About Splunk Phantom - Splunk Documentation (2024)

Splunk Phantom 4.10.7 is the final release of Splunk's Security Orchestration, Automation, and Response (SOAR) system to be called Splunk Phantom. All later versions are named Splunk SOAR (On-premises). For more information, see the Splunk SOAR (On-premises) documentation.

Splunk Phantom is a Security Orchestration, Automation, and Response (SOAR) system. The Splunk Phantom platform combines security infrastructure orchestration, playbook automation, and case management capabilities to integrate your team, processes, and tools to help you orchestrate security workflows, automate repetitive security tasks, and quickly respond to threats.

This diagram shows the end-to-end flow of security automation in Splunk Phantom. See the table immediately following the diagram for more information about each Splunk Phantom component in the diagram.

ComponentDescription
AppAdds connectivity to third-party security technologies. The connections allow Splunk Phantom to access and run actions that are provided by the third-party technologies. Some apps also provide a visual component such as widgets that can be used to render data produced by the app.


The diagram shows three apps in a Splunk Phantom environment:

  • The MaxMind app provides an action to find the geographical location of an IP address.
  • The PhishTank app provides an action to find the reputation of a URL.
  • The Palo Alto Networks (PAN) Firewall app provides several actions, such as blocking and unblocking access to IP addresses, applications, and URLs.

See Add and configure apps and assets to provide actions in Splunk Phantom in the Administer Splunk Phantom manual.

AssetA specific instance of an app. Each asset represents a physical or virtual device within your organization such as a server, endpoint, router, or firewall. For example, you might have a Palo Alto Network (PAN) firewall app that connects the firewall to Splunk Phantom. You can configure an asset with the specific connection details for this firewall. If your environment has multiple firewalls, you can configure one asset for each firewall.


The diagram shows one MaxMind asset, one PhishTank asset, and two PAN firewall assets. The PAN assets have different version numbers, which is the reason for having two assets.

See Add and configure apps and assets to provide actions in Splunk Phantom in the Administer Splunk Phantom manual.

ContainerA security event that is ingested into Splunk Phantom.


Containers have the default label of Events. Labels are used to group related containers together. For example, containers from the same asset can all have the same label. You can then run a playbook against all containers with the same label.

You can create custom labels in Splunk Phantom as needed. See Configure labels to apply to containers in the Administer Splunk Phantom manual.

CaseA special kind of container that can hold other containers. For example, if you have several closely related containers for a security incident, you can promote one of those containers to a case and then add the other related containers to the case. Doing this lets you consolidate your investigation rather than having to investigate each container individually.


See Overview of cases.

ArtifactA piece of information added to a container, such as a file hash, IP address, or email header.
Indicator or Indicator of Compromise (IOC)A piece of data such as an IP address, host name, or file hash that populates the Common Event Format (CEF) fields in an artifact. Indicators are the smallest unit of data that can be acted upon in Splunk Phantom.
PlaybookDefines a series of automation tasks that act on new data entering Splunk Phantom. For example, you can configure a playbook to run actions against all new containers with a specific label. Or you can configure running a playbook as part of the workflow in a workbook.


In the diagram, two playbooks are configured:

  • Playbook 1 runs actions from the MaxMind and PAN Firewall version 2.7 assets whenever a new container is created in Splunk Phantom.
  • Playbook 2 runs actions from the PhishTank and PAN Firewall version 3.0 assets whenever a specific workbook is used in a case.

See Use playbooks to automate analyst workflows in Splunk Phantom in the Build Playbooks with the Visual Editor manual.

WorkbookA template providing a list of standard tasks that analysts can follow when evaluating containers or cases.


See Define a workflow in a case using workbooks in Splunk Phantom.

ActionA high level primitive used throughout the Splunk Phantom platform, such as get process dump, block ip, suspend vm, or terminate process. Actions are run in playbooks or manually from the Splunk Phantom web interface.


Actions are made available to Splunk Phantom by apps. See Add and configure apps and assets to provide actions in Splunk Phantom in the Administer Splunk Phantom manual.

OwnerThe person responsible for managing assets in your organization. Owners receive approvals, which are requests to run a particular action on an asset. Approvals are sent to the asset owners and contain a service level agreement (SLA) dictating the expected response time. SLAs can be set on events, phases, and tasks.
  • See Configure approval settings for a Splunk Phantom asset in the Administer Splunk Phantom manual.
  • See Configure the response times for service level agreements in the Administer Splunk Phantom manual for more information about configuring SLAs.
About Splunk Phantom - Splunk Documentation (2024)

FAQs

What is Phantom Splunk? ›

Splunk Phantom, renamed to Splunk SOAR, is a security orchestration, automation, and response (SOAR) solution.

What are the three types of Splunk authentication? ›

Splunk internal authentication with role-based user access. Lightweight directory access protocol (LDAP) A scripted authentication API for use with an external authentication system, such as privileged access management (PAM) or remote authentication dial-in user server (RADIUS) Multifactor authentication.

What is Phantom in cybersecurity? ›

Phantom Cyber Security utilizes artificial intelligence (AI) techniques to predict, detect, and mitigate cyber threats. Automation plays a pivotal role in the function of phantom approaches to cybersecurity.

What is the difference between Splunk Enterprise and Splunk ITSI? ›

Splunk Enterprise is the core product most of us use when we use "Splunk". It's the tool that indexes your machine data and helps you search it and draw value from it. ITSI (IT Service Intelligence) is an app that plugs into Splunk Enterprise.

What are the four stages of Splunk? ›

Today, Splunk has become a platform that allows users to make proper decisions based on a large amount of information. Splunk comprises various components: data collection, indexing, searching, reporting, and visualization. These components work together to provide users with a comprehensive data view.

What is Phantom tool? ›

Phantom is a security orchestration, automation, and response (SOAR) platform designed to streamline and automate security operations and incident response processes. It enables security teams to connect and orchestrate their existing security tools, automate repetitive tasks, and respond to incidents more efficiently.

What are the 3 modes in Splunk search? ›

search mode

A setting that optimizes your search performance by controlling the amount or type of data that the search returns. Search mode has three settings: Fast, Verbose, and Smart. Fast mode speeds up searches by limiting the types of data returned by the search.

What are the three main Splunk components? ›

Splunk Components. The primary components in the Splunk architecture are the forwarder, the indexer, and the search head.

What are the 4 general forms of authentication? ›

The most common authentication methods are Password Authentication Protocol (PAP), Authentication Token, Symmetric-Key Authentication, and Biometric Authentication.

What is phantom used for? ›

An imaging phantom or “phantom” is a scientific device that is often used in the biomedical research community. A phantom is a specially designed object that is utilized as a “stand-in” for human tissue and can be scanned or imaged to evaluate, analyze, and fine-tune the performance of an imaging device.

What is phantom method? ›

Phantoms were originally employed for use in 2D x-ray based imaging techniques such as radiography or fluoroscopy, though more recently phantoms with desired imaging characteristics have been developed for 3D techniques such as SPECT, MRI, CT, Ultrasound, PET, and other imaging methods or modalities.

What is phantom also known as? ›

fictional character. Also known as: The Ghost Who Walks.

What is replacing Splunk? ›

There are several alternatives to Splunk, including SigNoz, Graylog, Loggly, Dynatrace, New Relic, Datadog, Logz.io, Logstash, Fluentd, AppDynamics, and Mezmo.

What is Splunk secret? ›

The splunk. secret file is located in the $SPLUNK_HOME/etc/auth directory. It is used to encrypt and decrypt the passwords in the Splunk configuration files. If the splunk. secret file is removed, a new one is automatically generated.

What are the 4 types of searches in Splunk by performance? ›

How search types affect Splunk Enterprise performance
Search typeRef. indexer throughputPerformance impact
DenseUp to 50,000 matching events per second.CPU-bound
SparseUp to 5,000 matching events per second.CPU-bound
Super-sparseUp to 2 seconds per index bucket.I/O bound
RareFrom 10 to 50 index buckets per second.I/O bound

What is the phantom drone used for? ›

Phantom FC40

Using a 2.4 GHz Wi-Fi connection, it provides almost real-time aerial video on a mobile device, allowing the pilot to capture images and videos as is. However, the FPV range was limited by the signal quality of the mobile device as the connection between the two devices was made directly.

What is the difference between selenium and phantom? ›

Differences Between Selenium vs PhantomJS. Although both Selenium and PhantomJS are open-source options for automation testing, Selenium is much more competent in functional validation for web application testing. PhantomJS is suitable at most for Smoke testing and Sanity testing.

What is the phantom haptic device used for? ›

The PHANToM tracks the motion of the user's finger tip and can actively exert an external force on the finger, creating compelling illusions of interaction with solid physical objects.

Top Articles
Cache vs. cookies: what’s the difference? - Surfshark
1 WEEK UP MOST - Screener
Artem The Gambler
Ups Dropoff Location Near Me
Ross Dress For Less Hiring Near Me
Poe Pohx Profile
Danielle Longet
Find your energy supplier
Why Is Stemtox So Expensive
Aces Fmc Charting
Oro probablemente a duna Playa e nomber Oranjestad un 200 aña pasa, pero Playa su historia ta bay hopi mas aña atras
Echo & the Bunnymen - Lips Like Sugar Lyrics
Mzinchaleft
Parent Resources - Padua Franciscan High School
Khiara Keating: Manchester City and England goalkeeper convinced WSL silverware is on the horizon
Roll Out Gutter Extensions Lowe's
Vipleaguenba
Unforeseen Drama: The Tower of Terror’s Mysterious Closure at Walt Disney World
Kashchey Vodka
Georgia Cash 3 Midday-Lottery Results & Winning Numbers
Gazette Obituary Colorado Springs
Bidevv Evansville In Online Liquid
Craig Woolard Net Worth
Bayard Martensen
Dexter Gomovies
897 W Valley Blvd
Revelry Room Seattle
Cavanaugh Photography Coupon Code
Bi State Schedule
Diggy Battlefield Of Gods
The Hoplite Revolution and the Rise of the Polis
Gabrielle Enright Weight Loss
The Wichita Beacon from Wichita, Kansas
9781644854013
Indio Mall Eye Doctor
Wilson Tattoo Shops
062203010
John M. Oakey & Son Funeral Home And Crematory Obituaries
FedEx Authorized ShipCenter - Edouard Pack And Ship at Cape Coral, FL - 2301 Del Prado Blvd Ste 690 33990
Makes A Successful Catch Maybe Crossword Clue
Keci News
Ouhsc Qualtrics
6463896344
Gelato 47 Allbud
Greg Steube Height
David Turner Evangelist Net Worth
Frank 26 Forum
Metra Union Pacific West Schedule
Gainswave Review Forum
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 6173

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.