SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Use Splunk and FireEye to better detect, prevent and
investigate advanced security threats
Splunk® App for FireEye
F A C T S H E E T
The Splunk App for FireEye
The Splunk App for FireEye is a free App available on Splunkbase
that installs on Splunk Enterprise. It ingests data from FireEye
and offers out-of-the-box dashboards, reports and fast access
to FireEye alerts. The Splunk App for FireEye allows FireEye
customers to easily visualize key threats as alerted on by FireEye
across multiple parameters (FireEye product, destination IP,
malware name, etc.), investigate FireEye alerts, and see threat
trends. It also contains search capabilities which allow users to
enter values such as IP, alert name, malware URL, md5sum or
other data, to quickly see relevant FireEye alerts. Every FireEye
alert can be drilled into to get to the raw, underlying detail within
one or two clicks for fast incident investigation. Also, for each
alert, the Splunk App for FireEye provides one-click access to
the related packet capture files stored in FireEye so they can be
analyzed and correlated in Splunk Enterprise. Lastly, customers
can also customize the Splunk App for FireEye by creating
their own dashboards, visualizations, forms, and alerts to
accommodate their specific needs.
The Splunk App for FireEye indexes raw FireEye XML output, versus
CEF or syslog format, for rich FireEye alert detail. This XML data
can contain hundreds of lines per alert and may have thousands of
fields compared to the less than 50 fields present in FireEye syslog
or CEF formatted data. With all this detail, incident investigations
and forensics analysis in Splunk software will not be hampered by
missing FireEye data. The rich data set provided by FireEye allows
for deep detailed analysis of threats and malware, including how
the threats work, what processes were involved and more.
FireEye® and Splunk
The FireEye Malware Protection System (MPS) is the only complete
solution to stop advanced targeted attacks across Web and email
threat vectors, and from malware resident on file shares. FireEye’s
solutions supplement traditional security defenses, such as firewalls,
IPS, AV and gateways, which can’t stop advanced malware and
thus leave significant security holes in most corporate networks.
The FireEye security platform offers integrated, multi-vector
protection utilizing stateful attack analysis to stop all stages of an
advanced attack. FireEye’s products all feature a Virtual Execution
engine that provides state-of-the-art, signature-less analysis using
patented, proprietary virtual machines. The FireEye MPS builds
a 360-degree, stage-by-stage analysis of an advanced attack,
from system exploitation to data exfiltration, to effectively stop
would-be advanced persistent threat attackers.
Splunk Enterprise is a security intelligence platform that collects,
indexes and harnesses machine-generated data coming from
websites, applications, servers, networks and security products,
such as FireEye. Splunk Enterprise is often used as a big data
platform for security use cases, including incident investigations
and forensics, security reporting and visualization and security
information and event management (SIEM) threat correlation. For
SIEM use cases, Splunk software connects the dots across siloed,
separate products to detect and alert on advanced threats that
otherwise would evade detection. The Splunk Enterprise platform
extracts additional value from point solutions by allowing the
end user to create data visualizations that reflect long term
trending of threats, see them in the context of other IT data and
link solutions together to automate security processes.
•	 Real-time dashboards, panels, and search fields
to easily view and investigate FireEye alerts
•	 Correlate FireEye data with other data sources
in Splunk Enterprise™ to detect and remediate
additional advanced threats
•	 Uses FireEye XML output, not CEF or syslog
output, for rich detail—up to hundreds of lines
per FireEye alert
H I G H L I G H T S
Malware overview dashboard
www.splunk.comlisten to your data
250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com
F A C T S H E E T
Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws.
Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned
herein may be trademarks of their respective companies. Item # FS-splunk-FireEye-104
FireEye overview dashboard:
•	 Geo-IP mapping of alerts
•	 Attack vector of alerts
Malware overview dashboard:
•	 Malware detail including alert ID, FireEye appliance, source
IP, destination IP and malware name
•	 Malware by business unit
•	 Malware names
•	 Malware sub-type names
•	 Most callbacks by destination IP
•	 Search boxes for victim IP, device name, malware name,
alert ID, callback and malware type
Analysis dashboard:
•	 Alert detail including alert ID, analysis, malware, URL,
message, process and alert name
•	 Infections by alert name
•	 Content type
•	 md5sums
•	 Alerts
•	 Search boxes for alert name, device name, malware name,
alert ID, md5sum and malware URL
Once this rich XML FireEye data is in Splunk Enterprise it can be
correlated with other data in Splunk from sources such as DNS,
DHCP, AD, web servers, email servers, firewalls and Windows
event logs. This allows you to detect the presence of advanced
threats that may hide behind credentials and use other stealthy
methods to evade detection from traditional stand-alone security
products. Other SIEMs commonly use fixed-schema, SQL database
structures and are unable to retain or correlate on this highly
variable and unstructured XML data from FireEye.
Additionally, Splunk Enterprise can be used to take real-time,
automated action on FireEye alerts and to easily integrate different
products for better security. For example, a large financial institution
sends FireEye alerts to Splunk software in real-time, while in Splunk
Enterprise a real-time search is looking for FireEye web alerts
involving inbound threats. When the Splunk search sees these
FireEye alerts, a Splunk alert is generated that automatically
executes a simple, custom script which adds the IP address of
the inbound threat to a blacklist in the company’s web proxy.
Thus the attacker will be blocked from future attempts originating
from that IP address. With Splunk Enterprise, product integrations
such as this can be done with minimal effort and enable real-time,
automatic remediation or threat blocking.
The Splunk App for FireEye is compliant with the Splunk Common
Information Model (CIM) making it easier to correlate FireEye data
with data already in Splunk. Other Splunk Apps that use the CIM
include the Splunk App for Enterprise Security, Splunk App for
PCI Compliance and the Splunk App for FISMA.
Splunk App for FireEye—Dashboards, Reports
and Search Boxes
The Splunk App for FireEye generates FireEye-specific dashboards
and reports in real-time, enabling immediate visibility on key
FireEye metrics. The Splunk App for FireEye also supports core
Splunk functionality such as the ability to schedule and email
reports to others, role-based access control to limit who can
view and/or act on specific data in Splunk or an App, and drill-
down actions that enable you to delve deeper into the details
behind graphical elements and charts.
The following dashboards, reports and search boxes are available
in the Splunk App for FireEye:
F A C T S H E E T
Free Download
Download Splunk for free. You’ll get a Splunk Enterprise
license for 60 days and you can index up to 500 megabytes
of data per day. After 60 days, or anytime before then, you
can convert to a perpetual Free license or purchase an
Enterprise license by contacting sales@splunk.com.
Try out the App, it’s Free!
Go to http://splunk-base.splunk.com/apps/ and search
for “fireeye” to download the App

Mais conteúdo relacionado

Mais de Greg Hanchin

Splunk for cyber_threat
Splunk for cyber_threatSplunk for cyber_threat
Splunk for cyber_threatGreg Hanchin
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for complianceGreg Hanchin
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43courseGreg Hanchin
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administrationGreg Hanchin
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Greg Hanchin
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 courseGreg Hanchin
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43courseGreg Hanchin
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline Greg Hanchin
 
Advanced Splunk Administration
Advanced Splunk AdministrationAdvanced Splunk Administration
Advanced Splunk AdministrationGreg Hanchin
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionGreg Hanchin
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk courseGreg Hanchin
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsGreg Hanchin
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Greg Hanchin
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_briefGreg Hanchin
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduceGreg Hanchin
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktopGreg Hanchin
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_altoGreg Hanchin
 

Mais de Greg Hanchin (20)

Splunk for cyber_threat
Splunk for cyber_threatSplunk for cyber_threat
Splunk for cyber_threat
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43course
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administration
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 course
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43course
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline
 
Advanced Splunk Administration
Advanced Splunk AdministrationAdvanced Splunk Administration
Advanced Splunk Administration
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk course
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class Details
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_brief
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduce
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktop
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
 
Splunk for fisma
Splunk for fismaSplunk for fisma
Splunk for fisma
 
Splunk for f5
Splunk for f5Splunk for f5
Splunk for f5
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Splunk for fire_eye

  • 1. Use Splunk and FireEye to better detect, prevent and investigate advanced security threats Splunk® App for FireEye F A C T S H E E T The Splunk App for FireEye The Splunk App for FireEye is a free App available on Splunkbase that installs on Splunk Enterprise. It ingests data from FireEye and offers out-of-the-box dashboards, reports and fast access to FireEye alerts. The Splunk App for FireEye allows FireEye customers to easily visualize key threats as alerted on by FireEye across multiple parameters (FireEye product, destination IP, malware name, etc.), investigate FireEye alerts, and see threat trends. It also contains search capabilities which allow users to enter values such as IP, alert name, malware URL, md5sum or other data, to quickly see relevant FireEye alerts. Every FireEye alert can be drilled into to get to the raw, underlying detail within one or two clicks for fast incident investigation. Also, for each alert, the Splunk App for FireEye provides one-click access to the related packet capture files stored in FireEye so they can be analyzed and correlated in Splunk Enterprise. Lastly, customers can also customize the Splunk App for FireEye by creating their own dashboards, visualizations, forms, and alerts to accommodate their specific needs. The Splunk App for FireEye indexes raw FireEye XML output, versus CEF or syslog format, for rich FireEye alert detail. This XML data can contain hundreds of lines per alert and may have thousands of fields compared to the less than 50 fields present in FireEye syslog or CEF formatted data. With all this detail, incident investigations and forensics analysis in Splunk software will not be hampered by missing FireEye data. The rich data set provided by FireEye allows for deep detailed analysis of threats and malware, including how the threats work, what processes were involved and more. FireEye® and Splunk The FireEye Malware Protection System (MPS) is the only complete solution to stop advanced targeted attacks across Web and email threat vectors, and from malware resident on file shares. FireEye’s solutions supplement traditional security defenses, such as firewalls, IPS, AV and gateways, which can’t stop advanced malware and thus leave significant security holes in most corporate networks. The FireEye security platform offers integrated, multi-vector protection utilizing stateful attack analysis to stop all stages of an advanced attack. FireEye’s products all feature a Virtual Execution engine that provides state-of-the-art, signature-less analysis using patented, proprietary virtual machines. The FireEye MPS builds a 360-degree, stage-by-stage analysis of an advanced attack, from system exploitation to data exfiltration, to effectively stop would-be advanced persistent threat attackers. Splunk Enterprise is a security intelligence platform that collects, indexes and harnesses machine-generated data coming from websites, applications, servers, networks and security products, such as FireEye. Splunk Enterprise is often used as a big data platform for security use cases, including incident investigations and forensics, security reporting and visualization and security information and event management (SIEM) threat correlation. For SIEM use cases, Splunk software connects the dots across siloed, separate products to detect and alert on advanced threats that otherwise would evade detection. The Splunk Enterprise platform extracts additional value from point solutions by allowing the end user to create data visualizations that reflect long term trending of threats, see them in the context of other IT data and link solutions together to automate security processes. • Real-time dashboards, panels, and search fields to easily view and investigate FireEye alerts • Correlate FireEye data with other data sources in Splunk Enterprise™ to detect and remediate additional advanced threats • Uses FireEye XML output, not CEF or syslog output, for rich detail—up to hundreds of lines per FireEye alert H I G H L I G H T S Malware overview dashboard
  • 2. www.splunk.comlisten to your data 250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com F A C T S H E E T Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws. Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item # FS-splunk-FireEye-104 FireEye overview dashboard: • Geo-IP mapping of alerts • Attack vector of alerts Malware overview dashboard: • Malware detail including alert ID, FireEye appliance, source IP, destination IP and malware name • Malware by business unit • Malware names • Malware sub-type names • Most callbacks by destination IP • Search boxes for victim IP, device name, malware name, alert ID, callback and malware type Analysis dashboard: • Alert detail including alert ID, analysis, malware, URL, message, process and alert name • Infections by alert name • Content type • md5sums • Alerts • Search boxes for alert name, device name, malware name, alert ID, md5sum and malware URL Once this rich XML FireEye data is in Splunk Enterprise it can be correlated with other data in Splunk from sources such as DNS, DHCP, AD, web servers, email servers, firewalls and Windows event logs. This allows you to detect the presence of advanced threats that may hide behind credentials and use other stealthy methods to evade detection from traditional stand-alone security products. Other SIEMs commonly use fixed-schema, SQL database structures and are unable to retain or correlate on this highly variable and unstructured XML data from FireEye. Additionally, Splunk Enterprise can be used to take real-time, automated action on FireEye alerts and to easily integrate different products for better security. For example, a large financial institution sends FireEye alerts to Splunk software in real-time, while in Splunk Enterprise a real-time search is looking for FireEye web alerts involving inbound threats. When the Splunk search sees these FireEye alerts, a Splunk alert is generated that automatically executes a simple, custom script which adds the IP address of the inbound threat to a blacklist in the company’s web proxy. Thus the attacker will be blocked from future attempts originating from that IP address. With Splunk Enterprise, product integrations such as this can be done with minimal effort and enable real-time, automatic remediation or threat blocking. The Splunk App for FireEye is compliant with the Splunk Common Information Model (CIM) making it easier to correlate FireEye data with data already in Splunk. Other Splunk Apps that use the CIM include the Splunk App for Enterprise Security, Splunk App for PCI Compliance and the Splunk App for FISMA. Splunk App for FireEye—Dashboards, Reports and Search Boxes The Splunk App for FireEye generates FireEye-specific dashboards and reports in real-time, enabling immediate visibility on key FireEye metrics. The Splunk App for FireEye also supports core Splunk functionality such as the ability to schedule and email reports to others, role-based access control to limit who can view and/or act on specific data in Splunk or an App, and drill- down actions that enable you to delve deeper into the details behind graphical elements and charts. The following dashboards, reports and search boxes are available in the Splunk App for FireEye: F A C T S H E E T Free Download Download Splunk for free. You’ll get a Splunk Enterprise license for 60 days and you can index up to 500 megabytes of data per day. After 60 days, or anytime before then, you can convert to a perpetual Free license or purchase an Enterprise license by contacting sales@splunk.com. Try out the App, it’s Free! Go to http://splunk-base.splunk.com/apps/ and search for “fireeye” to download the App