The Splunk Threat Research Team is thrilled to announce the release of the Enterprise Security Content Update (ESCU) app 5.0, marking a significant milestone in our continuous effort to enhance your security operations. With ESCU 5.0, we're introducing a completely revamped user interface (UI) and an exciting new feature, the Analytic Story Onboarding Assistant, designed to help mass enable security analytics like never before.
We have introduced a redesigned home page featuring a streamlined UI that displays links to release notes, the count of analytics, and the latest version available on Splunkbase. Additionally, we've integrated a comprehensive timeline feature that provides direct links to all blogs written by the Splunk Threat Research Team, tool updates, and major enhancements, simplifying access to our historical updates and improvements.
This new feature helps accelerate how you enable detections in your SOC. With just a few clicks, the onboarding wizard guides you through the process of enabling all relevant detections for the selected analytic story. This means faster setup times and a more efficient way to bolster your defense strategies.
Please note that this feature is in a preview stage available to all Splunk customers.
Step 1 . Select the stories you want to enable the detections for, the number alongside each story specifies the number of detections which have relevant data in your splunk environment
Step 2. Select the detections you would want to enable in your environment.
Note: To avoid consuming your entire search quota, please refrain from enabling too many detections simultaneously or enabling detections that have no data or TA available. The red X means that the required data is not available.
Step 3: Configure the scheduling parameters and default adaptive response actions will be applied. Default ESCU detections adaptive response actions can be found here.
Step 4. Click Enable.
Once these detections are enabled, make sure to follow the instructions and update any macros if suggested. You can now view your triggered notables and risk events in your Splunk Enterprise Security environment!
We've enhanced the way the Splunk Threat Research Team’s security content within our repository is validated and tested. We've implemented stricter validation checks to the YAML files to support greater accuracy, improved version control and greater consistency in the content provided. Moreover, we've made a key structural change by replacing the 'observables' key with an 'RBA' key in our YAML configurations. This adjustment aligns better with the field names used in Splunk Enterprise Security, simplifying the process of risk and threat attribution by matching key-value formats more directly.
Previous Structure | New Structure in ESCU 5.0 |
message: - name: | rba: threat_objects: |
In this release, we have added a deprecation assistant dashboard that helps ESCU users identify detection analytics that are marked as Deprecated by the Splunk Threat Research Team which are currently enabled in your Splunk environment. These detections are no longer maintained or are outdated and should not be used. While these analytics are still available within the ESCU app, we will be removing these deprecated analytics beginning with ESCU v5.2.0. Please note that this update may disrupt Splunk environments where deprecated ESCU detections are currently enabled. If you are using a detection from this list, please review this guide for deprecated analytics.
We show the following warning banner on the ESCU landing page in all Splunk environments that have enabled and running deprecated detections with the only exception of users of Enterprise Security 8.0.0 who have enabled content versioning.
⚠️ If you have deprecated detections enabled, please use this dashboard and follow the instructions in this guide.
Take action today to enhance your organization's security posture and better protect against potential threats! Using the powerful detections packaged in the ESCU app and Splunk Enterprise Security helps you stay ahead of the latest attacks and respond to potential threats before they can do any damage.
With over 1600 high-quality detections available, the ESCU app is a comprehensive and effective way to enhance your organization's security. By deploying these detections quickly and easily, you can take a proactive step in ensuring the safety and security of your organization's data and assets.
It's also important to note that maintaining such a large number of detections requires a robust detection engineering approach that is constantly improved and optimized for efficiency. So, don't delay — start using the ESCU app today to help safeguard your organization's security!
Any feedback or requests? Feel free to put in an issue on GitHub or email research@splunk.com. Alternatively, join us on the Slack channel #security-research.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.