On the SIEM site card, select Get Started. Go to Settings > Data Sources > Security > DATA EXPORTS. How to configure Citrix Analytics App for Splunk.Reset Citrix Analytics configuration passwordĪfter the Citrix Analytics add-on for Splunk is configured, see:.Set up a data input by using the configuration details provided by Citrix Analytics for Security and configure the Citrix Analytics add-on for Splunk.Īfter the Citrix Analytics configuration file is prepared, see: Download the Citrix Analytics Add-on for Splunk and upload the add-on in your Splunk to complete the installation process.Ĭonfigure Citrix Analytics add-on for Splunk. Citrix Analytics for Security prepares a configuration file required for you to configure the Citrix Analytics add-on for Splunk.ĭownload and install Citrix Analytics add-on for Splunk. Create a password for your pre-defined account for authentication. Splunk retrieves this risk intelligence from the channel. Citrix Analytics for Security creates a channel and exports risk intelligence. ![]() Integrate Citrix Analytics for Security with Splunkįollow the guidelines mentioned to integrate Citrix Analytics for Security with Splunk:ĭata export. It helps Citrix Analytics for Security to begin the Splunk integration process. Turn on data processing for at least one data source. ![]() The public IP addresses of the endpoints might change. Use the endpoint names not the IP addresses. Ensure that the endpoints are in the allow list in your network. The Citrix Analytics add-on for Splunk connects to the following endpoints on Citrix Analytics for Security. You can configure Splunk integration on the following Splunk versions: For more information, see Splunk documentation.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |