Integrate RevealX Enterprise with Splunk Enterprise Security SIEM
This integration enables the Splunk Enterprise Security SIEM to export detection data from the ExtraHop system through detection notification rules. You can view exported data in the SIEM to gain insight into security threats in your environment and to accelerate response times.
To configure this integration, you establish a connection between the SIEM and the ExtraHop system, and you create detection notification rules that send webhook data to the SIEM. Integrating the ExtraHop system with Splunk Enterprise Security SIEM is supported on both RevealX 360 and RevealX Enterprise.
After the connection is established and notification rules are configured, you can Install the ExtraHop RevealX App for Splunk on your Splunk SIEM. The app provides a dashboard of detection data and correlation rules that generate detection alerts in Splunk.
Before you begin
You must meet the following system requirements:
- ExtraHop RevealX Enterprise
- You must log in on a console running firmware version 9.8 or later.
- Your user account must have Full Write privileges.
- Your user account must have NDR module access to create security detection notification rules.
- Your user account must have NPM module access to create performance detection notification rules.
- Your ExtraHop system must be connected to ExtraHop Cloud Services.
- Splunk SIEM
- You must have Splunk Enterprise version 9.1 or later
- You must configure a Splunk Enterprise HEC connector for data ingest.
- Your SIEM must be able to receive webhook data over TCP 443 (HTTPS).
Next steps
- Check that your rule has been created and added to the Notification Rules table.
- Click a rule name from the table to modify or delete that rule.
- Install the ExtraHop RevealX App for Splunk to view a detections dashboard and alerts.
Thank you for your feedback. Can we contact you to ask follow up questions?