Integrate BloodHound Enterprise with Splunk
The BloodHound Enterprise Splunk app ingests your BloodHound Enterprise data into Splunk.
- Use the dashboards to track the Active Directory and Azure attack paths of your environment
- Create alerts to detect when new attack paths emerge or exposure increases
- Enrich your SIEM data with information about the attack paths to and from principals
Note: Version 2.0+ introduces ingest of BHE Audit Log data. To successfully ingest this data the BHE API user must be assigned the ‘Administrator’ role in BHE.
Installation
- Log into your Splunk installation and click on the Find More Apps button.
- Search for “BloodHound Enterprise” and hit Enter. The first result should be the app.
- Click Install. If not already logged in, you will be prompted for your Splunk.com username and password.
- After installation completes, click Open the App.
- The App will prompt you to configure itself. Click Continue to the app setup page.
-
If you have not already, create an API key/ID pair, following Create a non-personal API key/ID pair
- The API user must at least have the read-only role. The Administrator role is required to collect BloodHound Enterprise audit logs.
-
In the setup screen, enter your BloodHound Enterprise domain name (
CODENAME.bloodhoundenterprise.io
), the API key/ID pair you created and click SubmitPlease note the warning—the initial collection can take some time, particularly for longer-term BloodHound Enterprise customers.
Create Index (Splunk cloud only)
The index “bhe-splunk-app” will be created automatically if running Splunk on-prem.
- In Splunk Web, go to Settings > Indexes.
- On the Indexes page, click New Index.
- On the New Index page, in the Index Name field, enter “bhe-splunk-app”.
- Click Save.
Enable Data Input
- In Splunk Web, go to Settings > Data inputs.
- Scroll down, locate, and click on BloodHound Enterprise.
- Click Enable to enable the data input.
Data will now begin flowing into the environment. You can monitor this progress through Splunk itself with the following query:
Customize Index
-
Update Data Input
- In Splunk Web, go to Settings -> Data Inputs
- Click BloodHound Enterprise
- Click Input
- Click More Settings & select preferred index from the drop-down.
- Click Save
-
Update Search Macro
- In Splunk Web, go to Settings -> Advanced Search
- Click Search Macros
- For App, Select BloodHound Enterprise
- Click bhe_index
- Update the Definition to match the custom index name. Example: index=<custom index name>
- Click Save