Details

This workflow enhances security management by automating the process of identifying and managing network security events using Splunk and Cisco XDR. It performs scheduled searches for new logs, creating or updating XDR Incidents based on event severity and target status. By default, it focuses on Critical and High Severity Events to minimize noise and improve scalability. Users can customize the workflow by mapping specific Splunk event fields such as Source IP, Destination IP, and MITRE Tactics, ensuring accurate threat detection and response. Additionally, it allows for automation scheduling, such as a 10-minute interval, facilitating continuous monitoring and timely incident response. This integration streamlines security operations, reduces manual workload, and enhances the organization's ability to respond to threats efficiently.

Description

Installation and Configuration Instructions

Step 1: Install the Workflow

  • Ensure you have the Splunk Cloud integration enabled in XDR.
  • Install the workflow from the XDR automation Exchange.

Step 2: Configure Search Parameters

  • Splunk Search Parameter: Index

    • Enter the Splunk Index to retrieve the network events.
    • To search all events, use "*". Note: This is not recommended for scalability.
  • Splunk Search Parameter: Source Type

    • Enter the source type for the Splunk events (e.g., cisco:asa).

Step 3: Map Event Field Names

For each field, enter the corresponding field name from the Splunk events:

  • Destination Port: (e.g., dest_port)
  • Indicator: (e.g., Threat_Name)
  • Severity: (e.g., event_severity)
  • MITRE Tactic: (e.g., mitre_tactic_id)
  • MITRE Technique: (e.g., mitre_technique_id)
  • Source IP: (e.g., src_ip)
  • Time: (e.g., splunk_time)
  • Destination IP: (e.g., dest_ip)
  • Event Type Name: (e.g., alert_category)
  • Source Name: (e.g., vendor_product)

Ensure all field names are correctly mapped to match your specific Splunk event data structure.

Step 4: Automate the Workflow

  • When prompted to "Automate it," you can add a scheduled automation rule.
  • For example, set the automation to run at a 10-minute interval.
Required targets

This workflow requires the following targets to be available before it can be run.

Integration targets

  • Splunk Cloud
  • Cisco XDR
About
Author
Ivan Berlinson
Version
v1.0
Integration
Average rating
5.0 out of 5
Authorship
Community
Contact and support information
External links
Related workflows
Community
This workflow enhances security management by automating the process of identifying and managing network security events using Splunk and Cisco XDR.
Cisco Managed
This incident response workflow allows you to export a summary of an XDR incident to a Splunk Cloud index from a playbook or using an automation rule.
Community
This workflows will run a Search Query for an Observable in Splunk Cloud via the Pivot Menu.