There are times where being unusual is a good thing - unconventional thinking can lead to innovation in industry, science and culture, enabling everyone from businesses to artists to stand out from the pack.
The Splunk App for Behavioral Profiling (SABP) helps users tackle the other kind of unusual - the bad kind. Regardless of your domain, the app provides a streamlined end-to-end workflow to build and deploy scored anomaly rules which aggregate to identify the entities, or things, displaying behaviors which require investigation.
Over the past 4 months, I’ve had the opportunity to work with customers using the SABP to identify accounts displaying potentially fraudulent behavior, employees showing signs of insider threat and platform services degrading towards downtime - and with the app all of these use cases require minimal understanding of Splunk’s SPL query language and machine learning capabilities to get up and running.
In the new 2.0 release of the SABP, we’re excited to announce a variety of capabilities providing enhancements across the application workflow in response to customer feedback. Existing users will find quality of life improvements regardless of whether they’re developing behavioral indicator searches and anomaly scoring rules, managing the lifecycle of existing content or investigating potentially anomalous entities - so let’s take a look at these in more detail:
The first thing you’ll notice when opening the SABP is an entirely new user interface, designed to improve experience through increased clarity, responsiveness and robustness of the underlying platform.
1.0 Create Anomaly Scoring Rule UI
2.0 Create Anomaly Scoring Rule UI
Nowhere is this more apparent than the new workflow pages for building behavioral indicator searches and anomaly scoring rules where react-based menus leveraging Splunk UI replace their SimpleXML-based predecessors.
Whilst developing these new workflows required re-architecture of the application from the ground up, as you can see from the above comparison the latest release provides a streamlined, intuitive method of deploying searches. This will increase user efficiency and underlying platform robustness with ReactJS inputs/variables replacing temperamental Splunk SimpleXML tokens.
Working with customers who have deployed the SABP has been hugely insightful, not just in terms of how they’re using the app to assist with use cases across domains such as Insider Threat, Fraud, Cybersecurity and IT Operations, but also with regards to the ways in which their Splunk Environments differ. To better support this variation, the 2.0 release of SABP supports a wider set of options for content management:
2.0 Delete Indicator Workflow
Finally, as well as smoothing the process of drilling down to raw data from identified anomalous entities, we’ve introduced a number of quality-of-life improvements for admins and analysts of all domains who are using the SABP for investigation.
2.0 Reviewer User Information
These include:
The Splunk App for Behavioral Profiling 2.0 update is available today directly within both Cloud and On-Prem environments, or via Splunkbase. Hopefully I've enticed you to give it a try with this blog post, but if you’d like to know more you can check out the online documentation!
Thank you, and happy Splunking!
Special thanks to Josh Cowling, my co-developer on this app, for his vital support and to all the Splunkers and customers who’ve shaped the app’s development.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.