The new application will enable Splunk Enterprise to provide real-time continuous monitoring and trending of FireEye customer data
Security firm FireEye and real-time operational intelligence software provider Splunk have partnered to release Splunk for FireEye application, which enables customers to consolidate and correlate analytics on cyber attacks.
The new application will enable Splunk Enterprise to provides real-time continuous monitoring and trending of FireEye customer data, along with support for real-time alerting.
Users can now visualise and express long-term trends that aid with the prioritisation of incident response activities, as well as set and monitor key performance metrics.
It also makes the information on inbound and outbound events from FireEye appliances available within the Splunk Enterprise console.
The Splunk for FireEye application provides reports for monitoring malware distribution and callbacks, infection types over time, and the number of infected systems.
The reports also include dashboards that show the number of inbound infections by host IP over time and the number of callbacks over time by malware name.
In addition, the new application offers users an overview of a specific piece of malware, view of each of the callbacks as a transaction and passes the time of a particular malware activity to Splunk.
It also identifies the source and destination, the severity and the infection source port, provides an "over-time" graphical view of communication between the malware and its C2 destination and includes HTTP information along with the URI, HTTP version, user agent and the action.