Introducing Splunk Add-On for Splunk Attack Analyzer & Splunk App for Splunk Attack Analyzer

Following our announcement of Splunk Attack Analyzer in July 2023, we are excited to announce the launch of:

These offerings help us bolster our unified security operations experience by bringing threat analysis results from Splunk Attack Analyzer into the Splunk platform.

The challenges with hiring top talent to staff a modern Security Operations Center (SOC) are ubiquitous. Every SOC team has to contend with a few top-tier analysts being barraged with escalations from tier 1 analysts tasked with triaging an ever-growing volume of alerts hitting the SOC.

Splunk Attack Analyzer multiplies force of SOC teams

Splunk Attack Analyzer can serve as a force multiplier for SOC teams with its capabilities of:

With Splunk Attack Analyzer, every analyst can triage each alert with a high level of proficiency. Moreover, integrations with Splunk SOAR can help automate a large number of alerts altogether based on verdicts from the analysis of a threat from Splunk Attack Analyzer — thereby eliminating workload from the SOC.

However, the gains with Splunk Attack Analyzer don’t stop at triaging individual alerts. Aggregating data across submissions can help SOC teams gain a broader perspective on how adversaries are targeting the organization past their defenses.

The Splunk Add-on and App for Splunk Attack Analyzer combine to help make it easy to visualize and socialize these insights with leadership and across the larger team.

Splunk Add-on for Splunk Attack Analyzer

The Splunk Add-on for Splunk Attack Analyzer ingests results of submissions made to Splunk Attack Analyzer into the Splunk platform. It makes the data searchable and allows teams to build custom queries, reports and dashboards. It can fetch:

Splunk App for Splunk Attack Analyzer

The Splunk App for Splunk Attack Analyzer takes the data ingested by the Add-on and provides a set of out-of-the-box dashboards that:

Usage Insights Dashboard

This dashboard provides insight into where Attack Analyzer is being leveraged by the SOC team today and how usage varies across the team. It provides the following visualizations:

Credential Phishing and Malware Insights

Phishing Insights: Impersonated Brands

Provides insights on brands being impersonated to target employees in phishing attacks that are getting past current security controls.

Phishing Insights: Phish kits

Malware Insights: Malware Families

How this helps your analysts

Blue teams can leverage the insights from the Splunk App for Splunk Attack Analyzer to better understand tactics being leveraged by adversaries and then implement measures that enhance the security posture of the organization. For example security teams can:

To benefit from these new offerings, existing Splunk Attack Analyzer customers can download and install the app on their Splunk platform instance from Splunkbase using the links below:

Learn more about Splunk Attack Analyzer

Ready to automate threat analysis? We’ve got you covered! Visit the Splunk Attack Analyzer webpage or speak to your account manager to learn more.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.