

  • Select the Ignore option or leave with its default value (defaults to 24 hours for recurrent alerts for a single endpoint)

  • Provide other settings such as Compression, Encryption, Evidence Repository to use or let AIR configure them automatically based on the matching policy

  • Click the "Save" button

  • Hover your mouse over the link below the Trigger name and click to copy (see below)

  • Head over to Splunk and create a POST Workflow Action for your workflow

    • Provide the Trigger URL you have copied above as the URI to the newly created Workflow Action,

    • Make sure you have provided the Host Name or IP Address in Post Arguments

  • At this point, whenever Splunk generates an alert for an endpoint, the information will be sent to AIR for it to automatically assign an acquisition task to the endpoint in question.

Last updated