Current ThreatQ Version Filter
Splunk Exports
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Export Details
ThreatQuotient provides the following details for this export:
Current Guide Version | 1.0.0 |
Support Tier | ThreatQ Supported |
Introduction
ThreatQuotient makes it easy for customers to export indicators for use with an external threat detection system.
Creating the Export
The following section will detail how to create exports.
See the Managing Exports topic for more details on ThreatQ exports.
- Select the Settings icon > Exports.
The Exports page appears with a table listing all exports in alphabetical order.
- Click Add New Export
The Connection Settings dialog box appears.
- Enter an Export Name.
- Click Next Step.
The Output Format dialog box appears.
- Provide the following information:
Field Value Which type of information would you like to export? Indicators Output Type text/plain Special Parameters indicator.sincedeleted=Y
- Enter the following for the Output Format Template:
#indicator{$tab}indicator_type{$tab}last_modified{$tab}reference_url{$tab}source{$tab}campaign{$tab}status
{foreach $data as $indicator}
{$indicator.value}{$tab}{$indicator.type}{$indicator.updated_at}
{$tab}https://{$http_host}/indicators/{$indicator.id}/details{$tab}{foreach $indicator.Sources item=source name=Sources}{$source.value}{if $smarty.foreach.Sources.last == false}, {/if}{/foreach}{$tab}{foreach $indicator.Adversaries item=adversary name=Adversaries}{$adversary.value}{if $smarty.foreach.Adversaries.last == false}, {/if}{/foreach}{$tab}{$indicator.status}
{/foreach} - Click on Save Settings and enable the export via the On/Off toggle switch.
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Spunk Exports Guide v1.0.0 | N/A |