<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>peax - Splunkbase Apps Releases</title>
    <link>https://splunkbase.splunk.com/apps/</link>
    <description>a list of Newly/updated Splunk apps</description>
    <atom:link href="https://peax-splunk.github.io/splunkbase_rss_feed/rss.xml" rel="self"/>
    <language>en-us</language>
    <lastBuildDate>Tue, 21 Apr 2026 13:03:31 +0000</lastBuildDate>
    <item>
      <title>Splunk Add-on for Tomcat - v3.3.1 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/2911/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;patched log4j&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Splunk Add-on for Tomcat allows a Splunk software administrator to pull Tomcat logs from a local Tomcat server and Tomcat performance data from local and remote Tomcat servers. This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security, the Splunk App for PCI Compliance, and Splunk IT Service Intelligence.

Documentation can be found at https://docs.splunk.com/Documentation/AddOns/released/Tomcat/About&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/9bf7040e-3a50-11f1-9775-bee9464af44e.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Tue, 21 Apr 2026 12:35:23 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/2911/#v3.3.1</guid>
    </item>
    <item>
      <title>CyberArk Audit for Splunk (for Linux 64-bit) - v2.0.35 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6608/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Version 2.0 introduces a completely redesigned architecture for better scalability and manageability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Multi-Integration Support: Configure multiple CyberArk environments in a single Splunk instance&lt;/li&gt;
&lt;li&gt;Enhanced UI Dashboard: New web-based configuration interface for easy setup&lt;/li&gt;
&lt;li&gt;Improved Checkpointing: More reliable state management using KV Store&lt;/li&gt;
&lt;li&gt;Automatic Migration: Seamless upgrade path from version 1.x with automatic configuration migration&lt;/li&gt;
&lt;li&gt;Better Error Handling: Enhanced logging and recovery mechanisms&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;This add-on will collect audit data from the CyberArk services.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;CyberArk Audit for Splunk is a Splunk Add-on that automatically collects and indexes audit logs from your CyberArk services. This integration enables security teams and compliance officers to monitor, investigate, and analyze activities across CyberArk services.

Once configured, it runs autonomously- collecting events, maintaining state, and recovering gracefully from interruptions without manual intervention.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/cdf930a8-3d6b-11f1-9bae-ae8256ffa01e.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CyberArk Software Ltd</dc:creator>
      <pubDate>Tue, 21 Apr 2026 12:29:18 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6608/#v2.0.35</guid>
    </item>
    <item>
      <title>Threat Hunting Essentials - v1.2.15 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7633/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Free Cyber Threat Hunting App to hunt APT, Threat Actors, Malware tools, exploits&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Free Cyber Threat Hunting App to hunt APT, Threat Actors, Malware tools, exploits, etc.

For Premium Version - Contact sales https://www.avertpoint.com/contactus.html

It is a must-have app, which hunts for presence of advanced persistent threats (APTs), threat actors, state-sponsored attackers, malware, and exploits in your organization&amp;#x27;s assets. All detected malware, exploits, and threat actors are mapped to the MITRE ATT&amp;amp;CK framework, providing deep insight into potential risks.

Threat Hunting Essentials detects a wide range of malware tools used by threat actors, including:

1. Backdoor.
2. Worms.
3. Ransomware.
4. Bots.
5. Trojan horses.
6. Keyloggers.
7. Rootkits.
8. Spyware.
9. Fileless malware.
10. Cryptojacking.
11. Wiper malware.
12. Adware.
14. Viruses
15. P2P-Worm
16. Internet Worms
17. Net-worm
18. Clickjacking
19. Cryptominer
20. Fileless malware

You can easily configure the scan interval in the app’s settings. The real-time scan feature continuously monitors for threats in near real-time, as allowed by Splunk.

Information Use: Your email address is used to improve detection logic based on your feedback. Additionally, we may notify you about app upgrades, updates, or changes to features, user agreements, or the privacy policy.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/72c5d150-3d75-11f1-b319-362b5dc26531.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Cyber Essentials Avertpoint</dc:creator>
      <pubDate>Tue, 21 Apr 2026 11:30:41 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7633/#v1.2.15</guid>
    </item>
    <item>
      <title>SpyCloud Application for Splunk - v3.2.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/6373/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
  &lt;li&gt;sightings added to all tabled&lt;/li&gt;
  &lt;li&gt;Maintenance update&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;SpyCloud is the market leader in protecting enterprises and their customers from online fraud, account takeover, and follow-on attacks like ransomware. We provide an early warning of compromised credentials and malware-infected users, so you can take action before the criminals do.

This application provides visualizations that allow the end user to view the SpyCloud data that is loaded by the SpyCloud Add-On for Splunk . Visualizations include a high level dashboard, a breakdown of breach records by the customer’s watchlist assets (domain, email and IP addresses,) and a summary of infected user data, including the ability to drill down into a specific machine infection to see all details for a given malware infection including sites visited, along with credential information.

Note: This Application can display information loaded by the SpyCloud Add-On for Splunk found here: https://splunkbase.splunk.com/app/6373/&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/200acde8-3d6c-11f1-b319-362b5dc26531.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CW Walker</dc:creator>
      <pubDate>Tue, 21 Apr 2026 10:24:38 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6373/#v3.2.0</guid>
    </item>
    <item>
      <title>Ensign ElasticSearch Data Integrator - v1.2.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8645/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Here is the summary of the key upgrades and new features:&lt;/p&gt;
&lt;h3&gt;1. Elasticsearch Cluster Topology Support (New)&lt;/h3&gt;
&lt;p&gt;The most significant enhancement is the flexibility to connect to an Elasticsearch Cluster architecture rather than just a standalone node:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Multi-Node Connection&lt;/strong&gt;: The &lt;code&gt;es_host&lt;/code&gt; parameter now accepts comma-separated hostnames (e.g., &lt;code&gt;node1.es.local, node2.es.local&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Round-robin Load Balancing&lt;/strong&gt;: The add-on performs round-robin load balancing across all configured nodes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Node Sniffing (Auto-Discovery)&lt;/strong&gt;: A new &lt;code&gt;enable_sniffing&lt;/code&gt; toggle allowing the client to automatically discover and connect to all available nodes in the cluster via the ES &lt;code&gt;_nodes&lt;/code&gt; API.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Reliability &amp;amp; Timeout Controls&lt;/strong&gt;: Automatic connection failure retries, supported by configurable parameters (&lt;code&gt;max_retries&lt;/code&gt;, &lt;code&gt;retry_on_timeout&lt;/code&gt;, and &lt;code&gt;connection_timeout&lt;/code&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;2. Cluster Health Monitoring (Preflight Health Check)&lt;/h3&gt;
&lt;p&gt;Before fetching data, the add-on now performs a preflight health check against the Elasticsearch cluster (&lt;code&gt;_cluster/health&lt;/code&gt; API):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It automatically logs the cluster's health status (Green, Yellow, or Red).&lt;/li&gt;
&lt;li&gt;Handled as a non-blocking check: Even if a &lt;em&gt;Red&lt;/em&gt; cluster status triggers a Warning log, data collection will still proceed on a best-effort basis.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;3. Core Library Upgrades&lt;/h3&gt;
&lt;p&gt;The bundled Python libraries have been bumped significantly to patch legacy bugs, avoid vulnerabilities, and officially support the Elasticsearch 8.x ecosystem:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;elasticsearch-py&lt;/code&gt; upgraded from &lt;code&gt;8.8.0&lt;/code&gt; to &lt;strong&gt;&lt;code&gt;8.19.3&lt;/code&gt;&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;elastic-transport&lt;/code&gt; upgraded from &lt;code&gt;8.4.0&lt;/code&gt; to &lt;strong&gt;&lt;code&gt;8.17.1&lt;/code&gt;&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;4. Security Hardening &amp;amp; Remediations&lt;/h3&gt;
&lt;p&gt;Multiple layers of security (defense-in-depth) have been added across the v1.2.0 and v1.2.1 releases:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Restricted Web Endpoints (v1.2.1)&lt;/strong&gt;: Modified &lt;code&gt;web.conf&lt;/code&gt; to narrow an overly broad &lt;code&gt;data/*&lt;/code&gt; REST endpoint exposure down to &lt;code&gt;data/indexes&lt;/code&gt; securely, preventing unnecessary internal Splunk data from being exposed to the browser UI.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secured Internal Splunk REST calls (v1.2.1)&lt;/strong&gt;: Internal communication to the Splunk Daemon now strictly requires SSL verification (&lt;code&gt;verify=True&lt;/code&gt;) and enforces an explicit 30s timeout, protecting the &lt;code&gt;session_key&lt;/code&gt; authentication token on the loopback interface.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Strict SSL/TLS Validation&lt;/strong&gt;: Certificate verification now defaults to &lt;strong&gt;ENABLED&lt;/strong&gt;. If left disabled, an active security warning is generated in the &lt;code&gt;_internal&lt;/code&gt; logs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Proxy Credentials Protection&lt;/strong&gt;: Proxy configurations are scrubbed and removed from the system environment variables (&lt;code&gt;os.environ&lt;/code&gt;) in memory immediately after the Elasticsearch client instantiates, limiting exposure.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SSRF (Server-Side Request Forgery) Protection&lt;/strong&gt;: Strict validation is added to block potentially dangerous &lt;code&gt;es_host&lt;/code&gt; inputs such as localhost, 0.0.0.0, 169.254.169.254, and loopback/link-local bounds.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Log Injection Prevention&lt;/strong&gt;: Sanitization filters were added on stanza names (stripping newlines, tabs, and escape chars) before they are rendered into the event logs.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Let us knows if the features or ideas that need to enhance for future release.&amp;#x20;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Splunk modular input for ingesting data from Elasticsearch 8.x clusters by leveraging call the ElasticSearch v8.x REST API. Features multi-cluster profiles, DSL query filters, scroll-based pagination with crash recovery, document-level deduplication, SSL/TLS support, and a full GUI configuration experience. Compatible with Elasticsearch 8.x only and DSL based only,&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Ensign ElasticSearch Data Integrator is a Splunk modular input add-on for ingesting data from Elasticsearch 8.x clusters into Splunk via the Elasticsearch 8 REST API.

Built on the Splunk UCC Framework, it provides a full GUI-driven configuration experience through Splunk Web — no manual file editing required.

Key Features:
• Multi-cluster Elasticsearch profile management via Splunk UI
• DSL Query-focused data retrieval with configurable time-based fetching
• ES Scroll API pagination for efficient large-volume data collection
• Crash-resilient scroll recovery with a dedicated checkpoint directory
• Document-level deduplication guard (rolling 50,000 IDs per stanza)
• SSL/TLS certificate verification support
• Custom term filters per data source
• Global proxy support with Splunk-native credential encryption
• Custom sourcetype override per input stanza

IMPORTANT: This add-on is designed exclusively for Elasticsearch 8.x API. It is NOT compatible with Elasticsearch 7.x or earlier versions.

Compatibility:
• Elasticsearch: 8.x only
• Splunk Enterprise: 8.2+ and 9.x (You can try for 10.x, let me know the updates)
• Python: 3.x (bundled with Splunk)&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/44e89a62-3d3c-11f1-8530-46c2835d04d1.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Muhammad Rafdi Aufar Ahmad</dc:creator>
      <pubDate>Tue, 21 Apr 2026 10:14:14 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8645/#v1.2.1</guid>
    </item>
    <item>
      <title>Ensign Akamai Web Security Add-on - v1.0.9 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8652/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;v1.0.9 - Bug Fixes and Security Hardening&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fixed: Server-side REST handler input name validator now allows hyphens (-) in input names, matching the client-side UI validation&lt;/li&gt;
&lt;li&gt;Improved: Added detailed error logging for non-200 HTTP responses from Akamai API, including response body for troubleshooting 401/403 errors&lt;/li&gt;
&lt;li&gt;Updated: Source format changed to ensign_akamaisiem://{inputName}_{configId} for better identification&lt;/li&gt;
&lt;li&gt;Fixed: CHANGELOG.md encoding cleaned to pure ASCII (removed mojibake characters)&lt;/li&gt;
&lt;li&gt;Removed: Edgegrid test files from production package&lt;/li&gt;
&lt;li&gt;Security: Full sanitization audit completed, all client-specific references removed&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Captures Akamai security events via SIEM Integration API v1. Built on Splunk UCC with multi-account, multi-proxy, and encrypted credential support.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Ensign Akamai Web Security Add-on for Splunk

An enterprise-grade alternative to the official Akamai SIEM app, rebuilt on the Splunk UCC framework v6.3.0.

WHY THIS ADD-ON?
The official Akamai app (refer to : https://splunkbase.splunk.com/app/4310) uses legacy way for enabled the input (via Settings =&amp;gt; Data Input) and several parsing is not key-value-pair based after coming ingested in Splunk, rather than using spath and makes easier for analyst to choose the fields, this add-ons are one to solve that. This add-on provides:
- Full UI-driven configuration based on your usual for inputs based on Add-ons (just directly configured under the add-ons like the other Splunk Supported Add-ons).
- Multi-account management with encrypted credential storage via Splunk&amp;#x27;s native password vault
- Multi-proxy support (HTTP, HTTPS, SOCKS4, SOCKS5) with per-input proxy assignment
- Offset-based checkpointing for reliable data continuity across restarts.
- Custom sourcetype override per input for seamless migration.
- Deployment Server compatible.

DATA SOURCE:
Captures security events from Akamai SIEM Integration API v1, supporting:
- App &amp;amp; API Protector
- Kona Site Defender
- Web Application Protector
- Client Reputation
- Bot Manager
- Account Protector

EVENT PROCESSING:
- URL-decodes all fields recursively
- Parses HTTP headers into structured key-value pairs
- Decodes base64-encoded attackData rule fields into structured objects
- Drops summary/offset metadata events (nullQueue)

Ref: https://techdocs.akamai.com/siem-integration/docs

Built by Ensign Infosecurity Indonesia.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/98a864f0-37da-11f1-b9af-06e116ea42fd.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Muhammad Rafdi Aufar Ahmad</dc:creator>
      <pubDate>Tue, 21 Apr 2026 10:12:36 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8652/#v1.0.9</guid>
    </item>
    <item>
      <title>Supporting App for Cisco Meeting Server - v0.6.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8413/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Fixed a critical problem where our notion of &quot;call id&quot; and how the cisco_cdr app tied this together, was failing to merge sets of events from different servers into the overall call.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This is a Supporting App designed to be deployed alongside Sideview&amp;#x27;s commercial &amp;quot;Cisco CDR Reporting and Analytics&amp;quot; app.  It provides the Splunk configuration to ingest the CDR data from Cisco Meeting Server. Additionally it contains various pieces of Splunk configuration and logic that are used by Cisco CDR Reporting and Analytics, to make the CMS CDR work within its user interfaces.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/4cd4de08-3d45-11f1-8404-065af4c86201.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sideview, LLC - Partner</dc:creator>
      <pubDate>Tue, 21 Apr 2026 05:46:13 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8413/#v0.6.0</guid>
    </item>
    <item>
      <title>Supporting App for Oracle SBC CDR - v0.8.3 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7051/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Fixed a bug that prevented the new homepage from working properly if the cisco_cdr app was not installed. (It would say only &quot;Action Forbidden&quot;.)&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app provides the Splunk configuration to ingest the CDR data from Oracle SBC.     It is intended to work for both Oracle Session Router CDR and Oracle SBC CDR, although some unknowns remain as of this writing. 

It is also designed to work as a Supporting App alongside Sideview&amp;#x27;s commercial &amp;quot;Cisco CDR Reporting and Analytics&amp;quot; app.  
When used in conjunction with the Cisco CDR app, the Oracle SBC data can be used in that app alongside the CUCM data.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/d3e0cd16-3d3c-11f1-a206-9ed06fa27c31.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sideview LLC</dc:creator>
      <pubDate>Tue, 21 Apr 2026 04:45:35 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7051/#v0.8.3</guid>
    </item>
    <item>
      <title>Supporting App for Expressway CDR - v0.5.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8593/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Fixed a bug that prevented the new homepage from working properly if the cisco_cdr app was not installed. (It would say only &quot;Action Forbidden&quot;.)&lt;/li&gt;
&lt;li&gt;Fixed a problem in the app's health check that crosschecks indexes specified in the Cisco CDR app (if it's present) with the indexes specified in the SA's own &quot;custom_index&quot; macro.&lt;/li&gt;
&lt;li&gt;Fixed a bug in the drilldown for the &quot;Top 20 Calling Parties&quot; chart. Previously the drilldown clicks would take you to all calls to OR from the given number, not just the calls from it.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;This app implements various field extraction configuration and Sideview conventions so as to allow syslog-formatted Expressway CDR data to be not only searched in Splunk effectively, but also to be pulled into Sideview&amp;#x27;s commercial &amp;quot;Cisco CDR Reporting and Analytics&amp;quot; solution on Splunk and investigated and analyzed there.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app implements various field extraction configuration and Sideview conventions so as to allow syslog-formatted Expressway CDR data to be not only searched in Splunk effectively, but also to be pulled into Sideview&amp;#x27;s commercial &amp;quot;Cisco CDR Reporting and Analytics&amp;quot; solution on Splunk and investigated and analyzed there.

NOTE that this Supporting App is designed to be always deployed with Sideview&amp;#x27;s &amp;quot;Supporting Add-on for Expressway CDR&amp;quot; ALSO deployed on the Indexing tier. That &amp;quot;Add-on&amp;quot; component contains crucial index-time configuration to index the CDR into Splunk correctly, and that index-time configuration is NOT duplicated in this app here.  Therefore if you intend to set up a standalone deployment you will need both the TA and the SA.

These two apps are furthermore designed to work with Sideview&amp;#x27;s commercial &amp;quot;Cisco CDR Reporting and Analytics&amp;quot; app. When all three components are present and deployed to the right tiers, users can navigate, troubleshoot and build ad-hoc charts and reports around the Expressway data, within the the Cisco CDR app&amp;#x27;s complex user interfaces.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/af0d59aa-3d3c-11f1-b797-5abed683dd81.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sideview, LLC - Partner</dc:creator>
      <pubDate>Tue, 21 Apr 2026 04:44:38 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8593/#v0.5.2</guid>
    </item>
    <item>
      <title>Supporting App for CUBE - v0.5.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8614/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Created 2 new fields &quot;internal_party_number&quot; and &quot;external_party_number&quot; to better align with the CUCM CDR side.&lt;/li&gt;
&lt;li&gt;Fixed a bug that prevented the new homepage from working properly if the cisco_cdr app was not installed. (It would say only &quot;Action Forbidden&quot;.)&lt;/li&gt;
&lt;li&gt;Fixed a bug in the drilldown for the intraday calling volume chart.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app implements various field extraction configuration and Sideview conventions so as to allow CDR and also syslog data from CUBE to be not only searched in Splunk effectively, but also to be pulled into Sideview&amp;#x27;s commercial &amp;quot;Cisco CDR Reporting and Analytics&amp;quot; solution and investigated and analyzed there.

NOTE that this Supporting App is designed to be always deployed with Sideview&amp;#x27;s &amp;quot;Supporting Add-on for CUBE&amp;quot; ALSO deployed on the Indexing and/or Forwarding tiers. That &amp;quot;Add-on&amp;quot; component contains crucial index-time configuration to index the data into Splunk correctly, and the index-time configuration in that TA is NOT duplicated in this app here.  Therefore if you intend to set up a standalone deployment you will need both the TA and the SA.

These two apps are furthermore designed to work with Sideview&amp;#x27;s commercial &amp;quot;Cisco CDR Reporting and Analytics&amp;quot; app. When all three components are present and deployed to the right tiers, users can navigate, troubleshoot and build ad-hoc charts and reports around your CUBE data, within the the Cisco CDR app&amp;#x27;s complex user interfaces.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/dde095e2-3d34-11f1-8530-46c2835d04d1.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sideview, LLC - Partner</dc:creator>
      <pubDate>Tue, 21 Apr 2026 03:49:06 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8614/#v0.5.2</guid>
    </item>
    <item>
      <title>Splunk Add-on for AWS Security Hub - v1.0.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8642/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Use the Splunk Add-on for AWS Security Hub to ingest real-time events from AWS Security Hub and convert them into findings and intermediate findings in Splunk Enterprise Security. Consolidating findings in Splunk Enterprise Security helps to centralize data management across AWS Cloud platforms and services and leverage the threat detection capabilities of Splunk Enterprise Security.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/fede2de4-3a97-11f1-b6b7-caeb896af8b6.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8642/#v1.0.0</guid>
    </item>
    <item>
      <title>VulnCheck Exploit Intelligence App for Splunk - v1.0.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8225/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h3&gt;Version 1.0.1&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Ad hoc Enriched Data Dashboard&lt;/strong&gt; - New dashboard that displays the latest enriched data from ad hoc enrichment operations.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CVSS Metric V4&lt;/strong&gt; - Support for CVSS Version 4 metrics has been added.&lt;/li&gt;
&lt;li&gt;The lookup structure has changed in this version, please refer to the &lt;strong&gt;UPGRADE&lt;/strong&gt; section.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Batch Processing&lt;/strong&gt; - Introduced consistent batch size handling across all enrichment operations&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Accelerated Lookup Performance&lt;/strong&gt; - New &lt;code&gt;vulncheck_enriched_fast&lt;/code&gt; lookup with pre-computed fields for faster dashboard queries&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upgrade to v1.0.1&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Follow the General upgrade steps section.&lt;/li&gt;
&lt;li&gt;Existing data will be migrated to the new lookup structure by a scheduled saved search (runs every 24 hours).&lt;/li&gt;
&lt;li&gt;For manual execution, follow the steps below.&lt;/li&gt;
&lt;li&gt;Go to Settings &amp;gt; Searches, reports, and alerts. Filter by VulnCheck app.&lt;/li&gt;
&lt;li&gt;search &lt;strong&gt;vulncheck_exploit_intelligence_enrichment_all_time&lt;/strong&gt; and click on Run.&lt;/li&gt;
&lt;li&gt;Existing data will be migrated to the new lookup structure.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The VulnCheck Exploit Intelligence App for Splunk empowers security teams to enrich CVE data with real-world exploitation intelligence directly inside Splunk. By integrating VulnCheck&amp;#x27;s comprehensive APIs, the app delivers enriched vulnerability insights, SBOM-driven risk analytics, and threat actor correlation, enabling customers to prioritize vulnerabilities based on active exploitation and real risk, not just static CVSS scores.

*NOTE: This app requires a PAID subscription to VulnCheck Vulnerability &amp;amp; Exploit Intelligence*&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/320addae-3cf3-11f1-8530-46c2835d04d1.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">VulnCheck Exploit Intelligence</dc:creator>
      <pubDate>Mon, 20 Apr 2026 20:05:07 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8225/#v1.0.1</guid>
    </item>
    <item>
      <title>PowerConnect for SAP Solutions - v9.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/3153/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;For release notes, please see our &lt;a href=&quot;https://docs.rhondos.com/powerconnect/release-notes-for-splunk-app-v9-1-0&quot;&gt;documentation.&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;PowerConnect Consists of two primary components:  An SAP add-on that is installed within your SAP environment and The Splunk app (listed on this page)

PowerConnect - SAP Add-On:   Sold via RHONDOS, Splunk, and numerous other resell agents.   The PowerConnect Add-On is an SAP certified software that installs into NetWeaver ABAP, S/4 HANA, NetWeaver Java, SAP Cloud Platform or TomCat Java based SAP systems and uploads events directly to Splunk Enterprise or Splunk Cloud in real time.

PowerConnect - Splunk Application:   This Splunk powered application provides functionality for visualizing, monitoring, and managing SAP systems.  This application requires data ingestion from SAP which is facilitated by an SAP Netweaver based technology add-on called &amp;quot;PowerConnect for SAP Solutions&amp;quot;&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/5f0473c2-3ceb-11f1-8404-065af4c86201.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">RHONDOS LLC</dc:creator>
      <pubDate>Mon, 20 Apr 2026 19:15:46 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3153/#v9.1.0</guid>
    </item>
    <item>
      <title>Alpha Level for Linux - v2.2.2 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8416/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Reduce security alert fatigue by automatically identifying false positives and duplicate alerts using machine learning.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Alpha Level automatically reduces security alert fatigue by identifying false positive and duplicate alerts, allowing your SOC team to focus on genuine threats.

THE PROBLEM
Security teams are overwhelmed by alert volume. Studies show up to 80% of security alerts are false positives or duplicates, leading to analyst burnout, missed threats, and wasted resources.

HOW IT WORKS
Alpha Level uses two ML-powered detection methods:

  • Regularity Detection - Identifies alerts that exhibit predictable patterns typically associated with benign automated activity.

  • Duplication Detection - Identifies alerts that are semantically similar to recent alerts, reducing noise from alert storms.

KEY FEATURES
  • Automatic enrichment of Splunk ES notable events
  • Alpha Score (0-100) indicates likelihood of true positive
  • Works out of the box with no tuning required
  • Supports custom alert sources beyond Splunk ES
  • Simple Overview dashboard for monitoring

REQUIREMENTS
  • Splunk Enterprise 8.2+
  • Python for Scientific Computing (PSC) add-on for your platform
  • Splunk Enterprise Security (optional, recommended)

Alpha Level integrates seamlessly with your existing Splunk ES workflow, adding actionable context to every alert.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/f6e945ca-3c9e-11f1-9f14-0676daea94ab.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aidan McLaughlin</dc:creator>
      <pubDate>Mon, 20 Apr 2026 18:42:12 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8416/#v2.2.2</guid>
    </item>
    <item>
      <title>Splunk AI Assistant - v2.0.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7245/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;See what the Splunk AI Assistant can do for you https://youtu.be/ynRBiepXVw4?si=eua38GwP0nwuvk3m&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Splunk AI Assistant is your AI-powered companion for getting answers from your data in Splunk. Whether you&amp;#x27;re a seasoned Splunk expert or just getting started, the assistant helps you discover, analyze, and act on your data through natural conversation — going far beyond just writing and explaining SPL. https://youtu.be/ynRBiepXVw4?si=eua38GwP0nwuvk3m

What Splunk AI Assistant can do for you:

With Agent Mode, the assistant can now reason through your requests, take actions on your behalf, and leverage a rich set of tools and skills — all from a single chat window. The assistant decomposes complex questions into parallel steps, exposes its reasoning to build trust, and asks clarifying questions for ambiguous prompts.

🚀 Intelligent SPL Generation, Editing &amp;amp; Optimization: Describe what you want to search in plain English, and the assistant translates it into accurate SPL — or modifies existing queries based on your instructions without rewriting from scratch, while making them faster – leading to quicker insights!

📖SPL Explanation: Understand any SPL search in plain English, complete with a detailed breakdown of its logic and purpose.

🔍Data Discovery: Don&amp;#x27;t know where your data lives? The assistant scans your environment and identifies the right data sources for your question.
⚡Search Execution &amp;amp; Analysis: The assistant executes searches on your behalf (with your explicit permission) and summarizes results directly in chat — so you get answers, not just queries.

📊Knowledge Object Discovery: Find and reuse existing dashboards, saved searches, reports, and lookups through natural language. The assistant retrieves the best-matching content so you can build on what your team has already created.

📚Knowledge Retrieval: Get answers to questions about Splunk documentation, platform terms, or products.

Teach AI (Beta) Administrators can provide custom instructions via a markdown file to teach Splunk AI Assistant about their organization&amp;#x27;s best practices, data catalog, and custom guardrails. This makes the assistant smarter and more relevant to your environment — and gives admins greater control over how AI operates in their deployment.

Context Settings Formerly known as Personalization, Context Settings generate more accurate and contextual results by considering your unique data and environment, while only using non-personal contextual metadata and honoring role-based access controls. Administrators have full visibility into the data collected from their deployment.

Model Runtime Choices Splunk AI Assistant leverages models in Azure OpenAI in addition to Splunk-hosted LLMs for the best available response quality.

Availability Splunk AI Assistant is available to Splunk Cloud customers in AWS and Azure commercial regions, FedRAMP IL2, and Enterprise customers through Cloud Connected. Agent Mode is available to AWS commercial Splunk Cloud customers with this release.

(c) Splunk 2026. All rights reserved.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/6aaa075e-33b4-11f1-a133-e246e7eb4d2d.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Mon, 20 Apr 2026 18:20:11 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7245/#v2.0.0</guid>
    </item>
    <item>
      <title>InSitzes App for Splunk Cloud - v3.0.11 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8097/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Bug Fixes&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Unified Splunk Cloud monitoring with 31 automated health checks, SVC compute attribution (by user, app, search head, and provenance), DDAS &amp;amp; DDAA storage forecasting with optional cost modeling, ingestion anomaly detection, scheduled-search and workload analysis, dashboard refresh tracking, and a guided remediation tab — all in a single React dashboard with PDF export.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The InSitzes App for Splunk Cloud is a unified monitoring suite that gives administrators actionable insight into ingestion, system performance, workload management, search efficiency, storage, and compute consumption across their Splunk Cloud environment. Rather than hopping between the Cloud Monitoring Console, license pages, and ad-hoc searches, admins get one React-powered dashboard with 12 purpose-built tabs to answer the questions that matter most: Is my environment healthy? Is data flowing reliably? Are searches running efficiently? Where are my SVCs being consumed? How fast is storage growing, and do I have enough capacity to meet demand?

The Health tab runs 31 automated checks across 8 categories — System, Ingestion, Data Quality, Search, Compute, Storage, Workload, Forwarding, and Capacity — with weighted severity scoring and a rolled-up environment health score so you know at a glance where to focus. Individual tabs drill into SVC attribution by user, app, search head, provenance and search type; DDAS and DDAA storage utilization and forecasting with an optional Cost Mode; scheduled search skip reasons and wasteful-search detection; WLM filtered, reclassified, and aborted search rates; HEC throughput and SSL connectivity issues; dashboard refresh frequency and chain-search analysis; indexer cache churn and queue health; and license headroom trends. A guided Remediation tab translates every health finding into concrete next steps.

All charts render client-side as SVG so dashboards export cleanly to PDF for executive reporting. Ingestion data is read live from _internal license_usage events, eliminating scheduled-lookup maintenance. Pre-built alert saved searches (disabled by default) are included for ingestion anomalies, storage utilization, app updates, large lookup files, and redundant scheduled searches. The app helps teams proactively detect issues, optimize resource usage, and align capacity to real business demand.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/1b23eb6e-39c7-11f1-9791-3efbe26b2662.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Sitzes</dc:creator>
      <pubDate>Mon, 20 Apr 2026 18:10:28 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8097/#v3.0.11</guid>
    </item>
    <item>
      <title>InSitzes App for Splunk Enterprise Monitoring - v3.0.11 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8438/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Bug Fixes&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Unified Splunk Enterprise monitoring in one React dashboard: 31 automated health checks, hourly SVC estimation for Splunk Cloud cost modeling, license tracking, ingestion anomaly detection, full-stack CPU/memory/disk visibility, and scheduled-search and workload analysis.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The InSitzes App for Splunk Enterprise is a unified monitoring suite that gives administrators actionable insight into ingestion, system performance, workload management, search efficiency, and compute consumption across their Splunk Enterprise deployment. Rather than stitching together the Monitoring Console, license pages, introspection data, and ad-hoc searches, admins get one React-powered dashboard with purpose-built tabs to answer the questions that matter most: Is my environment healthy? Is data flowing reliably? Are searches running efficiently? Am I approaching my license quota? And what would my workload cost under Splunk Cloud compute-based licensing?

The Health tab runs 31 automated checks across 8 categories — System, Ingestion, Data Quality, Search, Compute, Workload, Forwarding, and Capacity — with weighted severity scoring and a rolled-up environment health score so you know immediately where to focus. Individual tabs drill into CPU, memory, and disk utilization across every server role (search heads, indexers, cluster manager, deployment server, SHC deployer); live license usage with 7-day trend against daily quota; forwarder throughput, HEC health, SSL and deployment-client issues; sourcetype parsing, timestamp, and debug-event quality; scheduled search execution, skip reasons, and wasteful-search detection; WLM filtered, reclassified, and aborted search rates; and dashboard refresh frequency with base vs. chained search analysis.

The Compute tab delivers an hourly-computed SVC estimate — via the bundled insitzes_svc_estimation saved search and dynamic role discovery on _introspection data — so Enterprise admins can see exactly what their workload would cost under Splunk Cloud compute-based licensing, broken down by search head, app, search type, user, and provenance, with an optional Cost Mode. Install on your Monitoring Console search head; ingestion data is read live from _internal license_usage events, eliminating scheduled-lookup maintenance. Pre-built alert saved searches (disabled by default) cover ingestion anomalies, app updates, large lookup files, and redundant scheduled searches.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/1d7fbb7c-39c7-11f1-9775-bee9464af44e.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Sitzes</dc:creator>
      <pubDate>Mon, 20 Apr 2026 18:10:14 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8438/#v3.0.11</guid>
    </item>
    <item>
      <title>Splunk DB Connect - v4.2.4 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/2686/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;See &lt;a href=&quot;https://help.splunk.com/en/splunk-cloud-platform/connect-relational-databases/release-notes/4.2/whats-new&quot;&gt;Release Notes&lt;/a&gt; for Splunk DB Connect.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Warning: You can&amp;#x27;t upgrade DB Connect directly from versions earlier than 3.18.0 to versions 4.0.0 or later. Make sure to follow upgrade path guide.

Splunk DB Connect is a generic SQL database extension for Splunk that enables easy integration of database information with Splunk queries and reports. Splunk DB Connect supports DB2/Linux, Informix, MemSQL, MySQL, AWS Aurora, Microsoft SQL Server, Oracle, PostgreSQL, AWS RedShift, SAP SQL Anywhere, Sybase ASE, Sybase IQ, Teradata, InfluxDB and MongoDB Atlas &amp;amp; Standalone.

Use Splunk DB Connect&amp;#x27;s Inputs to import structured data for powerful indexing, analysis, and visualization. Use Outputs to export machine data insights to a legacy database to increase your organization&amp;#x27;s insight. Use Lookups to add meaningful information to your event data by referencing fields in an external database. Use query commands to build live dashboards mixing structured and unstructured data.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/410abace-3ca6-11f1-a430-0aeaf1d31050.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Mon, 20 Apr 2026 15:30:13 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/2686/#v4.2.4</guid>
    </item>
    <item>
      <title>Tenable.sc - v2.5.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5938/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Added API key authentication support. Users can now authenticate using an &lt;code&gt;access_key&lt;/code&gt; and &lt;code&gt;secret_key&lt;/code&gt; instead of username/password. API key authentication takes precedence if both methods are configured.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app integrates with Tenable&amp;#x27;s SecurityCenter to provide endpoint-based investigative actions&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/cabd5f9e-3c95-11f1-982f-8ee072eff071.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Mon, 20 Apr 2026 08:49:08 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5938/#v2.5.0</guid>
    </item>
    <item>
      <title>MS Graph for Office 365 - v4.1.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5824/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Fixed an OAuth token generation crash by returning a consistent tuple.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app connects to Office 365 using the MS Graph API to support investigate and generic actions related to the email messages and calendar events&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/31084a8a-3c95-11f1-9be9-aac78d333027.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Mon, 20 Apr 2026 08:44:50 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5824/#v4.1.1</guid>
    </item>
    <item>
      <title>CCX Extensions for Netskope - v1.0.4 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7420/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;This add-on provides additional extraction and CIM compliance for sourcetype:&lt;/p&gt;
&lt;p&gt;- netskope:cloud_exchange (new coverage)&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;About Us:
CyberCX is Australia’s greatest force of cyber security experts. Our highly skilled professional services team operates a 24x7 on-shore security operations centre (SOC) servicing corporate and public sector organisations across Australia and New Zealand, specialising in Security Operations services leveraging Splunk.

Description:
The CCX Add-on for Netskope Extensions looks to provide additional field extraction and CIM compliance for Netskope log sources captured via the Add-on Netskope Add-on For Splunk.

This Technical Add-on does not replace the public Splunk Add-on for Netskope (https://splunkbase.splunk.com/app/3808/) but works as an additonal extension to be deployed on Search Heads (only).

Currently this add-on provides additional extraction and CIM compliance for sourcetypes:

- netskope:alert
- netskope:application
- netskope:connection
- netskope:incident
- netskope:audit
- netskope:cloud_exchange

Fully compatible with Splunk Enterprise and Splunk Cloud, built by an Ops team for Ops teams.

Features:
- This TA currently supports logtypes tagged under the following CIM datamodels: Alerts, Authentication, Change, Inventory, Data Loss Prevention (DLP), Malware, Network Traffic, Network Session, and Web.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/dfb8db66-3c5a-11f1-aa45-e20d4a803e37.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Henrique Linsmeyer</dc:creator>
      <pubDate>Mon, 20 Apr 2026 01:49:48 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7420/#v1.0.4</guid>
    </item>
    <item>
      <title>cve.icu - CVE Intelligence for Splunk - v2.0.3 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8395/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h2&gt;v2.0.3 — Fix: Risk Priority Dashboard Error&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Fix:&lt;/strong&gt; Removed an invalid lookup join from the Risk Priority dashboard's &quot;High-EPSS CVEs&quot; panel. The query was joining on a &lt;code&gt;cve_id&lt;/code&gt; field that doesn't exist in &lt;code&gt;cve_daily_summary.csv&lt;/code&gt;, causing the panel to display a lookup error instead of the count.&lt;/p&gt;
&lt;p&gt;Also includes the v2.0.2 fix: replaced &lt;code&gt;run_on_startup&lt;/code&gt; with tighter cron schedules (every 5-10 minutes) for index-dependent saved searches, so dashboard lookups reliably populate within 10 minutes of a fresh install.&lt;/p&gt;
&lt;hr&gt;
&lt;h2&gt;What's New in v2.0 (included in v2.0.3)&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Requires Splunk 10.0+ or Splunk Cloud.&lt;/strong&gt; Users on Splunk 9 should remain on v1.0.6.&lt;/p&gt;
&lt;h3&gt;New Features&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Four Dashboard Studio v2 dashboards: CVE Explorer, Risk Priority, Vulnerability Landscape, and Operational Health&lt;/li&gt;
&lt;li&gt;EPSS enrichment: Daily FIRST EPSS scores joined at search time for exploit probability ranking&lt;/li&gt;
&lt;li&gt;CISA KEV integration: Known Exploited Vulnerabilities catalog refreshed every 6 hours&lt;/li&gt;
&lt;li&gt;SSVC decision data: CISA Stakeholder-Specific Vulnerability Categorization from ADP containers&lt;/li&gt;
&lt;li&gt;Risk Priority lookup: Pre-computed table combining CVSS, EPSS, KEV, and SSVC data for fast triage&lt;/li&gt;
&lt;li&gt;Zero-configuration start: Input enabled by default, data starts flowing immediately after install&lt;/li&gt;
&lt;li&gt;Configurable index macro: All dashboards and saved searches use the cveicu_index macro&lt;/li&gt;
&lt;li&gt;CIM Vulnerabilities data model mapping&lt;/li&gt;
&lt;li&gt;CI/CD pipeline: GitHub Actions with unit tests, AppInspect validation, and Docker integration tests&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Improvements&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;CVSS v4.0 support in addition to v3.1, v3.0, and v2.0&lt;/li&gt;
&lt;li&gt;Multi-value field extractions for CWE IDs, vendors, products, and references&lt;/li&gt;
&lt;li&gt;Pre-computed dashboard lookups for instant panel loading&lt;/li&gt;
&lt;li&gt;Expanded CWE lookup: 298 unique entries covering CWE Top 25, OWASP Top 10, and more&lt;/li&gt;
&lt;li&gt;Cooperative timeout management and memory monitoring (512MB limit)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Breaking Changes from v1.x&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Splunk 10+ required for dashboards (Dashboard Studio v2)&lt;/li&gt;
&lt;li&gt;Setup page removed: GitHub token configured via REST API&lt;/li&gt;
&lt;li&gt;Python 3.11+ required (3.9 dropped)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Migration from v1.x&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Upgrade Splunk to 10.0+ first&lt;/li&gt;
&lt;li&gt;Install v2.0.3 via Manage Apps&lt;/li&gt;
&lt;li&gt;No data migration needed -- same sourcetypes and field extractions&lt;/li&gt;
&lt;li&gt;If using a custom index, create local/macros.conf with your cveicu_index definition&lt;/li&gt;
&lt;/ol&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Ingest the complete CVE V5 database (327,000+ vulnerabilities) into Splunk in minutes. Features bulk ZIP downloads, hourly delta updates, CVSS/EPSS/KEV/SSVC risk enrichment, and four Dashboard Studio dashboards. Works out of the box with no API keys or setup required.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The cve.icu add-on ingests the complete CVE V5 database directly into Splunk. Unlike traditional collectors that rely on slow per-CVE API crawling, this add-on streams data from official GitHub release ZIP files, enabling initial ingestion of over 327,000 CVE records in minutes. Hourly delta updates keep the data current with only a few API calls per run -- no GitHub token required.

Key Features:

Full CVE V5 Schema Support: Parses the modern CVE JSON 5.x schema including cveMetadata, CNA containers, and CISA-ADP enrichment. Extracts CVSS scores across all versions (v2.0, v3.0, v3.1, v4.0), CWE classifications, and affected product/vendor data.

Risk Prioritization Beyond CVSS: Integrates three enrichment sources to help security teams identify &amp;quot;patch now&amp;quot; threats: FIRST Exploit Prediction Scoring System (EPSS) scores updated daily, CISA Known Exploited Vulnerabilities (KEV) catalog refreshed every 6 hours, and CISA SSVC (Stakeholder-Specific Vulnerability Categorization) decision data from ADP containers.

Four Dashboard Studio Dashboards: CVE Explorer for searching and filtering the full database, Risk Priority for EPSS/KEV/SSVC-ranked threat triage, Vulnerability Landscape for executive-level trend analysis, and Operational Health for monitoring ingestion status and errors.

Production-Ready Architecture: Resource-aware modular input with memory monitoring (512MB limit), cooperative timeout management, and KV Store checkpointing with file fallback. Pre-computed lookup CSVs power dashboard KPIs so panels load instantly without running expensive searches. Splunk Cloud compatible and AppInspect validated.

Zero-Configuration Start: Works out of the box -- install and data starts flowing. No API keys, no setup pages, no index creation required. Customize the target index via the cveicu_index macro when ready.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/1e06e8c0-3c3a-11f1-90bf-ee5fde511842.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jerry Gamblin</dc:creator>
      <pubDate>Sun, 19 Apr 2026 21:57:43 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8395/#v2.0.3</guid>
    </item>
    <item>
      <title>Alpha Level Alert Refinery - v2.0.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8022/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Major upgrade. Replaces S3 transport with managed pull over MGMT port / HEC push. No Python, no modular inputs - the TA is now conf-only. New KV store-backed auto-lookup enriches events with Alpha Level scores. Includes Getting Started and Readiness dashboards. Defaults to index\=main for zero-setup deployment.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app, when used in conjunction with the Alpha Level Alert Refinery, automatically enriches Splunk Enterprise Security notable events with Alpha Level scores. Alpha Level pulls events over the management port, scores them externally, and pushes results back via HEC. Each alert receives an Alpha Score and Alpha Determination based on how likely it is to be a True Positive (higher score is more likely). Scores are joined to events automatically via a KV store lookup, so analysts see them directly in Incident Review. The app includes a Readiness dashboard to verify your environment is configured correctly before enabling the integration.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/6af0e77e-3bd8-11f1-9791-3efbe26b2662.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aidan McLaughlin</dc:creator>
      <pubDate>Sun, 19 Apr 2026 10:38:58 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8022/#v2.0.0</guid>
    </item>
    <item>
      <title>Nucleus User Logs Technology Add-on - v1.0.7 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8621/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Fixed bug in parameter naming convention.&lt;/p&gt;
&lt;p&gt;Enabled modular input so users can configure the TA via UI.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Ingest Nucleus Security audit logs into Splunk for security monitoring, compliance auditing, and user activity analysis. This Technology Add-on provides automated REST API polling with intelligent deduplication and pre-built field extractions for login events, logouts, and role modifications.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Nucleus User Logs Technology Add-on (TA-nucleus-logs) enables seamless ingestion of audit logs from the Nucleus Security platform into Splunk Enterprise.

Problem Addressed:
Organizations using Nucleus Security need to aggregate and analyze user activity, authentication events, and role modifications for security monitoring, compliance auditing, and incident response. Without this integration, security teams must manually access the Nucleus platform to review audit logs, making it difficult to correlate Nucleus user activity with other security events across their environment.

Solution Provided:
+ Automated Data Collection: Continuously polls the Nucleus Security REST API (/nucleus/api/logs endpoint) to retrieve audit logs at configurable intervals
+ Intelligent Deduplication: Uses checkpoint-based tracking with SHA1 hashing to prevent duplicate events while ensuring no data loss
+ Pre-configured Field Extractions: Automatically extracts key fields from audit logs including usernames, actions (login, logout, role modifications), outcomes, browser information, and organizational IDs
+ CIM Compatibility: Normalizes data with consistent field naming (nucleus.user, nucleus.action, nucleus.outcome) to facilitate integration with Splunk Enterprise Security and other analytics apps
+ Flexible Deployment: Supports multiple Nucleus instances through separate input configurations

Use Cases:
+ Security monitoring and threat detection (failed logins, unusual access patterns)
+ Compliance reporting (user access auditing, privileged user tracking)
+ Incident investigation (correlating Nucleus user activity with security events)
+ User behavior analytics across hybrid environments&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/2212099a-3b63-11f1-9775-bee9464af44e.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Page</dc:creator>
      <pubDate>Sat, 18 Apr 2026 20:20:40 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8621/#v1.0.7</guid>
    </item>
    <item>
      <title>Spur Enrichment for Splunk - v1.1.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7126/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;This release focuses on making the app a more integrated experience rather&lt;/p&gt;
&lt;p&gt;than a collection of search commands.&lt;/p&gt;
&lt;p&gt;Opening the app now lands on a new Overview page with copy and paste&lt;/p&gt;
&lt;p&gt;examples for every search command, a panel showing which feeds are&lt;/p&gt;
&lt;p&gt;currently ingesting, and a breakdown of infrastructure types and anonymous&lt;/p&gt;
&lt;p&gt;tunnel operators appearing in your data. It provides a fast way to confirm&lt;/p&gt;
&lt;p&gt;the installation is working end to end.&lt;/p&gt;
&lt;p&gt;Analysts can right click any IP field in a search result (src_ip,&lt;/p&gt;
&lt;p&gt;clientip, dest_ip, and the usual variants) to run &quot;Enrich with Spur&lt;/p&gt;
&lt;p&gt;Context API&quot; or &quot;Locate with Spur IP Geo&quot; directly from the field menu,&lt;/p&gt;
&lt;p&gt;without writing SPL.&lt;/p&gt;
&lt;p&gt;Feed queries are significantly faster. Feed events are now parsed as JSON&lt;/p&gt;
&lt;p&gt;at ingest time, and ip, feed_type, infrastructure, and tunnel operators&lt;/p&gt;
&lt;p&gt;are promoted to indexed fields. Queries using tstats read these values&lt;/p&gt;
&lt;p&gt;directly from the TSIDX, so dashboards that previously scanned millions of&lt;/p&gt;
&lt;p&gt;events complete in milliseconds.&lt;/p&gt;
&lt;p&gt;Event timestamps are now accurate. Feed events previously carried the&lt;/p&gt;
&lt;p&gt;wall clock time from when Splunk ingested them, which made time series&lt;/p&gt;
&lt;p&gt;analysis and historical replays unreliable. The _time field now derives&lt;/p&gt;
&lt;p&gt;from the feed's own feed_date, so events are placed on the day the feed&lt;/p&gt;
&lt;p&gt;actually covers.&lt;/p&gt;
&lt;p&gt;Each feed event is stamped with its feed_type, allowing you to filter or&lt;/p&gt;
&lt;p&gt;break down events by feed type across all inputs regardless of how those&lt;/p&gt;
&lt;p&gt;inputs were named.&lt;/p&gt;
&lt;p&gt;The spurfeedingest modular input previously failed silently when the API&lt;/p&gt;
&lt;p&gt;token was not configured on the indexer. It now logs a clear error&lt;/p&gt;
&lt;p&gt;message, including a reminder that SHC password replication does not&lt;/p&gt;
&lt;p&gt;reach indexers. This is a common source of confusion when setup appears&lt;/p&gt;
&lt;p&gt;to succeed on a search head but no events are ingested. The modular input&lt;/p&gt;
&lt;p&gt;also now logs the active feed type at INFO level so a healthy ingest is&lt;/p&gt;
&lt;p&gt;visible in spur.log.&lt;/p&gt;
&lt;p&gt;Search Head Cluster configuration is more robust. Completing setup on one&lt;/p&gt;
&lt;p&gt;SH member now replicates the configured state to other members&lt;/p&gt;
&lt;p&gt;automatically. Brief delays may occur while Splunk Web refreshes its&lt;/p&gt;
&lt;p&gt;in memory manifest, and the README documents the remediation options if&lt;/p&gt;
&lt;p&gt;that happens.&lt;/p&gt;
&lt;p&gt;You can retarget every shipped dashboard and search to a different index&lt;/p&gt;
&lt;p&gt;by editing one macro (spur_index, default index\=spur) rather than&lt;/p&gt;
&lt;p&gt;modifying dashboards individually. Two helper macros are also included:&lt;/p&gt;
&lt;p&gt;spur_enrich(field) for streaming enrichment, and spur_anonymous for&lt;/p&gt;
&lt;p&gt;filtering to events with at least one anonymous tunnel.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Official Spur Splunk Application. Enhance your Splunk experience with the Spur Enrichment for Splunk App. This application integrates with Spur products, providing you with enriched data and insights right in your Splunk environment. Generate events based on IP inputs, enrich existing events with data from the Spur Context API, and insert feed data into a Splunk index with our modular input feature.

The Spur Splunk App requires an active Spur subscription and specific user privileges for installation. 

Once installed, you can utilize our search commands and modular input features to generate and enrich your data. 

Get the most out of your data with the Spur Splunk App. Download today and start exploring your data in new ways.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/4f967ef2-3b2f-11f1-9775-bee9464af44e.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Spur Intelligence Corporation</dc:creator>
      <pubDate>Sat, 18 Apr 2026 14:12:05 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7126/#v1.1.1</guid>
    </item>
    <item>
      <title>Atlas Splunk Assessment - v4.9.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6276/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;## Atlas Splunk Assessment v4.9.0&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;- Preflight checks added to inform users that they may lack complete permissions and capabilities for a manual assessment run.&amp;#x20;&lt;/p&gt;
&lt;p&gt;- Updated Atlas Assessment dark mode with a gradient.&lt;/p&gt;
&lt;p&gt;- When installed in an environment with Atlas, the Side Navigation bar will allow direct links to Atlas.&amp;#x20;&lt;/p&gt;
&lt;p&gt;- Reorganized searches to reduce errors in large environments.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Atlas Splunk Assessment (v4) helps Splunk users proactively manage and optimize their environments. This automated tool evaluates your Splunk deployment, identifying potential issues and providing prioritized, actionable recommendations. It demonstrates how the Atlas platform can address areas highlighted in the assessment. Track your progress over time as you implement improvements using the recurring assessment feature.

The tool is regularly updated on both Splunkbase and the Atlas platform—check back frequently for the latest version. For suggestions or feedback, contact us at support@kinneygroup.com.

To learn more, please check out the full Atlas Splunk Assessment documentation site:
https://docs.atlas.kinneygroup.com/docs/using-atlas/assessment&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/82992bae-3a9b-11f1-9791-3efbe26b2662.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Presidio - Key Partner Acct</dc:creator>
      <pubDate>Fri, 17 Apr 2026 20:37:12 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6276/#v4.9.0</guid>
    </item>
    <item>
      <title>Veritas NetBackup Flex Splunk App - v1.2.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7441/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Veritas NetBackup Flex User Behavior Analytics App shows important events and analytics for Flex Appliance and NetBackup application instances. It assists security operation teams with detecting user based threats by identifying user activities on NetBackup and Flex appliances that are anomalous and risky.

Leverage Veritas and Splunk to provide insights on user behavior in the Veritas NetBackup data protection. With Splunk User Behavior Analytics (UBA), security operations can monitor NetBackup user activity logs to detect actions or patterns that indicate account compromise, malicious insiders, or privileged account abuse. With the continuous monitoring of user activity, organizations can improve security and reliability of disaster and cyber recovery.

It includes:
  • User Behavior Analytics (UBA) Focus: Highlighting risky user behaviors, enabling security teams to detect and respond to potential threats based on user activities and behaviors.
  • Noise Reduction from Non-critical Events: By filtering out non-critical syslog and application events, the plugin minimizes noise and focuses on actionable security alerts, enhancing operational efficiency.
  • Automated Monitoring and Response: Automatescritical events monitoring and incident response, empowering security teams to identify and mitigate security threats swiftly and effectively.
  • Ease of Use: Security administrators are relieved from the burden of learning eventwriting or SIEM rule setup processes, as the plugin offers intuitive configuration options for seamless implementation.
  • Automated APIs Orchestrations: With automated APIs orchestrations, the plugin facilitates centralized security posture management, enabling seamless coordination and control over security operations.
  •Security Dashboard: Customized widgets facilitate:
       • Detection of user-based threats arising from stolen credentials, privilege account abuse, or insider threat activities
       • Swift assessment of the breach’s impact during cyber recovery incidents
       • Aid in understanding the effects on the data protection infrastructure&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/fdaf1b40-36fa-11f1-9aa1-9aaa231c919c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rahul Rokade</dc:creator>
      <pubDate>Fri, 17 Apr 2026 18:46:33 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7441/#v1.2.0</guid>
    </item>
    <item>
      <title>Splunk App for SOAR Export - v4.5.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/3411/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;\=\=\=\=\=\=\=\=\=\=\=\=\=&lt;br&gt;
Release Notes&lt;br&gt;
=============&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;See release notes at &lt;a href=&quot;https://help.splunk.com/en/splunk-soar/splunk-app-for-soar-export/4.5.1/introduction-and-overview/splunk-app-for-soar-export-release-notes&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://help.splunk.com/en/splunk-soar/splunk-app-for-soar-export/4.5.1/introduction-and-overview/splunk-app-for-soar-export-release-notes&quot;&gt;https://help.splunk.com/en/splunk-soar/splunk-app-for-soar-export/4.5.1/introduction-and-overview/splunk-app-for-soar-export-release-notes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This is the official Splunk app that integrates Splunk Enterprise or Splunk Cloud with Splunk SOAR. This app, formerly known as the “Phantom App for Splunk,” is responsible for sending data from your Splunk Enterprise/Cloud instances to Splunk SOAR. Once that data is in Splunk SOAR, you can perform automated actions with over 350+ different security tools. 

Also included with this app is an integration with Splunk Enterprise Security, allowing you to send ES data to SOAR.

Splunk SOAR is a Security Automation and Orchestrated Response (SOAR) platform that integrates with your existing security tools in order to provide a layer of “connective tissue” between them. Splunk SOAR streamlines security operations through the execution of digital “Playbooks” to achieve in seconds what may normally take minutes or hours to accomplish with the dozens of products that you use every day.

Splunk SOAR doesn’t replace existing security products, but instead makes your investment in them smarter, faster and stronger.

(Formerly known as Phantom App for Splunk)

Documentation: https://docs.splunk.com/Documentation/SOARExport/latest/UserGuide/Introduction&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/4780bfd8-31df-11f1-b5d9-72170e4042f6.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Fri, 17 Apr 2026 17:53:11 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3411/#v4.5.1</guid>
    </item>
    <item>
      <title>Rootly App for Splunk - v1.1.3 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7721/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Rootly App for Splunk — v1.1.3&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Non-admin Splunk users can now trigger the Rootly alert action without hitting a 403 error. The app now reads the integration URL from its config file on disk instead of requiring access to Splunk’s secure password store.&lt;/li&gt;
&lt;li&gt;Updating the integration URL no longer requires a Splunk restart — changes take effect on the next config reload.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Rootly Splunk App enables faster response times to service disruptions by leveraging the power of Splunk Alerts. Rootly and Splunk customers can:
- Start leveraging Splunk Alerts in Rootly with just one click.
- Tailor your incident response workflows across Rootly accounts and services using a single Splunk instance.
- Minimize information overload and alert noise by grouping and streamlining alerts.

With Rootly and Splunk working together, your organization can achieve faster, smarter, and more efficient incident resolution.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/98e83fea-3a72-11f1-aa45-e20d4a803e37.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Quentin Rousseau</dc:creator>
      <pubDate>Fri, 17 Apr 2026 15:35:18 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7721/#v1.1.3</guid>
    </item>
    <item>
      <title>Splunk Enterprise Security - v8.4.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/263/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;&lt;a href=&quot;https://help.splunk.com/en/splunk-enterprise-security-8/release-notes-and-resources/8.4/splunk-enterprise-security-release-notes/release-notes-for-splunk-enterprise-security&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://help.splunk.com/en/splunk-enterprise-security-8/release-notes-and-resources/8.4/splunk-enterprise-security-release-notes/release-notes-for-splunk-enterprise-security&quot;&gt;https://help.splunk.com/en/splunk-enterprise-security-8/release-notes-and-resources/8.4/splunk-enterprise-security-release-notes/release-notes-for-splunk-enterprise-security&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Splunk Enterprise Security (ES) solves a wide range of security analytics and operations use cases including continuous security monitoring, advanced threat detection, compliance, incident investigation, forensics and incident response. Splunk ES delivers an end-to-end view of organizations’ security postures with flexible investigations, unmatched performance, and the most flexible deployment options offered in the cloud, on-premises or hybrid deployment models. Splunk ES enables you to: 

- Conquer alert fatigue with high-fidelity Risk-Based Alerting.
- Bring visibility across your hybrid environment with multicloud security monitoring.
- Conduct flexible investigations for effective threat hunting across security, IT and DevOps data sources.

Splunk ES is a premium security solution requiring a paid license.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/static/image/default_icon.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Fri, 17 Apr 2026 14:58:29 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/263/#v8.4.1</guid>
    </item>
    <item>
      <title>PingFederate App for Splunk - v2.1.2 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/976/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Qualification update.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Developed by Ping Identity, the PingFederate App for Splunk gathers and presents transaction metrics from PingFederate via a series of customized reports and graphical illustrations. The application enables identity and access management (IAM) administrators, architects, and security managers to easily obtain custom reporting for all PingFederate log data, view each authentication event per app and authentication source, and analyze that event data over time. The customized reports display key events across account management, Identity Provider, Service Provider and OAuth Authorization Server transactions.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/00edee84-39d1-11f1-8745-b214f80aa9b5.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ping Identity</dc:creator>
      <pubDate>Thu, 16 Apr 2026 20:18:50 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/976/#v2.1.2</guid>
    </item>
    <item>
      <title>Menlo Security Technology Add-on - v2.5.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6182/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Fixed a bug where multiple client events were getting merged into a single event.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This Technology Add-on enables customers to import logs from the Menlo Cloud Security Platform into the Splunk platform, thereby providing real-time visibility into security events.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/3d7c9f2a-3964-11f1-8745-b214f80aa9b5.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Menlo Security</dc:creator>
      <pubDate>Thu, 16 Apr 2026 07:41:06 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6182/#v2.5.2</guid>
    </item>
    <item>
      <title>Splunk ES Content Update - v5.25.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/3449/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;GitHub - &lt;a href=&quot;https://github.com/splunk/security_content/releases/tag/v5.25.1&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://github.com/splunk/security_content/releases/tag/v5.25.1&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://github.com/splunk/security_content/releases/tag/v5.25.1&quot;&gt;https://github.com/splunk/security_content/releases/tag/v5.25.1&lt;/a&gt;&lt;br&gt;
Splunk Docs - &lt;a href=&quot;https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/release-notes/5.25/splunk-security-content-release-notes/whats-new\&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/release-notes/5.25/splunk-security-content-release-notes/whats-new\&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/release-notes/5.25/splunk-security-content-release-notes/whats-new\&quot;&gt;https://help.splunk.com/en/splunk-enterprise-security-8/security-content-update/release-notes/5.25/splunk-security-content-release-notes/whats-new\&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Splunk ES Content Update (ESCU) app delivers pre-packaged Security Content. ESCU provides regular Security Content updates to help security practitioners address ongoing time-sensitive threats, attack methods, and other security issues.

Security Content consists of tactics, techniques, and methodologies that help with detection, investigation, and response. Security Content enables security teams to directly operationalize detection searches, investigative searches, and other supporting details. ESCU can generate Notable/Risk Events in Splunk Enterprise Security. Security Content also contains easy-to-read background information and guidance, for key context on motivations and risks associated with attack techniques, as well as pragmatic advice on how to combat those techniques.

The analytic stories and their searches are also available at - https://github.com/splunk/security_content.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/c2c2d90e-38fd-11f1-90bf-ee5fde511842.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Wed, 15 Apr 2026 23:57:11 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3449/#v5.25.1</guid>
    </item>
    <item>
      <title>Conceal Splunk App - v0.12.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6920/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Conceal Splunk App provides saved searched, visualizations and configured Alerts for ConcealBrowse event data. 

Please note, for CIM compliance, this app requires the the Conceal TA Add-on --&amp;gt; https://splunkbase.splunk.com/app/6921&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/f2c0de48-3917-11f1-90bf-ee5fde511842.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ash Patel</dc:creator>
      <pubDate>Wed, 15 Apr 2026 22:13:52 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6920/#v0.12.0</guid>
    </item>
    <item>
      <title>Hydrolix Search - v1.4.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7540/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Added full Splunk-side streaming support; partial results are now displayed in Splunk as the query continues running&lt;/li&gt;
&lt;li&gt;Enabled Hydrolix server-side streaming when connected to a Hydrolix version that supports it; has no effect on older versions&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;With Hydrolix Search for Splunk, you can connect Splunk to solutions that use Hydrolix&amp;#x27;s streaming data lake technology and partner solutions like TrafficPeak based on Hydrolix.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/d74c009a-390b-11f1-b597-a252f7aca7bd.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk Hydrolix</dc:creator>
      <pubDate>Wed, 15 Apr 2026 20:52:53 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7540/#v1.4.0</guid>
    </item>
    <item>
      <title>PingAccess App for Splunk - v1.0.6 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/5368/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Qualification update.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Developed by Ping Identity, the PingAccess App for Splunk gathers and presents transaction metrics from PingAccess through a series of customized reports and graphical illustrations. The application enables identity and access management (IAM) administrators, architects, and security managers to easily obtain custom reporting for all PingAccess log data, view authorization events per app, engine, agent, and type, and analyze that event data over time. The customized reports display number of users seen, number of sessions, rule failures, most popular resources, geo-mapping of IP addresses, and other key events.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/97a54da4-3909-11f1-b4a7-7ef287786fbd.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ping Identity</dc:creator>
      <pubDate>Wed, 15 Apr 2026 20:39:34 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5368/#v1.0.6</guid>
    </item>
    <item>
      <title>Whisper Security App for Splunk - v1.0.0 [New App Release] (Archived)</title>
      <link>https://splunkbase.splunk.com/app/8638/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h1&gt;Whisper Security App for Splunk — v1.0.0&lt;/h1&gt;
&lt;p&gt;First stable release of &lt;strong&gt;TA-whisper-security&lt;/strong&gt;, the Splunk Technology Add-on for &lt;a href=&quot;https://whisper.security&quot;&gt;Whisper Security's&lt;/a&gt; Knowledge Graph API —  multi-billion internet infrastructure nodes, tens of billions of relationships, and millions of threat intelligence data.&lt;/p&gt;
&lt;hr&gt;
&lt;h2&gt;Highlights&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Real-time IOC enrichment&lt;/strong&gt; via custom search commands and an adaptive response action&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise Security integration&lt;/strong&gt; with threat intel feeds, risk scoring, CIM field mappings&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Attack surface monitoring&lt;/strong&gt; with DNS baseline tracking, change detection, and multi-tenant support&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;12 pre-built dashboards&lt;/strong&gt; covering risk, compliance, geographic threats, and executive reporting&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;33 correlation searches&lt;/strong&gt; for infrastructure threat detection (all disabled by default)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2&gt;Features&lt;/h2&gt;
&lt;h3&gt;Search Commands (5)&lt;/h3&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Command&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;whisperlookup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Streaming&lt;/td&gt;
&lt;td&gt;Enrich events with DNS, hosting, threat intel, and CNAME data from the Knowledge Graph&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;whisperquery&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Generating&lt;/td&gt;
&lt;td&gt;Run ad-hoc Cypher queries against the Knowledge Graph API&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;whisperschema&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Generating&lt;/td&gt;
&lt;td&gt;Retrieve graph schema metadata (node types, relationships, properties)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;whisperflush&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Generating&lt;/td&gt;
&lt;td&gt;Clear cached enrichment data from KV Store collections&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;whisperevict&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Generating&lt;/td&gt;
&lt;td&gt;Remove expired cache entries based on TTL&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Modular Inputs (5)&lt;/h3&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Input&lt;/th&gt;
&lt;th&gt;Default Interval&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Threat Intelligence Feed&lt;/td&gt;
&lt;td&gt;6 hours&lt;/td&gt;
&lt;td&gt;Collects threat indicators for ES threat intel framework (up to 100K indicators)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Attack Surface Baseline&lt;/td&gt;
&lt;td&gt;24 hours&lt;/td&gt;
&lt;td&gt;DNS baseline collection for monitored domains&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Watchlist Enrichment&lt;/td&gt;
&lt;td&gt;4 hours&lt;/td&gt;
&lt;td&gt;Enriches watchlist indicators with graph context&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Multi-Tenant Monitoring&lt;/td&gt;
&lt;td&gt;24 hours&lt;/td&gt;
&lt;td&gt;Multi-tenant domain monitoring (up to 10K domains)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;API Health Check&lt;/td&gt;
&lt;td&gt;5 minutes&lt;/td&gt;
&lt;td&gt;API connectivity and quota monitoring&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Dashboards (12)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Risk Overview&lt;/strong&gt; — Aggregated risk scores and trending&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Executive Risk Summary&lt;/strong&gt; — High-level risk posture for leadership&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Attack Surface Timeline&lt;/strong&gt; — Infrastructure change tracking over time&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Geographic Threats&lt;/strong&gt; — Threat visualization by geography&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MITRE ATT&amp;amp;CK Coverage&lt;/strong&gt; — Technique mapping and detection coverage&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;WHOIS Intelligence&lt;/strong&gt; — Registrar and ownership analysis&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Web Link Trust&lt;/strong&gt; — Link reputation and trust scoring&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SPF Compliance&lt;/strong&gt; — Email authentication monitoring&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DNSSEC Compliance&lt;/strong&gt; — DNS security validation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance Summary&lt;/strong&gt; — Consolidated compliance posture&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Health &amp;amp; Operations&lt;/strong&gt; — API health, quota usage, and connectivity status&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Enterprise Security Integration&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;2 threat intelligence collections&lt;/strong&gt; (IP and domain) compatible with ES threat intel framework&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;20+ CIM field aliases&lt;/strong&gt; mapping Whisper fields to Splunk Common Information Model&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Risk framework integration&lt;/strong&gt; across all 33 correlation searches&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MITRE ATT&amp;amp;CK annotations&lt;/strong&gt; on every correlation search (T1583, T1584, T1568, T1599, T1071.004, and more)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;1 adaptive response action&lt;/strong&gt; — &quot;Enrich with Whisper&quot; for automated enrichment in alert workflows&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Correlation Searches (33)&lt;/h3&gt;
&lt;p&gt;All disabled by default. Categories:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;DNS &amp;amp; Domain Monitoring (10)&lt;/strong&gt; — Infrastructure changes, shadow IT, typosquatting, fast flux, CNAME chain analysis&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Infrastructure &amp;amp; Hosting (7)&lt;/strong&gt; — Bulletproof ASN detection, shared hosting with threats, infrastructure pivoting&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;BGP &amp;amp; Network (3)&lt;/strong&gt; — Prefix conflicts, BGP hijack detection, ASN migration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Registrar &amp;amp; WHOIS (3)&lt;/strong&gt; — Registrar changes, contact correlation, privacy proxy alerts&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Risk Assessment (3)&lt;/strong&gt; — Newly registered domain risk, TOR exit node communication, impossible travel&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;KV Store Population (3)&lt;/strong&gt; — Automated threat intel collection population&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Direct Intelligence (2)&lt;/strong&gt; — HOSTNAME threat properties, suspicious web link profiles&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cache Management (1)&lt;/strong&gt; — Automated cache eviction&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Data Model&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;9 source types&lt;/strong&gt; — &lt;code&gt;whisper:health&lt;/code&gt;, &lt;code&gt;whisper:attack_surface&lt;/code&gt;, &lt;code&gt;whisper:threat_intel&lt;/code&gt;, &lt;code&gt;whisper:watchlist&lt;/code&gt;, &lt;code&gt;whisper:change&lt;/code&gt;, &lt;code&gt;whisper:enrichment&lt;/code&gt;, &lt;code&gt;whisper:spf_compliance&lt;/code&gt;, &lt;code&gt;whisper:dnssec_compliance&lt;/code&gt;, &lt;code&gt;ta_whisper_security&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;8 KV Store collections&lt;/strong&gt; — Enrichment cache, precomputed enrichment, IP/domain threat intel, watchlist, DNS baseline&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Real-time IOC enrichment, threat intelligence, and attack surface monitoring powered by a multi-billion-node internet infrastructure knowledge graph. Adds ASN, geo, WHOIS, threat scores, and risk levels to any IP or domain in your Splunk environment.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Enrich Splunk events with real-time internet infrastructure intelligence from Whisper Security&amp;#x27;s Knowledge Graph — billions of nodes and tens of billions of edges mapping domains, IPs, ASNs, BGP routes, certificates, and WHOIS data across all countries.

What it solves: Security teams lack infrastructure context when triaging alerts. An IP fires an alert — but who owns it? What ASN? Is it on threat feeds? What else is hosted there? Answering these questions requires pivoting across 5+ tools. This add-on brings that context directly into Splunk.

Core capabilities:

Live enrichment — Pipe any IP or domain through | whisperlookup to instantly add ASN ownership, geolocation, threat scores, risk levels, WHOIS data, CNAME chains, and name server details
Graph queries — Run Cypher queries against the full knowledge graph from the Splunk search bar with | whisperquery
Threat intelligence — Automated feeds from 40+ sources populate ES-compatible KV Store collections with scored IP and domain indicators
Attack surface monitoring — Scheduled inputs track DNS, MX, NS, and WHOIS changes across your domain portfolio with risk-scored change detection
29 correlation searches — Pre-built detections for bulletproof ASN communication, fast-flux DNS, BGP hijacks, typo-squatting, TOR exit traffic, and more — all generating ES risk events
12 dashboards — Executive risk grades (A–F), compliance posture (SPF, DNSSEC, NIS2, NIST), geographic threat maps,, WHOIS intelligence, and attack surface timelines

Built by internet infrastructure veterans from RIPE NCC and ICANN. Powered by 46 billion data points from 60+ sources with millisecond-level query response times.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/859a599e-33a3-11f1-9aa1-9aaa231c919c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ehsan Aslani</dc:creator>
      <pubDate>Wed, 15 Apr 2026 17:11:47 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8638/#v1.0.0</guid>
    </item>
    <item>
      <title>Splunk Add-on for Microsoft Office 365 - v6.0.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/4055/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Splunk Add-on for Microsoft Office 365 allows a Splunk software administrator to pull service status, service messages, and management activity logs from the Office 365 Management API. You can collect:

* Audit logs for Azure Active Directory, Sharepoint Online, and Exchange Online, supported by the Office 365 Management API. 
* Historical and current service status, and service messages for the corresponding Microsoft Office 365 Management API.
* Data Loss Prevention on Microsoft Office 365 Management API.

After the Splunk platform indexes the events, you can then directly analyze the data or use it as a contextual data feed to correlate with other data in the Splunk platform&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/db4c4dba-38db-11f1-a38c-9e0722112b50.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:20:10 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/4055/#v6.0.1</guid>
    </item>
    <item>
      <title>Sophos Central - v1.1.8 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/6186/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;# Sophos Central Data Ingestor
The official Sophos developed and supported application for Sophos Central

##Functionality
This app will allow you to select and ingest multiple Sophos Central data sources without the need of an accompanying script.  Includes Data from the below endpoints. and conforms to the CIM 4.x data model.
* Central Endpoints API
* Central Alerts API
* Central SIEM Events API

## Requirements
Requires a Sophos API Service Principal account for authentication see our getting started guide for details on API credential creation.
* Getting Started for Enterprise Customers: https://developer.sophos.com/getting-started-organization
* Getting Started for Partners: https://developer.sophos.com/getting-started
* Getting Started for Tenants: https://developer.sophos.com/getting-started-tenant
* Add-on Installation Guide: https://community.sophos.com/sophos-integrations/w/integrations/109/splunk-add-on-for-sophos-central
* Feedback and Support Forum: https://community.sophos.com/sophos-integrations/f/splunk-apps-for-central-and-sophos-firewall

Use the accompanying Sophos Dashboard App to get insightful dashboards across Central Data, XG data, or both if using both date sources: https://splunkbase.splunk.com/app/6188/&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/6f876e9c-38a0-11f1-bfe4-7eec6d210fba.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sophos Integrations</dc:creator>
      <pubDate>Wed, 15 Apr 2026 14:18:54 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6186/#v1.1.8</guid>
    </item>
    <item>
      <title>TrackMe - v2.3.19 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/4621/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;TrackMe 2.3.19 — Entity Labels, CMDB Integration, Variable Delay, Splunk Cloud AI &amp;amp; Support Diagnostics&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Entity Labels — lifecycle visibility at a glance&lt;/strong&gt;: Introducing a lightweight, color-coded labeling system for entities. Labels give teams instant visibility into the lifecycle stage and operational context of every tracked entity — directly in the entity tables, in stateful and notable alert events, and through Virtual Groups that can aggregate entities by label across tenants.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CMDB integration improvements&lt;/strong&gt;: Stateful and notable alert actions now automatically enrich events with CMDB data at alert time. A new simplified configuration screen replaces the complex UCC-based setup, and CMDB icons now appear correctly in Virtual Groups tables.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Entity Notes enhancements&lt;/strong&gt;: Notes are now visible as a first-class column in entity tables with a new clone-to-entities action for bulk operations.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Variable delay management improvements&lt;/strong&gt;: Timezone notice banners in all variable delay and threshold editors, plus fully customizable per-tenant slot templates.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Policy tracker scheduling&lt;/strong&gt;: SLA, Tags, and Priority policy trackers now default to a 12-hour cadence instead of every 15 minutes, cutting scheduled-search load for these jobs while policy content remains applied; cron remains adjustable per tenant if you need a faster refresh.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Support — generate diagnostics&lt;/strong&gt;: A self-service &lt;strong&gt;Support - generate diags&lt;/strong&gt; experience (nav under API &amp;amp; tooling and Audit &amp;amp; troubleshoot) lets admins produce a timestamped &lt;code&gt;.tgz&lt;/code&gt; for TrackMe support — entity-scoped or global, async job + polling + secure download, optional tenant anonymisation with a separate mapping for support, and RBAC via &lt;code&gt;trackmepoweroperations&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;AI Assistant — realtime entity context&lt;/strong&gt;: Entity-level AI chat now loads the same decision-maker view as &lt;code&gt;/trackme/v2/describe/entity&lt;/code&gt; (via &lt;code&gt;load_component_data&lt;/code&gt;), so labels, scores, smart status, and other joined fields match the UI instead of a raw KV snapshot.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Splunk Cloud — splunk_hosted LLM (SLIM)&lt;/strong&gt;: The Splunk-hosted AI provider now sends the &lt;code&gt;request_id&lt;/code&gt; header required by the SLIM gateway on Splunk Cloud, resolving HTTP 400 &lt;code&gt;Request ID not present in header&lt;/code&gt; failures so model discovery, in-app AI Assistant chat, and AI status content in stateful alerts work again for customers using &lt;code&gt;splunk_hosted&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Various bug fixes and improvements&lt;/strong&gt;: SLA ranking corrections, REST handler hardening, Cribl use case updates, multiple Virtual Groups fixes, quieter routine logging from the &lt;code&gt;trackmestateful&lt;/code&gt; command, KV index transforms for unquoted keys, consistent status messaging when impact score is raised manually without anomalies, and ML outliers simulation with auto-correction disabled when training volume is below the native fit minimum.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;See: &lt;a href=&quot;https://docs.trackme-solutions.com/latest/releasenotes.html#version-2-3-19-build-1776258970-15-04-2026&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://docs.trackme-solutions.com/latest/releasenotes.html#version-2-3-19-build-1776258970-15-04-2026&quot;&gt;https://docs.trackme-solutions.com/latest/releasenotes.html#version-2-3-19-build-1776258970-15-04-2026&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;TrackMe for Splunk provides visibility and operational excellence to monitor at scale your Splunk data sources availability and quality, and many more. 

With a rich set of features and a powerful workflow, TrackMe empowers you day after day to get the most from your Splunk investments and deliver the five stars quality of service your users deserve.

Discover TrackMe: https://trackme-solutions.com/discover

Documentation: https://docs.trackme-solutions.com

You can subscribe to our newsletter, and receive important communications from us.
We will send notifications for instance when publishing new releases, so we can you let you know the cool and powerful things we&amp;#x27;ve been working on!

https://trackme-solutions.com/subscribe/

TrackMe has transitioned to a new licensing model.
The Free Community Edition has been discontinued.

What this means for you:

- Existing licensed customers are not impacted. Your current license continues unchanged.
- Community users are automatically upgraded to a Foundation Edition trial for 90 days, with full functionality enabled.

After the trial period:

- TrackMe remains active and fully usable for monitoring
- The platform enters read-only mode

You can continue to view data, dashboards, alerts, and history
Creation of new tenants, trackers, or entities will be disabled

To continue using TrackMe with full capabilities after the trial, a Foundation license is required.

Buy Foundation Edition: https://trackme-solutions.com/get-foundation/

See all plans: https://trackme-solutions.com/pricing/&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/214a4d04-38d1-11f1-b304-0a40337cd8dc.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Trackme Limited</dc:creator>
      <pubDate>Wed, 15 Apr 2026 14:17:14 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/4621/#v2.3.19</guid>
    </item>
    <item>
      <title>CTM360 App for Splunk - v1.2.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6577/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;UI enhancement to be compatible with the timestamp selection feature.&lt;/li&gt;
&lt;li&gt;Bug fixes.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The CTM360 App for Splunk allows subscribed users to import their asset inventory, issues, and incidents into Splunk®, and utilize this data to build reports, trigger alerts and identify vulnerabilities, exposures and misconfigurations against your assets. The CTM360 Splunk App and Add-on are designed to work together.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/b69fa70e-38d2-11f1-b3bf-be84cb4aad1f.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CTM360 Ltd</dc:creator>
      <pubDate>Wed, 15 Apr 2026 13:57:31 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6577/#v1.2.0</guid>
    </item>
    <item>
      <title>CTM360 Add-on for Splunk - v1.3.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6576/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Added support for selecting preferred timestamp formats in CBS Feeds, HackerView Feeds, and ThreatCover Feeds inputs.&lt;/li&gt;
&lt;li&gt;Bug fixes&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The CTM360 Add-on for Splunk allows subscribed users to import their asset inventory, issues, and incidents into Splunk®, and utilize this data to build reports, trigger alerts and identify vulnerabilities, exposures and misconfigurations against your assets. The CTM360 Splunk App and Add-on are designed to work together.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/df739934-38d1-11f1-9ab5-66a571ea5a24.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CTM360 Ltd</dc:creator>
      <pubDate>Wed, 15 Apr 2026 13:54:17 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6576/#v1.3.0</guid>
    </item>
    <item>
      <title>SpoofSentry Add-on for Splunk - v1.0.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8640/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Initial release of SpoofSentry Add-on for Splunk.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;3 sourcetypes: spoofsentry:alert, spoofsentry:cef, riskreply:event&lt;/li&gt;
&lt;li&gt;JSON field extraction with normalized field aliases&lt;/li&gt;
&lt;li&gt;CEF (Common Event Format) parsing&lt;/li&gt;
&lt;li&gt;CIM data model tagging (Alerts, Email, Intrusion Detection, Change, Web)&lt;/li&gt;
&lt;li&gt;8 pre-built saved searches (threats, DMARC pass rates, spoofing campaigns, lookalikes, takedowns, enforcement)&lt;/li&gt;
&lt;li&gt;1 pre-built alert for critical threat detection&lt;/li&gt;
&lt;li&gt;Severity and event type lookup tables&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Ingest DMARC monitoring, spoofing detection, lookalike domain threats, and takedown events from SpoofSentry with CIM-mapped sourcetypes, pre-built searches, and alerting.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;SpoofSentry Add-on for Splunk ingests and normalizes domain security events from the SpoofSentry DMARC monitoring and domain protection platform. Events are delivered via Splunk HEC and include DMARC authentication failures, spoofing campaign detections, lookalike domain threats, DNS enforcement changes, and automated takedown orchestration lifecycle events.

This add-on provides:
- Sourcetype definitions for spoofsentry:alert, spoofsentry:cef, and riskreply:event
- Automatic JSON field extraction with normalized field aliases (severity, event_type, domain, tenant_id)
- CEF (Common Event Format) parsing for legacy SIEM workflows
- CIM data model compatibility (Alerts, Email, Intrusion Detection, Change, Web)
- 8 pre-built saved searches covering critical threats, DMARC pass rates, spoofing campaigns, lookalike domains, takedown activity, and enforcement changes
- 1 pre-built alert for critical threat detection (disabled by default, configurable suppression)
- Lookup tables for severity mapping and event type categorization

SpoofSentry detects email spoofing, monitors DMARC enforcement, identifies lookalike domains, and orchestrates automated takedowns across Google Web Risk, Netcraft, URLhaus, and registrar abuse channels. This add-on brings those security events into Splunk for centralized analysis, correlation with other security data, and SOC workflow integration.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/static/image/default_icon.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Team Netallion</dc:creator>
      <pubDate>Wed, 15 Apr 2026 12:50:58 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8640/#v1.0.0</guid>
    </item>
    <item>
      <title>DASH Lite - Styled App Builder - v1.0.4 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8654/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;(Free preview of DASH) Design CSS themes for Splunk dashboards with live preview. Includes Cybersecurity use case with 2 dashboards. Upgrade at mb2analytics.com for 3 use cases, 15 dashboards, app export, and Gallery.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/7f2c1f52-3817-11f1-9c5d-d2742ccea48c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matheus Silva</dc:creator>
      <pubDate>Wed, 15 Apr 2026 12:47:12 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8654/#v1.0.4</guid>
    </item>
    <item>
      <title>CrowdStrike Falcon Spotlight Vulnerability Data - v3.5.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6167/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h2&gt;New Features&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Added Splunk CIM Vulnerabilities data model mapping with field aliases, calculated fields, eventtypes, and tags&lt;/li&gt;
&lt;li&gt;Added option to remove the pagination metadata field from events to reduce storage costs&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Bug Fixes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Fixed props.conf timestamp extraction for events with fractional seconds, resolving incorrect event time assignment&lt;/li&gt;
&lt;li&gt;Fixed saved search date format that displayed day-month instead of month-day&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Improvements&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Strengthened authentication handling with network failure detection, OAuth2 error diagnostics, and mid-collection token expiry recovery&lt;/li&gt;
&lt;li&gt;Improved API resilience with exponential backoff, jitter-based retry desynchronization, and expanded retry coverage for transient server and network errors&lt;/li&gt;
&lt;li&gt;Hardened checkpoint integrity with save retries, microsecond precision, and fail-stop behavior to prevent duplicate ingestion&lt;/li&gt;
&lt;li&gt;Added API request timeouts to prevent indefinite hangs during network interruptions or unresponsive API endpoints&lt;/li&gt;
&lt;li&gt;Added pagination safety cap to prevent runaway collection loops&lt;/li&gt;
&lt;li&gt;Enhanced logging with SDK version, redacted proxy URLs, rate limit headers, FQL filters, and checkpoint state transitions for faster troubleshooting&lt;/li&gt;
&lt;li&gt;Updated FalconPy SDK to v1.6.0&lt;/li&gt;
&lt;li&gt;Updated dashboard queries and props.conf settings to align with current platform standards&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This add-on enables CrowdStrike customers to retrieve vulnerability data from their Falcon Spotlight module. In addition to the the basic vulnerability data the inputs can be configured to also retrieve additional details about the CVE&amp;#x27;s, remediations and hosts with the observed vulnerability.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/6b86d312-32da-11f1-b1cb-2227b8778c14.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CrowdStrike</dc:creator>
      <pubDate>Wed, 15 Apr 2026 12:41:30 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6167/#v3.5.0</guid>
    </item>
    <item>
      <title>aitriage - v1.2.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8651/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Version 1.2.1&lt;/p&gt;
&lt;p&gt;Initial public release of TA_triage for Splunk.&lt;/p&gt;
&lt;p&gt;What’s included:&lt;br&gt;
- Custom search command: | triage&lt;br&gt;
- Support for model=claude&lt;br&gt;
- Support for model=ollama with configurable ollama_url and ollama_model&lt;br&gt;
- File-based caching with cache, cache_ttl, and cache_key_fields&lt;br&gt;
- Context-aware triage using context_fields&lt;br&gt;
- MITRE mapping, severity scoring, IOC extraction, action recommendations, and false-positive assessment&lt;br&gt;
- Basic dashboard and navigation files&lt;br&gt;
- Clean packaging for Splunkbase upload&lt;/p&gt;
&lt;p&gt;Example searches:&lt;br&gt;
index=edr sourcetype=crowdstrike:&lt;em&gt;Detection&lt;/em&gt; | triage model=claude context_fields=&quot;UserName,CommandLine,Technique&quot;&lt;br&gt;
index=edr sourcetype=crowdstrike:&lt;em&gt;Detection&lt;/em&gt; | triage model=ollama ollama_url=&quot;&lt;a href=&quot;http://localhost:11434&quot;&gt;http://localhost:11434&lt;/a&gt;&quot; ollama_model=&quot;mistral&quot;&lt;br&gt;
index=edr sourcetype=crowdstrike:&lt;em&gt;Detection&lt;/em&gt; | triage model=claude cache=true cache_ttl=3600 cache_key_fields=&quot;alert_name,src_ip&quot;&lt;/p&gt;
&lt;p&gt;Notes:&lt;br&gt;
- Claude usage requires valid API connectivity and credentials in the Splunk environment.&lt;br&gt;
- Ollama usage requires a reachable local or remote Ollama endpoint.&lt;br&gt;
- If an external model is unavailable, the command falls back to local heuristic triage output.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;You send each Splunk event to the LLM and receive the following in return:

→ MITRE ATT&amp;amp;CK technical mapping (like T1059.001)
→ 1-10 severity score + label
→ 2-3 sentence AI analysis
→ Specific action recommendation to the SOC analyst
→ False positive probability + justification
→ Kill chain phase
→ Automatic IOC inference&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/static/image/default_icon.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kadri Kocaer</dc:creator>
      <pubDate>Wed, 15 Apr 2026 12:41:14 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8651/#v1.2.0</guid>
    </item>
    <item>
      <title>Red Hat Event Driven Ansible Add-on For Splunk - v1.0.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7868/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Add Splunk Enterprise 10.2 compatibility&lt;/li&gt;
&lt;li&gt;Add Python 3.13 compatability&lt;/li&gt;
&lt;li&gt;Work with Python 3.13 or System's Python3&lt;/li&gt;
&lt;li&gt;splunkenv.get_splunkd_access_info() call in newer versions of solnlib requires a session_key parameter&lt;/li&gt;
&lt;li&gt;set anyio to a version that still supports Python 3.9. The last such version is anyio\&amp;lt;4.7 (anyio 4.6.x was the last to support 3.9).&lt;/li&gt;
&lt;li&gt;set app.conf and globalConfig.json with python.version and supportedPythonVersion&quot;: [&quot;python3&quot;, &quot;python3.13&quot;]&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Enhance your Splunk instance by connecting it to the power of Ansible automation. 
This add-on provides a custom alert action that sends critical events from Splunk directly to the Red Hat Ansible Automation Platform.

With this integration, you can automatically trigger Ansible rulebooks and playbooks in response to security threats or operational issues.

Requirements:
- The Red Hat Event-Driven Ansible Add-on for Splunk (this app)
- Ansible Automation Platform with an active Event-Driven Ansible Controller to receive events and launch automations.

Use Cases:
1. Custom Alert Action triggered by a saved search in Splunk Core and Splunk Enterprise Security (ES).
2. Episode Action called in the Episode Review page of Splunk IT Service Intelligence (ITSI)&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/440a2b30-38c1-11f1-b4ec-ae2581bdd3fa.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Red Hat</dc:creator>
      <pubDate>Wed, 15 Apr 2026 12:07:01 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7868/#v1.0.2</guid>
    </item>
    <item>
      <title>AlphaSOC for Splunk - v1.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7911/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;This release adds an &lt;code&gt;| alphasoc&lt;/code&gt; search command for querying raw OCSF telemetry from AlphaSOC’s data lake, making it easier to retrieve and search data directly in Splunk to investigate security issues.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Security teams use this app to render OCSF security findings generated by the AlphaSOC Analytics Engine across different layers (cloud infrastructure, SaaS applications, identity providers, and endpoint telemetry). Use AlphaSOC for Splunk to instantly uncover network exfiltration and C2 traffic patterns, infected Windows, Linux, and macOS endpoints, compromised cloud workloads, and identities.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/afce8e26-38ab-11f1-8700-66a708e05915.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">AlphaSOC, Inc.</dc:creator>
      <pubDate>Wed, 15 Apr 2026 09:43:06 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7911/#v1.1.0</guid>
    </item>
    <item>
      <title>EAT - Environment Assessment Tool - v1.0.3 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8606/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Fix: resolved Splunk Cloud Victoria i18n_register injection breaking JS execution.&lt;/p&gt;
&lt;p&gt;JS is now delivered via Blob URL to prevent Splunk Cloud from prepending&lt;/p&gt;
&lt;p&gt;incompatible runtime code to the script.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;A structured health and security assessment framework for Splunk architects and administrators. Covers 55+ checks across infrastructure, ES/SIEM, CIM compliance, and MITRE ATT&amp;amp;CK coverage. Environment-aware for Commercial, NIPR, SIPR, and JWICS deployments. Fully offline, no dependencies, no network calls, air-gap safe.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;EAT (Environment Assessment Tool) is a comprehensive, offline-capable Splunk health and security assessment framework built for Splunk architects, administrators, and security engineers.
The tool walks you through 55+ checks covering every layer of a Splunk environment. cluster health, forwarder coverage, index and storage configuration, ingestion pipeline integrity, data quality, search workload, authentication controls, TLS and certificate posture, Splunk ES and SIEM effectiveness, CIM data model compliance, and MITRE ATT&amp;amp;CK detection coverage.

Each check provides the exact SPL query or CLI command to run, specific pass/fail criteria, remediation steps, and a field to record your findings inline.
Select your network environment at launch: Commercial, NIPR, SIPR, or JWICS, and the tool filters to only the checks that apply. DoD and classified environments get additional controls around FIPS 140-2, CAC/PKI authentication, offline licensing, telemetry enforcement, and index classification. Each check is tagged Required or Recommended based on the selected environment.
Assessments are scored on a weighted A through F scale with per-section breakdowns. A MITRE ATT&amp;amp;CK view shows tactic-level detection coverage across your visible checks. Load a previously saved assessment to compare against a current run and track what improved or regressed between assessments.
Results export as a plain-text findings report or print directly to PDF. Progress saves as a JSON file at any point and reloads seamlessly, useful for multi-day assessments or handing off between team members.
The tool runs entirely in the browser with no external dependencies, no network calls, and no installation required. It works on air-gapped and classified networks out of the box.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/0b7c0d54-3896-11f1-a69d-9ac6cd123f84.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Segun Bolufemi</dc:creator>
      <pubDate>Wed, 15 Apr 2026 06:48:58 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8606/#v1.0.3</guid>
    </item>
    <item>
      <title>Splunk Cisco App Navigator (SCAN) - v1.0.25 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8566/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h2&gt;Version 1.0.25&lt;/h2&gt;
&lt;h3&gt;Product Catalog&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;50+ Cisco product cards across Security, Networking, Observability, and Collaboration&lt;/li&gt;
&lt;li&gt;Keyword search across 725+ terms with live result counter&lt;/li&gt;
&lt;li&gt;Filtering by category, 19 subcategories, platform compatibility, Splunk version, and powering add-on&lt;/li&gt;
&lt;li&gt;Product cards display required add-ons, sourcetype counts, integration badges, and direct Splunkbase links&lt;/li&gt;
&lt;li&gt;Tooltips with full product description, value proposition, and integration details&lt;/li&gt;
&lt;li&gt;One-click copy of customer-ready product summaries to clipboard&lt;/li&gt;
&lt;li&gt;Contextual &quot;Explore&quot; dropdown for add-on-only products (Explore Data in Search, Create Dashboard)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Intelligence Badges&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;SecOps&lt;/strong&gt; — Products with Splunk Enterprise Security or Security Essentials content&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ITOps&lt;/strong&gt; — Products with ITSI Content Packs or IT Essentials Learn procedures&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SOAR&lt;/strong&gt; — Products with Splunk SOAR connectors&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Alert Actions&lt;/strong&gt; — Products with companion alert action add-ons&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SC4S&lt;/strong&gt; — Products with Splunk Connect for Syslog support&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NetFlow&lt;/strong&gt; — Products with NetFlow/IPFIX collection guidance&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Update Available&lt;/strong&gt; — Detects newer versions on Splunkbase for installed add-ons&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Flowing&lt;/strong&gt; — Live 24-hour event count per product's sourcetypes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Legacy Apps Detected&lt;/strong&gt; — Flags deprecated or superseded add-ons&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Integration Guidance Modals&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;SC4S&lt;/strong&gt; — Supported sourcetypes, configuration references, and product-specific context&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NetFlow / IPFIX&lt;/strong&gt; — Protocol comparison, required apps, and best practices&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enterprise Security&lt;/strong&gt; — Required add-ons, CIM mapping details, and deployment notes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SOAR&lt;/strong&gt; — Connector inventory with Splunkbase links&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ITSI&lt;/strong&gt; — Service monitoring configuration and KPI recommendations&lt;/li&gt;
&lt;li&gt;Full-content copy button in every modal for sharing&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Magic Eight Audit&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Per-product &lt;code&gt;props.conf&lt;/code&gt; deep inspection across 8 critical settings: &lt;code&gt;TIME_FORMAT&lt;/code&gt;, &lt;code&gt;TIME_PREFIX&lt;/code&gt;, &lt;code&gt;SHOULD_LINEMERGE&lt;/code&gt;, &lt;code&gt;LINE_BREAKER&lt;/code&gt;, &lt;code&gt;TRUNCATE&lt;/code&gt;, &lt;code&gt;MAX_TIMESTAMP_LOOKAHEAD&lt;/code&gt;, &lt;code&gt;ANNOTATE_PUNCT&lt;/code&gt;, &lt;code&gt;LEARN_SOURCETYPE&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Indexer tier detection validates add-on deployment across search heads and indexers&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Splunkbase Intelligence&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Synced lookup of all Cisco-related Splunkbase apps with version, compatibility, CIM compliance, and AppInspect results&lt;/li&gt;
&lt;li&gt;Sync Catalog button pulls latest Splunkbase metadata&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Reports&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Ecosystem Overview&lt;/strong&gt; — Summary statistics and full product inventory&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Catalog Analysis&lt;/strong&gt; — Products by category, add-on family, sourcetype coverage, and data quality audit&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Installation &amp;amp; Deployment&lt;/strong&gt; — Installed vs. catalog comparison, deployment readiness, and platform compatibility&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Splunkbase Intelligence&lt;/strong&gt; — Ecosystem overview, category breakdown, support distribution, and detailed app listings&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Versions &amp;amp; Compliance&lt;/strong&gt; — Release history, version tracker, CIM compatibility, and AppInspect validation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Coverage&lt;/strong&gt; — Sourcetype cross-reference and coverage matrix&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Health &amp;amp; Troubleshooting&lt;/strong&gt; — Magic Eight Audit and environment health summary&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Support&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Give Feedback&lt;/strong&gt; button links directly to GitHub Issues for bug reports and feature requests&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Platform Support&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Splunk Enterprise 9.x or later&lt;/li&gt;
&lt;li&gt;Splunk Cloud&lt;/li&gt;
&lt;li&gt;Light and dark theme support with three-state toggle (Light / Dark / Auto)&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Unified product catalog and integration guide for 50+ Cisco products in Splunk — find the right add-ons, check compatibility, and streamline deployment across Enterprise and Cloud.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Splunk Cisco App Navigator (SCAN) is the front door to the Cisco–Splunk ecosystem. It provides a unified product catalog of 50+ Cisco products with interactive cards that show which Splunk add-ons, apps, and integrations are available for each product — along with platform compatibility, sourcetype coverage, deployment guidance, and direct links to Splunkbase and documentation.

SCAN solves a persistent problem for Splunk administrators and Cisco engineers: figuring out which Cisco add-ons to install, whether they are compatible with your Splunk version and platform (Enterprise or Cloud), and how they all fit together. Instead of searching Splunkbase and cross-referencing documentation manually, SCAN puts everything in one place.

Key capabilities:

- Product Catalog — Browse 50+ Cisco products organized by category (Security, Networking, Observability, Collaboration). Each product card shows required add-ons, supported sourcetypes, SC4S support, and links to documentation.
- Splunkbase Intelligence — A synced catalog of all Cisco-related Splunkbase apps with version history, compatibility matrices, CIM compliance, and AppInspect results.
- Installation Health — Compare what&amp;#x27;s installed in your environment against the product catalog and Splunkbase to find outdated apps, missing add-ons, and deployment gaps.
- Magic Eight Audit — Deep inspection of props.conf settings for any installed Cisco sourcetype, validating TIME_FORMAT, SHOULD_LINEMERGE, LINE_BREAKER, and other critical parsing settings against best practices.
- Integration Guidance — Detailed modals for SC4S, NetFlow/IPFIX, Splunk Enterprise Security, SOAR, and ITSI showing exactly which add-ons are needed, how to configure them, and common pitfalls.
- Customer-Ready Summaries — One-click copy of product details formatted for sharing with customers, including required apps, Splunkbase links, and recommendations.
- Pre-built Reports — Ecosystem overviews, gap analysis, compatibility reports, and more.
- Light and Dark Mode — Full support for both Splunk Enterprise themes.

SCAN is designed for Splunk administrators, Cisco sales engineers, partner teams, and anyone who needs to navigate the Cisco–Splunk integration landscape quickly and confidently.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/6d13c15c-379b-11f1-9f2b-a6fcbd07a4ca.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Amir (AK) Khamis</dc:creator>
      <pubDate>Tue, 14 Apr 2026 13:33:03 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8566/#v1.0.25</guid>
    </item>
    <item>
      <title>Cisco Secure Access App for Splunk - v1.0.55 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/5558/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ol&gt;
&lt;li&gt;Added a Secure Access Alert Management Dashboard&lt;/li&gt;
&lt;li&gt;Updates to the DLP dashboard&lt;/li&gt;
&lt;li&gt;Bug fixes&lt;/li&gt;
&lt;/ol&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Cisco Secure Access App for Splunk integrates cloud security data with event data from Splunk to drive improved network visibility, faster threat detection, and mitigation response.

This App:
1. Provides visualizations using Cloud Security APIs (Secure Access and Umbrella).
2. Gives SOC’s/Threat Hunting teams the ability to learn more about destinations using the Investigate API.
3. Enables SOCs to block destinations using APIs.
4. Provides visibility into Applications used (API).
4. Lets teams manage Cloudlock CASB incidents.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/0be92a18-3190-11f1-b5d9-72170e4042f6.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Cisco Systems, Inc.</dc:creator>
      <pubDate>Tue, 14 Apr 2026 09:44:15 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5558/#v1.0.55</guid>
    </item>
    <item>
      <title>Cisco Secure Access Add-on for Splunk - v1.0.50 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/7569/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ol&gt;
&lt;li&gt;Added Secure Access Security Events and Alerts (push)&lt;/li&gt;
&lt;li&gt;Reduced Latency for DNS and FW Events (from S3)&lt;/li&gt;
&lt;li&gt;Added NTG (Network Connectivity Logs) Event Type Support&lt;/li&gt;
&lt;li&gt;A number of bug fixes&lt;/li&gt;
&lt;/ol&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Cisco Secure Access Add-on for Splunk gives you the ability to get your Cisco Secure Access or Cisco Umbrella logs into Splunk.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/2d4b67ae-318e-11f1-ad5e-56c15eb0d18d.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Cisco Systems, Inc.</dc:creator>
      <pubDate>Tue, 14 Apr 2026 09:43:35 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7569/#v1.0.50</guid>
    </item>
    <item>
      <title>Operant AI Add-on - v0.1.0 [New App Release] (Archived)</title>
      <link>https://splunkbase.splunk.com/app/8585/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;The first version&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Visualization-focused TA provides a way to analyze Operant&amp;#x27;s detections.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Operant AI Add-on delivers a compact Splunk Technology Add-on (TA) that ships a ready-to-use dashboards for visualizing Operant detection telemetry. It gives security and operations teams immediate visibility into detection volume and distribution — no custom searches or dashboard development required, it  assumes Operant event data is already indexed in Splunk thanks to the third-party integration.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/ab7c5920-26f9-11f1-8ab2-8e1c694f89e1.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sebastian Zumbado</dc:creator>
      <pubDate>Mon, 13 Apr 2026 21:02:30 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8585/#v0.1.0</guid>
    </item>
    <item>
      <title>SMTP - v3.3.4 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5847/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Adding should_sanitize_template parameter to allow disabling template sanitization if the template is benign&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app provides the ability to send email using SMTP&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/71047b40-3768-11f1-8b4d-1a2fb2591e15.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Mon, 13 Apr 2026 18:41:54 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5847/#v3.3.4</guid>
    </item>
    <item>
      <title>Microsoft 365 App for Splunk - v3.3.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/3786/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Microsoft 365 App for Splunk provides dashboards for Microsoft 365 data retrieved using the following Add-ons:
Splunk Add-on for Microsoft Office 365 - https://splunkbase.splunk.com/app/4055/
Splunk Add-on for Microsoft Security - https://splunkbase.splunk.com/app/6207/
Microsoft 365 Reporting Add-on for Splunk - https://splunkbase.splunk.com/app/3720/
Microsoft Teams Add-on for Splunk - https://splunkbase.splunk.com/app/4994/

Dashboards: 
- Azure Active Directory
- Defender 365
- Defender for Endpoint
- User Audit dashboard
- Exchange
- SharePoint
- OneDrive
- Microsoft Teams
- Power BI
- Full step-by-step data onboarding guide

It is anticipated that future versions may include additional dashboards and data from other Microsoft 365 services.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/50efe0d6-3765-11f1-9f2b-a6fcbd07a4ca.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk Works</dc:creator>
      <pubDate>Mon, 13 Apr 2026 18:27:15 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3786/#v3.3.2</guid>
    </item>
    <item>
      <title>MITRE ATLAS AI Threat Detection for Splunk - v1.0.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8527/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;v1.0.1 — Bug Fixes and Package Cleanup&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Renamed all 10 saved search stanzas to ATLAS_DETECT_T* naming convention to prevent namespace collision when installed alongside future app that will be released shortly.&lt;/li&gt;
&lt;li&gt;Direct Prompt Injection rule (AML.T0051.000) now uses the bundled atlas_injection_keywords.csv lookup for tunable detection alongside inline pattern matching&lt;/li&gt;
&lt;li&gt;Fixed app.conf packaging flag&lt;/li&gt;
&lt;li&gt;Populated app.manifest with correct category, license (Apache 2.0), author, and deployment metadata&lt;/li&gt;
&lt;li&gt;Added Apache 2.0 LICENSE file to package&lt;/li&gt;
&lt;li&gt;Updated README with TA note for dual-install environments and link to all GIC apps on Splunkbase&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;10 free MITRE ATLAS detection rules for AI/LLM threats. Guided setup with auto-discovery and platform-specific configuration for 12 LLM providers. Detects prompt injection, jailbreak, exfiltration, training data poisoning, model reconnaissance, and more.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;MITRE ATLAS is the adversarial threat matrix for AI/ML systems — the AI equivalent of MITRE ATT&amp;amp;CK. As organizations deploy LLMs, RAG pipelines, and ML APIs into production, they create an attack surface that most Splunk deployments have zero detection coverage for.

This app provides 10 detection rules for AI and LLM threats, mapped to specific MITRE ATLAS technique IDs. Each rule is a Splunk saved search that monitors your AI/LLM logs for known attack patterns including prompt injection, jailbreak attempts, data exfiltration via inference APIs, training data poisoning, model reconnaissance, and AI abuse.

The app includes a guided Setup dashboard that auto-discovers AI/LLM data in your environment, validates required fields, and shows which rules your data supports. A Configuration Guide provides platform-specific instructions for 12 LLM providers including LiteLLM, Azure OpenAI, AWS Bedrock, OpenAI, GCP Vertex AI, Kong AI Gateway, Portkey, Helicone, Cloudflare AI Gateway, Anthropic, self-hosted models (Ollama, vLLM, TGI), and custom API gateways.

Rules are organized into two tiers:

Tier 1 (Operational) — works with standard telemetry: token counts, API call volumes, storage access logs. Available from most platforms with default logging.

Tier 2 (Content Inspection) — requires actual prompt/response text in log events. Requires explicit opt-in on all major platforms. The Configuration Guide explains how to enable this for each provider.

Detection Coverage:
- AML.T0051.000 Direct Prompt Injection (Tier 2)
- AML.T0051.001 Indirect Prompt Injection via Retrieved Content (Tier 2)
- AML.T0054 LLM Jailbreak (Tier 2)
- AML.T0024 Exfiltration via ML Inference API (Tier 1)
- AML.T0020 Training Data Poisoning (Tier 1)
- AML.T0047 AI-Enabled Bulk Content Generation (Tier 1)
- AML.T0048 External Harms Safety Flag (Tier 1)
- AML.T0012 Valid Account Abuse on AI Platform (Tier 1)
- AML.T0014 AI Model Reconnaissance (Tier 2)
- AML.T0007 AI Artifact Discovery (Tier 1)

All rules ship disabled by default. No Python scripts, no external dependencies — pure SPL and CSV lookups. Detection results are written to the summary index for fast dashboard rendering.

Built by a Splunk Enterprise Architect with 10+ years of hands-on experience. This app is a standalone community release from GIC Engineering Consultants.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/static/image/default_icon.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marcus House</dc:creator>
      <pubDate>Mon, 13 Apr 2026 18:17:15 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8527/#v1.0.1</guid>
    </item>
    <item>
      <title>Trend Vision One for Splunk SOAR - v3.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6569/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;TrendAI logo/description rebranding.&lt;/li&gt;
&lt;li&gt;Python version update.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;TrendAI Vision One™ is a purpose-built threat defense platform that provides added value and new benefits beyond XDR solutions, allowing you to see more and respond faster. Providing deep and broad extended detection and response (XDR) capabilities that collect and automatically correlate data across multiple security layers—email, endpoints, servers, cloud workloads, and networks—TrendAI Vision One™ prevents the majority of attacks with automated protection&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/7b9bf838-3756-11f1-8030-dedb79f4fe8c.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SOAR Community</dc:creator>
      <pubDate>Mon, 13 Apr 2026 16:33:21 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6569/#v3.1.0</guid>
    </item>
    <item>
      <title>Flashpoint Splunk App - v2.4.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/4784/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Enhanced the Matching Configurations tab to support multiple IOC types, each with its own configuration.&lt;/li&gt;
&lt;li&gt;Introduced a new workflow action for on-demand Alert investigation to retrieve and view Alert details dynamically.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Leveraging Flashpoint’s technical data and intelligence reports provides Splunk users with visibility into illicit online communities in order to correlate information related to their infrastructure, therefore, gaining insights in a timely manner and leveraging connections to prioritize their response. The Flashpoint Splunk App and Add-on enables Flashpoint data to be seamlessly integrated into customers’ Splunk instances in order to automatically alert customers when a match has been made between indicators from internal log data and Flashpoint intelligence. 

Integrated Flashpoint Datasets:

Technical Indicators: Enables users access to indicators of compromise (IOCs) and technical data across Flashpoint datasets, including those found in Flashpoint Finished Intelligence Reports, allowing for seamless integration into users’ workflows and automated tools. 

Finished Intelligence:  Access to analytical reports produced by our intelligence analysts. Reports cover a wide spectrum of illicit underground activity, including crimeware, fraud, emerging malware, violent extremism, and physical threats.

Flashpoint CVEs Dataset: CVEs: Access to the latest CVEs within Flashpoint collection, including access to MITRE and NVD data, as well as CVEs discussed by threat actors as observed by Flashpoint Intelligence Analysts.

Key Features: 

- Captures, indexes, and correlates in real time Flashpoint technical data within Splunk’s searchable repository 
- Enables users to generate reports and visualizations, including graphs, alerts, and dashboards 
- Collect integrated data using Flashpoint’s REST-based API 
- Includes IOCs such as hashes, URLs, domains, as well as details related to malware families, mapping to the MITRE ATT&amp;amp;CK framework 
- Access Pre-Built Dashboards with associated Flashpoint data
- View new CVEs and see which products they affect, see which CVEs are being discussed by malicious actors and see which CVEs have active exploits

About Flashpoint
Flashpoint delivers converged intelligence and risk solutions to private and public sector organizations worldwide. As the global leader in Business Risk Intelligence (BRI), Flashpoint provides meaningful intelligence to assist organizations in combating threats and adversaries. Through sophisticated technology, advanced data collections, and human-powered analysis, Flashpoint is the only intelligence firm that can help multiple teams across an organization bolster cybersecurity, confront fraud, detect insider threats, enhance corporate and physical security, improve executive protection, address third-party risk, and support due diligence efforts. 
For more information, visit https://www.flashpoint-intel.com/ or follow us on Twitter at @FlashpointIntel.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/e9667540-3739-11f1-9f2b-a6fcbd07a4ca.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Matt Howell</dc:creator>
      <pubDate>Mon, 13 Apr 2026 13:12:07 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/4784/#v2.4.0</guid>
    </item>
    <item>
      <title>Splunk Connect for Zoom - v1.2.4 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/4961/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Splunk Connect for Zoom seamlessly integrates your Zoom deployment data into your Splunk platform deployment. Using this integration, you can accept incoming webhooks from Zoom in order to collect a variety of data pertaining to numerous events, such as meetings, and participants. This information can be used to start gathering insights and business centric value instantly. Splunk Connect for Zoom provides a holistic end-to-end solution when used with the Splunk App for Zoom or the Remote Work Insights (RWI) - Executive Dashboard.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/0136c682-72cf-11f0-be6a-4afbe97fbb05.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Mon, 13 Apr 2026 10:59:54 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/4961/#v1.2.4</guid>
    </item>
    <item>
      <title>Contrast Security ADR for Splunk - v1.2.3 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7734/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Minor update:
* Added Splunk 10 compatibility
* Added sc_admin role to write permissions for Splunk Cloud&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Contrast Security Application Detection &amp;amp; Response (ADR) for Splunk allows you to secure running applications like never before. Contrast Security ADR for Splunk provides timely actionable attack exploit events across the entire application portfolio. Contrast Security instrumented applications self-report the following about an attack – the attacker’s IP address, authenticated username, method of attack, which applications, servers, frequency, volume, level of compromise, and more. In addition, Contrast Security can block these attacks in real time while also providing specific guidance to engineering teams on where applications were attacked and how threats can be remediated. Finally, Contrast Security&amp;#x27;s Log Enhancement capability extends this visibility into the inner workings of application and user behavior. Log Enhancers enable users to log anything in an application.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/06183908-3721-11f1-b7ab-86d75ea99f5d.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Thibault Barillon</dc:creator>
      <pubDate>Mon, 13 Apr 2026 10:57:48 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7734/#v1.2.3</guid>
    </item>
    <item>
      <title>SpyCloud Investigations App for Splunk - v1.0.2 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/6857/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ol&gt;
&lt;li&gt;Cluster-wide Credential Validation&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Added validation logic to ensure INV API credentials are present and consistent across all Search Head Cluster members, prevents inconsistent behavior caused by partial or missing credential configurations.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Redirect Handling&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Users are now automatically redirected to the setup/configuration page when required credentials are not detected.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Alerting for Missing Credentials&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Introduced alerting mechanism when INV API credentials are absent.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;SpyCloud Investigations App for Splunk enables users to explore criminal activity through the lens of recaptured data and provides access to SpyCloud’s repository of billions of recaptured darknet assets from within your Splunk environment to assist with cybercrime and fraud investigations. 

The SpyCloud Investigations App enables Splunk users to uncover the the true identities of specific criminals, profile criminal targets, determine the origin of data used in credential stuffing attacks and identify the exposure of public applications to botnet credential stealers, research criminal campaigns (including the breadth and nature of malicious campaigns), and understand user risk from reused credentials to malware infections. The app includes a GUI for ad-hoc searching and downloading of data. Additionally, two custom search commands are included that allow a customer to use SpyCloud’s dataset from within Splunk queries.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/09a80854-3722-11f1-b9db-a6a2798b59dd.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CW Walker</dc:creator>
      <pubDate>Mon, 13 Apr 2026 10:24:45 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6857/#v1.0.2</guid>
    </item>
    <item>
      <title>XM Cyber Integration - v3.0.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6632/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Release Notes:&lt;br&gt;
- Removed Base URL validation from account configuration.&lt;br&gt;
- Updated Tenant field extraction to include the full Base URL instead of a partial value.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The XM Cyber Splunk Integration collects and  analyzes entities, critical assets, scenario and overall security scores, and the attack techniques that attackers might use to compromise the configured cloud environments. Integrated with Splunk, it provides visibility into potential attack paths, critical vulnerabilities, misconfigurations etc to proactively prevent breaches. The Integration also offers pre-built dashboards for easy analysis. This helps operational teams monitor and troubleshoot issues.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/c61cc0d6-343b-11f1-99f2-0aaba2e5f8c4.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">XM Cyber</dc:creator>
      <pubDate>Sun, 12 Apr 2026 06:49:58 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6632/#v3.0.2</guid>
    </item>
    <item>
      <title>Bitwarden Event Logs - v2.1.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6592/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/bitwarden/splunk/commit/6d6676174f901aac8c28757197e3666ed4e0c975&quot;&gt;deps: Update @angular/core to v21.2.4 - SECURITY&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Code ownership change and dependency updates&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app provides insight into activity of your Bitwarden organization such as user&amp;#x27;s activity (logged in, changed password, 2fa, etc.), cipher activity (created, updated, deleted, shared, etc.), collection activity, organization activity, and more.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/e66b640c-3448-11f1-8f5b-c2d7cd6d796a.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bitwarden Inc</dc:creator>
      <pubDate>Fri, 10 Apr 2026 15:12:10 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6592/#v2.1.1</guid>
    </item>
    <item>
      <title>LCS Insights - v1.5.1 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8461/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Added app icon, added run_on_startup to Alerts, added Unidentified Inventory Details dashboard&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Version 1.5.1: Sixteen dashboards: Executive Summary (2), Hardware Strategy (3), Software Strategy (6), Support Strategy (2), Symptom Management (1), Inventory (2)&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This application was created by Cisco CX to help customers visualize technical debt and manage known risk.  Version 1.1 introduced a single dashboard called Risk Overview which shows KPIs for Lifecycle risk, Vulnerability risk and Compliance risk.  Version 1.2 added Get Well Plan and Hardware End of Life Summary.  Version 1.3 added Hardware End of Life Details, Hardware End of Life Planning, and 4 Software Strategy dashboards.  Version 1.4 added Software Diversity Outliers, Software Diverse Families and Sparing Policy Alignment dashboards, bringing the total to 12.  Version 1.5 added SMARTnet Coverage, Crash Analysis and Hardware Inventory dashboards.  Version 1.5.1 added Unidentified Inventory Details, for a total of 16.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/69d3eab6-346d-11f1-b0f6-0a6c44ea4ebd.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Russell Byrne</dc:creator>
      <pubDate>Fri, 10 Apr 2026 00:08:51 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8461/#v1.5.1</guid>
    </item>
    <item>
      <title>Sandfly Security Add-on for Splunk - v5.0.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5015/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h2&gt;New Features&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Refactored the Sandfly Alarms input for ingesting Sandfly results data&lt;ul&gt;
&lt;li&gt;Option to ingest smaller size Summary results for all Alert, Passed, Error result types&lt;/li&gt;
&lt;li&gt;Option to ingest duplicate Alerts when the last seen timestamp is updated&lt;/li&gt;
&lt;li&gt;Option to ingest smaller size Summary results for duplicate Alerts&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Other Updates&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Modified response processing for Sandfly REST API changes&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Sandfly is an agentless intrusion detection and incident response platform for Linux. Sandfly automatically analyzes Linux hosts for intruders 24 hours a day without loading any software on your endpoints. Additionally, Sandfly can retrieve hardware, operating system and related data for analysis in Splunk. Sandfly works across virtually all Linux distributions immediately without risk to stability or performance.

The Sandfly Security Add-on for Splunk is a technology add-on that ingests events from a Sandfly Security server using the Sandfly Security REST API. This add-on (TA-sandfly-security) ingests data into your specified index and sets the correct sourcetype for each event. Events are ingested as JSON formatted events. Review the Details tab for a list of all supported sourcetypes.

The Sandfly Agentless Security for Linux App includes dashboards, reports and logic for analyzing data ingested from a Sandfly server such as security alerts, suspicious activity and general software and hardware metrics. Data retrieved by Sandfly can also be used by Splunk users to build anomaly detection models, incident response and insights into software and hardware versions of your Linux fleet.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/6f4f6b28-342c-11f1-8f5b-c2d7cd6d796a.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sandfly Security</dc:creator>
      <pubDate>Thu, 09 Apr 2026 16:11:24 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5015/#v5.0.0</guid>
    </item>
    <item>
      <title>Splunk Add-on for Apache Web Server - v3.0.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/3186/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Depreciated the support for python3.7 version&lt;br&gt;
Security fixes&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Splunk Add-on for Apache Web Server allows a Splunk software administrator to collect and analyze data from Apache Web Server using file monitoring. After the Splunk platform indexes the events, you can analyze the data using the prebuilt panels included with the add-on. 

This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Web.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/c349dc2a-3401-11f1-9b1f-5ab5123230fd.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Thu, 09 Apr 2026 10:56:09 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3186/#v3.0.0</guid>
    </item>
    <item>
      <title>USTA Malware and C2 Intelligence for Splunk - v1.0.3 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7582/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Supporting 10.x&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Introducing the USTA Malware and C2 Intelligence for Splunk app, a powerful integration designed to ingest threat intelligence data from the USTA solution. This app enables organizations to seamlessly import Indicators of Compromise (IOCs), including malware, malicious URLs, and phishing sites, into Splunk. Provided by PRODAFT.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/7a3981ec-33fd-11f1-9aa1-9aaa231c919c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">PRODAFT Intelligence</dc:creator>
      <pubDate>Thu, 09 Apr 2026 10:22:39 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7582/#v1.0.3</guid>
    </item>
    <item>
      <title>USTA Stolen Credit Cards for Splunk - v1.0.4 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7585/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Supporting the 10.x&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The USTA Stolen Credit Cards for Splunk Add-on enables security teams to monitor and analyze compromised credit card data in real time. It fetches stolen credit card information from USTA&amp;#x27;s threat intelligence sources and integrates it into Splunk. Provided by PRODAFT.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/5b33bbcc-33f9-11f1-9aa1-9aaa231c919c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">PRODAFT Intelligence</dc:creator>
      <pubDate>Thu, 09 Apr 2026 09:53:47 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7585/#v1.0.4</guid>
    </item>
    <item>
      <title>Splunk Add-on for Microsoft Cloud Services - v6.1.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/3110/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Splunk Add-on for Microsoft Cloud Services allows a Splunk software administrator to pull activity logs, service status, operational messages, Azure audit, Azure resource data and Azure Storage Table and Blob data from a variety of Microsoft cloud services using Event Hubs,  Azure Service Management APIs and Azure Storage API.

This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security and the Splunk App for PCI Compliance and Splunk IT Service Intelligence.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/463abc38-334b-11f1-8f5b-c2d7cd6d796a.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Thu, 09 Apr 2026 09:39:35 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3110/#v6.1.1</guid>
    </item>
    <item>
      <title>USTA Account Takeover Prevention for Splunk - v1.0.6 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7558/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;USTA is a market-leading threat intelligence solution provided by PRODAFT specifically designed to combat ransomware, online fraud, and account takeover attempts. By collecting compromised credentials from stealer malware, USTA provides real-time insights and actionable intelligence to help organizations detect and mitigate threats, protecting their sensitive accounts and digital assets from malicious activity.

This Splunk app integrates with USTA’s threat intelligence API, enabling seamless import of breach alerts directly into Splunk for immediate action. USTA leverages your configured watchlist (domains, email addresses, and IP addresses) to determine which compromised credentials and threat data to collect.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/5e6a3dc4-33f0-11f1-bb58-8610eda3bfd9.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">PRODAFT Intelligence</dc:creator>
      <pubDate>Thu, 09 Apr 2026 09:15:35 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7558/#v1.0.6</guid>
    </item>
    <item>
      <title>Alert Manager Enterprise - v3.8.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6730/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;&lt;a href=&quot;https://docs.datapunctum.com/ame/ame-release-notes&quot;&gt;Full Release Notes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Important&lt;/strong&gt;&lt;br&gt;
Please read the &lt;a href=&quot;https://docs.datapunctum.com/ame/ame-before-upgrading&quot;&gt;Before Upgrading Guide&lt;/a&gt; before installing this version of AME.&lt;/p&gt;
&lt;h3&gt;Version 3.8.1&lt;/h3&gt;
&lt;p&gt;Fixed issues:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AME-1613 Correct parsing of list values from savedsearches.conf&lt;/li&gt;
&lt;li&gt;AME-1615 Prevent excessive payload logging for internal calls&lt;/li&gt;
&lt;li&gt;AME-1622 Correct permissions of setup view to be accessible to ame.admin&lt;/li&gt;
&lt;li&gt;AME-1627 Correct filter parsing on observable overview&lt;/li&gt;
&lt;li&gt;AME-1631 Implement optimized field select component for observable tab&lt;/li&gt;
&lt;li&gt;AME-1635 Add support for float fields in Jira integration&lt;/li&gt;
&lt;li&gt;AME-1637 Correct Jira integration to not transition if status matches&lt;/li&gt;
&lt;li&gt;AME-1638 Add support for JSON based custom fields in Jira integration&lt;/li&gt;
&lt;li&gt;AME-1663 Correct create_notification import order&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Version 3.8.0&lt;/h3&gt;
&lt;p&gt;What's new:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AME-1567: Allow overwrite of email subjects with templating support&lt;/li&gt;
&lt;li&gt;AME-1565: Allow selecting a template for manual event creating, supporting all template fields and observable extraction&lt;/li&gt;
&lt;li&gt;AME-1564: Allow adding not yet valid licenses&lt;/li&gt;
&lt;li&gt;AME-1560: Allow using Microsoft Defender as source for vulnerability data&lt;/li&gt;
&lt;li&gt;AME-1555: Allow usage of AME behind path based reverse proxy&lt;/li&gt;
&lt;li&gt;AME-1540: Add vulnerability reporting indicator: Percentage of open Notable Realizations&lt;/li&gt;
&lt;li&gt;AME-1541: Add vulnerability reporting indicator: Number of Realizations with Event&lt;/li&gt;
&lt;li&gt;AME-1542: Add vulnerability reporting indicator: Median Time to CLose Notable Realizations&lt;/li&gt;
&lt;li&gt;AME-1543: Add vulnerability reporting indicator: Percentage of Realizations Closed in Days Range&lt;/li&gt;
&lt;li&gt;AME-1544: Add vulnerability reporting indicator: Percentage of Realizations Closed After Days&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Fixed Issues&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AME-1602: Correct checks regarding whether an observable should time out&lt;/li&gt;
&lt;li&gt;AME-1601: Correct spurious error log on template key only events&lt;/li&gt;
&lt;li&gt;AME-1579: Migrating from jsurl2 to qs, allowing special characters in URL&lt;/li&gt;
&lt;li&gt;AME-1572: Correct forwarding location on unfinished migration tasks&lt;/li&gt;
&lt;li&gt;AME-1551: Correct deep link to event from notifications&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Deprecation notice:&lt;/p&gt;
&lt;p&gt;Starting with version 4.0.0, the following features will be deprecated and removed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“squash” configuration option on notification targets&lt;/li&gt;
&lt;li&gt;Removal of CVE Tag view&lt;/li&gt;
&lt;li&gt;moved to CVE overview in vulnerability intelligence&lt;/li&gt;
&lt;li&gt;requires configuration of NIST API key for fetching CVE information&lt;/li&gt;
&lt;li&gt;Windows Plattform Support&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Datapunctum Alert Manager Enterprise helps IT Ops and Security teams manage their alerts within Splunk Enterprise and Splunk Cloud.

Add the Alert Manager Enterprise Alert Action to your existing searches and manage your alerts immediately.
Get started today with our quickstart guide at https://www.alertmanager.app/docs/ame-quickstart !&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/bd2e26a8-33ec-11f1-9aa1-9aaa231c919c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Datapunctum AG</dc:creator>
      <pubDate>Thu, 09 Apr 2026 09:11:46 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6730/#v3.8.1</guid>
    </item>
    <item>
      <title>LCS Plug-In - v1.1.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8363/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h2&gt;Overview&lt;/h2&gt;
&lt;p&gt;Version 1.1.0 is a major architectural release. The add-on was rebuilt using the&lt;br&gt;
  Splunk UCC (Universal Configuration Console) framework, replacing the previous&lt;br&gt;
  Add-on Builder structure. This brings a standards-compliant app layout, a&lt;br&gt;
  schema-driven UI, and bundled dependencies — alongside several new features and&lt;br&gt;
  reliability improvements.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;## Breaking Changes&lt;/p&gt;
&lt;p&gt;### Migrated from Add-on Builder to UCC Framework&lt;/p&gt;
&lt;p&gt;The add-on now follows the UCC framework structure and must be built with&lt;br&gt;
&lt;code&gt;ucc-gen&lt;/code&gt; before deployment.&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;v1.0.0 (Add-on Builder)&lt;/th&gt;
&lt;th&gt;v1.1.0 (UCC)&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Modular input script&lt;/td&gt;
&lt;td&gt;&lt;code&gt;lcs_plug_in.py&lt;/code&gt; (root)&lt;/td&gt;
&lt;td&gt;&lt;code&gt;package/bin/input_module_lcs_insights.py&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;UI configuration&lt;/td&gt;
&lt;td&gt;Manually crafted &lt;code&gt;.conf&lt;/code&gt; files&lt;/td&gt;
&lt;td&gt;&lt;code&gt;globalConfig.json&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bundled dependencies&lt;/td&gt;
&lt;td&gt;None&lt;/td&gt;
&lt;td&gt;&lt;code&gt;package/lib/requirements.txt&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Build output&lt;/td&gt;
&lt;td&gt;n/a&lt;/td&gt;
&lt;td&gt;&lt;code&gt;ucc-gen build&lt;/code&gt; → &lt;code&gt;output/TA-lcs-plug-in/&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;This app integrates Cisco Business Critical Services (BCS) operational data into Splunk, automating the collection of device inventory, configuration best practices, security advisories, and lifecycle alerts. It simplifies API authentication and rate limiting, enabling Cisco Advanced Services customers to monitor and analyze their network operations efficiently.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This Splunk add-on is designed to collect and ingest operational insights data from Cisco’s Business Critical Services (BCS) API into Splunk. It enables users to automatically fetch a wide range of detailed device, inventory, configuration, risk mitigation, and product alert information from Cisco’s API endpoints and index this data within Splunk for analysis and monitoring.

The app addresses the challenge of integrating Cisco BCS operational data into Splunk by providing a modular input that handles authentication, API rate limiting, pagination, and event creation for multiple data sources. This allows customers—particularly those with Cisco Advanced Services—to gain centralized visibility into their Cisco device inventory, configuration best practices, security advisories, hardware and software lifecycle alerts, and other critical operational metrics without manual data collection.

By automating the retrieval and indexing of this comprehensive Cisco operational data, the app helps organizations improve their network management, risk assessment, and compliance monitoring capabilities within the Splunk platform.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/b60a539c-33e2-11f1-9aa1-9aaa231c919c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Israel Fernandez</dc:creator>
      <pubDate>Thu, 09 Apr 2026 07:24:12 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8363/#v1.1.0</guid>
    </item>
    <item>
      <title>Webex Add-on for Splunk - v1.4.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8365/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Added support for search endpoint of Webex Contact Center&lt;/li&gt;
&lt;li&gt;Added support for POST method in the Generic Input&lt;/li&gt;
&lt;li&gt;Fixed the Invalid Refresh Token bug&lt;/li&gt;
&lt;li&gt;Fixed the FQDN region issue for the Webex Detailed Call History Input&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This Add-on allows users to pull data from the Webex REST API to Splunk.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/366ec972-3376-11f1-8f5b-c2d7cd6d796a.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Yuan Ling</dc:creator>
      <pubDate>Wed, 08 Apr 2026 18:19:14 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8365/#v1.4.0</guid>
    </item>
    <item>
      <title>VirusTotal v3 - v3.0.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5865/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;fix detonate_url to send URL as form data instead of JSON&lt;/li&gt;
&lt;li&gt;fix polling in detonate actions being broken by response caching&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app integrates with the VirusTotal cloud to implement investigative and reputation actions using v3 APIs&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/ea36422a-3360-11f1-bb58-8610eda3bfd9.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Wed, 08 Apr 2026 15:37:57 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5865/#v3.0.2</guid>
    </item>
    <item>
      <title>OT Security Add-on for Splunk - v3.0.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5151/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;What’s New:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Modernized Dashboards: Dashboards have been rebuilt using Dashboard Studio to ensure a seamless and consistent experience with ES 8+.&lt;/li&gt;
&lt;li&gt;Expanded Compatibility: Now fully compatible with ES versions 8.0.4 through 8.4.&lt;/li&gt;
&lt;li&gt;Enhanced Risk Based Alerting (RBA): Existing correlation rules and findings have been updated to align with modern RBA best practices, helping you prioritize critical threats more effectively.&lt;/li&gt;
&lt;li&gt;NERC-CIP 015 Support: New dedicated dashboards and reports have been added to help streamline your NERC-CIP 015 compliance efforts.&lt;/li&gt;
&lt;li&gt;Refreshed Asset Baselining UI: The configuration baselining interface has been updated, making it easier to track applications, OS, services, network device configurations, and firmware.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The OT Security Add-on for Splunk enables organizations that operate assets, networks, and facilities across both IT and OT environments to better apply the globally proven SIEM, Splunk Enterprise Security, to improve threat detection, incident investigation, and response. The OT Security Add-on for Splunk expands the capabilities of Splunk’s platform to monitor for threats and attacks, compliance, incident investigation, forensics, and incident response across the broad spectrum of assets and topologies - from email servers to PLCs -  that define modern manufacturing, energy, and public sector organizations.

Components of this solution include:
OT Security Overview
Perimeter Monitoring
Infrastructure Monitoring
Centralized view across partner technologies.
NERC CIP Compliance Reporting
Correlation Rules including mapping to security frameworks like MITRE ATT&amp;amp;CK for ICS, CIS 20, and others
Integration with Enterprise Security
Dashboards designed to help you identify misconfigurations and missing data

The OT Security Add-on for Splunk REQUIRES Splunk Enterprise Security.

For any OT related sales conversations, please contact otsecurity@splunk.com

NOTE: Versions 2.3.5 and earlier are only compatible with ES 8.0.3 or earlier, version 3.0.1 is compatible with ES 8.0.4+&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/6b00c28e-32ff-11f1-93b6-9a59fa0735a9.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk Works</dc:creator>
      <pubDate>Wed, 08 Apr 2026 12:44:18 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5151/#v3.0.1</guid>
    </item>
    <item>
      <title>Video Experience Observability - v1.0.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8618/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h1&gt;Release Notes&lt;/h1&gt;
&lt;h2&gt;Version 1.0.0&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Initial Release — April 1, 2026&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;New App&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Kollective Video Experience Observability&lt;/strong&gt; — First release of the Kollective ECDN observability app for Splunk, delivering live event telemetry analytics across eight purpose-built dashboards&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Dashboard Tabs&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Overview&lt;/strong&gt; — Max Hourly Reach and Views KPIs; Avg Hourly QoE, QoD, QoV, QoEn radial gauges; stacked hourly distribution charts and distribution heatmap tables for all four quality dimensions&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Trends and Analysis&lt;/strong&gt; — All Metrics Over Time (QoE, QoD, QoV, QoEn) combined line chart and Hourly Reach, Views and Sessions Over Time for longitudinal event comparison&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;QoE Distribution&lt;/strong&gt; — QoE Session Distribution Over Time (stacked area), QoE Percentile Trends (Avg, P50, P95, P99), and QoE Distribution Density Heatmap (bands × hours)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;QoD Distribution&lt;/strong&gt; — QoD Session Distribution Over Time (stacked area), QoD Percentile Trends (Avg, P50, P95, P99), and QoD Distribution Density Heatmap (bands × hours)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;QoV Distribution&lt;/strong&gt; — QoV Session Distribution Over Time (stacked area), QoV Percentile Trends (Avg, P50, P95, P99), and QoV Distribution Density Heatmap (bands × hours)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;QoEn Distribution&lt;/strong&gt; — QoEn Session Distribution Over Time (stacked area), QoEn Percentile Trends (Avg, P50, P95, P99), and QoEn Distribution Density Heatmap (bands × hours)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Location Performance&lt;/strong&gt; — Location Performance Ranking table with Max Hourly Reach, Views, Sessions, and Avg Hourly QoE, QoD, QoV, QoEn per location; ranked by Max Hourly Views&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;App Performance&lt;/strong&gt; — Performance by Application table with the same columns, broken down by video application (e.g. Microsoft Teams, Webex, Vimeo, Kaltura)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Key Features&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Four-dimensional quality scoring&lt;/strong&gt; — QoE, QoD, QoV, QoEn on a 0–100 scale with Poor/Fair/Good/Excellent banding (thresholds: Excellent 90+, Good 80–89, Fair 70–79, Poor below 70)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Percentile-level analysis&lt;/strong&gt; — Avg, P50, P95, P99 trend views across all four quality dimensions to surface tail experiences hidden by averages&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Distribution density heatmaps&lt;/strong&gt; — Quality band session counts by hour for each metric, enabling time-of-day pattern identification&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Max Hourly Reach and Views&lt;/strong&gt; — Audience sizing metrics reported at hourly granularity; Reach counts unique viewers, Views counts total sessions including reconnects&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Global Location and Time Range filters&lt;/strong&gt; — Scoped inputs apply across all dashboard panels simultaneously; default time range is Last 24 Hours&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Contextual help text and reading guides&lt;/strong&gt; — Inline definitions and interpretation guidance on each tab, including metric definitions, how to read percentile charts, and how to interpret distribution heatmaps&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Companion app cross-reference&lt;/strong&gt; — Teams call quality visibility available via the &lt;a href=&quot;https://splunkbase.splunk.com/app/7997&quot;&gt;Kollective Microsoft Teams Collaboration Observability&lt;/a&gt; app&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Known Issues&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;None&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;*This is the initial release of the Kollective Video Experience Observability app. Live event telemetry requires an active Kollective Enterprise Video Optimization (ECDN) platform account. Start a free 30-day trial at &lt;a href=&quot;https://portal.kollective.app/free-trial.*&quot;&gt;https://portal.kollective.app/free-trial.*&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Transform live video delivery visibility with comprehensive ECDN observability powered by Kollective Technology. Monitor Quality of Experience (QoE), Quality of Delivery (QoD), Quality of Video (QoV), and Quality of Engagement (QoEn) across every live event — from regional sales kickoffs to global CEO all-hands — with real-time analytics and eight purpose-built interactive dashboards designed for Unified Communications and IT operations teams.

Already monitoring Microsoft Teams with Splunk? Pair this app with the Kollective Microsoft Teams Collaboration Observability app for complete unified workplace video visibility.

Ready to optimize your live event delivery? Start a free 30-day trial at https://portal.kollective.app/free-trial or contact salesinfo@kollective.com to connect with your account manager.

Learn more: http://kollective.com | LinkedIn: linkedin.com/company/kollective-technology&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/a288fbea-2dff-11f1-8460-4a5d62a7ae5f.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kollective Technology</dc:creator>
      <pubDate>Wed, 08 Apr 2026 12:40:59 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8618/#v1.0.0</guid>
    </item>
    <item>
      <title>AWS-DFD-Visualizer - v2.5.6 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8628/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Release Notes: AWS-DFD-Visualizer v2.5.6&lt;br&gt;
New Features &amp;amp; Enhancements&lt;br&gt;
Custom Branding &amp;amp; UI Icons: Introduced high-resolution, AWS-inspired app icons and logos.&lt;br&gt;
Added appIcon.png and appIcon_2x.png for a professional app-bar presence.&lt;br&gt;
Integrated new logo.png and logo_2x.png for a consistent experience on dashboards and the Splunkbase listing.&lt;br&gt;
Version Synchronization: Formalized versioning across app.conf, splunk-app-manifest.json, and the build pipeline to ensure consistency in Splunkbase.&lt;br&gt;
Compliance &amp;amp; Security&lt;br&gt;
Splunkbase Readiness: Resolved a critical AppInspect finding by enabling check_for_updates in the app's installation configuration.&lt;br&gt;
DoD-Hardened Build Pipeline:&lt;br&gt;
Improved the build process to automatically scrub WSL-specific metadata (Zone.Identifier) and hidden system files (.DS_Store) from the final package.&lt;br&gt;
Maintained NIL-5/NIST 800-53 standards for secure software supply chain provenance.&lt;br&gt;
Bug Fixes&lt;br&gt;
Fixed a synchronization issue where the UI version label in app.conf did not match the manifest version.&lt;br&gt;
Resolved pathing issues in the static asset directory to ensure icons load reliably on Splunk 9.x+ instances.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;Interactive D3.js force-directed graph for AWS Security Data Flows, featuring official AWS icons and Application Composer aesthetics for &amp;quot;Zero Trust&amp;quot; visibility.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The AWS DFD Visualizer provides a high-fidelity, interactive force-directed graph visualization specifically designed for AWS infrastructure and security data flows. In complex cloud environments, SOC analysts and Security Architects often struggle to visualize &amp;quot;Zero Trust&amp;quot; data patterns and service-to-service relationships using standard tables or basic charts.

This app addresses that gap by mapping search results directly into an architect-grade visualization using D3.js v7 and official AWS Application Composer aesthetics. It allows users to instantly identify connectivity patterns, data silos, and security relationships across services like Lambda, S3, RDS, and CloudWatch.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/d38e5b82-315f-11f1-ad5e-56c15eb0d18d.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Young Suh</dc:creator>
      <pubDate>Wed, 08 Apr 2026 12:35:57 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8628/#v2.5.6</guid>
    </item>
    <item>
      <title>HWP_HWPX_PDF Parser - v1.0.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/8630/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;BETA&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;A custom search command to seamlessly extract and parse text from Korean HWP and HWPX documents directly within Splunk.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Add-on for HWP Documents introduces the | kordoc search command, enabling users to read and analyze Korean Word Processor (HWP/HWPX) files in their Splunk data pipeline. Built with a fully embedded, standalone architecture, it operates completely offline without requiring any external internet connections or package installations, ensuring secure and fast document parsing across both Linux and Windows environments.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/1b6341c2-3311-11f1-8f5b-c2d7cd6d796a.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CTS ITCEN</dc:creator>
      <pubDate>Wed, 08 Apr 2026 12:34:49 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8630/#v1.0.0</guid>
    </item>
    <item>
      <title>Splunk Add-on for Salesforce - v6.0.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/3549/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;fixed requests CVE-2026-25645&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;*** Important: Read upgrade instructions and test your add-on update before deploying to production ***
Version 2.0.0 of the Splunk Add-on for Salesforce introduces breaking changes. To avoid data loss or data duplication, follow the documented upgrade instructions in detail. If your are upgrading an earlier version of the Splunk Add-on for Salesforce, a best practice is to test your update in a non-production environment before deploying to production.

The Splunk Add-on for Salesforce allows a Splunk software administrator to collect different types of data from Salesforce using REST APIs. The data includes:

* Event log file data, https://developer.salesforce.com/docs/atlas.en-us.api_rest.meta/api_rest/using_resources_event_log_files.htm.
* Output of Salesforce object queries (SOQL). 

This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security, the Splunk App for PCI Compliance, and Splunk IT Service Intelligence.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/55ff4eca-332f-11f1-a133-e246e7eb4d2d.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Wed, 08 Apr 2026 12:06:18 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3549/#v6.0.2</guid>
    </item>
    <item>
      <title>ThreatBook TI - v0.9.1 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8541/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h3&gt;What's New: Optimized Caching Logic&lt;/h3&gt;
&lt;p&gt;We have redesigned the app's internal caching mechanism. Instead of making repeated external requests for frequent queries, the app now intelligently stores and reuses local data.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;ThreatBook Cloud API for Splunk integrates ThreatBook threat intelligence with Splunk, enabling security teams to enrich IPs, domains, URLs, and file hashes with real-time threat intelligence.
The app provides SPL search commands and automation capabilities to help analysts quickly investigate indicators and enhance security monitoring workflows with ThreatBook intelligence.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/static/image/default_icon.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Hui Wang</dc:creator>
      <pubDate>Wed, 08 Apr 2026 11:00:19 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8541/#v0.9.1</guid>
    </item>
    <item>
      <title>Microsoft O365 Email Add-on for Splunk - v2.4.7 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5365/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h1&gt;Version 2.4.5&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Added HTML link mismatch analysis to identify cases where displayed URLs do not match the actual destination&lt;/li&gt;
&lt;li&gt;Added normalized SPF, DKIM, DMARC, and ARC result summaries&lt;/li&gt;
&lt;li&gt;Added sender impersonation analysis for reply-to, sender, and display-name mismatch scenarios&lt;/li&gt;
&lt;li&gt;Added URL risk analysis for shorteners, redirectors, IP-literal hosts, punycode domains, credential-harvest patterns, and brand/domain mismatches&lt;/li&gt;
&lt;li&gt;Added HTML abuse detection for forms, hidden text, suspicious CSS hiding, remote images, and tracking-style indicators&lt;/li&gt;
&lt;li&gt;Added attachment risk classification for suspicious file types, double extensions, embedded messages, nested archives, and macro-bearing attachments&lt;/li&gt;
&lt;li&gt;Added transparent overall message risk scoring with supporting reasons and breakdown fields&lt;/li&gt;
&lt;li&gt;Added optional raw ARC header collection&lt;/li&gt;
&lt;li&gt;Refined input field visibility so body and attachment helper settings appear only when the related parent features are enabled&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;Version 2.4.6&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Refreshed the package version after the &lt;code&gt;2.4.5&lt;/code&gt; input UI updates so upgraded Splunk Web instances pick up the latest static assets more reliably&lt;/li&gt;
&lt;li&gt;No functional changes beyond the versioned refresh of the updated input configuration experience&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;Version 2.4.7&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Tuned URL brand-keyword mismatch analysis to better recognize trusted vendor redirectors and vendor-owned domain families&lt;/li&gt;
&lt;li&gt;Reduced false positives for legitimate Microsoft redirect links such as &lt;code&gt;aka.ms&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Lowered the standalone weight of brand-keyword mismatch in overall message risk scoring&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Microsoft O365 Email Add-on for Splunk ingests Microsoft 365 email from a dedicated compliance mailbox through Microsoft Graph and writes the results to Splunk as JSON events.

The add-on is designed for security and operational visibility. It can enrich messages with:

- attachment metadata and file hashes
- attachment analysis, including ZIP inspection and Office macro detection
- body IOC extraction for URLs, domains, IPv4, and IPv6 values
- phishing-focused link, sender, URL, HTML, and attachment risk analysis
- vendor-aware URL analysis that reduces false positives for trusted redirectors such as Microsoft `aka.ms`
- normalized SPF, DKIM, DMARC, and ARC result summaries
- transparent message risk scoring with supporting reasons
- Internet header parsing
- mail relay and message path reporting
- S/MIME certificate extraction
- Microsoft 365 group membership snapshots through a separate input

The add-on is built around disposable compliance mailboxes that receive BCC copies of mail through Exchange mail flow rules. It processes the copied messages and purges them from the compliance mailbox so production user mailboxes are not touched.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/79b9fdd8-316d-11f1-97c1-6638f4eb3635.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk Works</dc:creator>
      <pubDate>Wed, 08 Apr 2026 07:46:58 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5365/#v2.4.7</guid>
    </item>
    <item>
      <title>Egnyte Secure and Govern Add-on For Splunk - v1.1.10 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/4526/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Improved reliability and stability of the add-on during intermittent Egnyte API connectivity issues.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Egnyte Secure &amp;amp; Govern Add-on For Splunk integrates with Egnyte Secure &amp;amp; Govern platform and ingest events from Egnyte Secure &amp;amp; Govern into Splunk. The Egnyte Secure &amp;amp; Govern Application provides insights into security incidents identified by Egnyte Secure &amp;amp; Govern. Splunk administrators can track enterprise-wide incidents identified by Egnyte Secure &amp;amp; Govern directly through the Splunk App.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/ab96ac60-3272-11f1-ad5e-56c15eb0d18d.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chapman Hong</dc:creator>
      <pubDate>Tue, 07 Apr 2026 11:16:43 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/4526/#v1.1.10</guid>
    </item>
    <item>
      <title>Egnyte Collaborate Add-on for Splunk - v1.1.12 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5653/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Improved reliability and stability of the add-on during intermittent Egnyte API connectivity issues.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Egnyte Collaborate Add-on for Splunk provides insights into the overall incidents that are identified and raised by Egnyte&amp;#x27;s Collaborate product. This enables Splunk administrators to track enterprise-wide audit logs identified by Egnyte&amp;#x27;s Collaborate product directly through the Splunk app&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/9f0acd1a-3271-11f1-ad5e-56c15eb0d18d.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Chapman Hong</dc:creator>
      <pubDate>Tue, 07 Apr 2026 11:10:44 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5653/#v1.1.12</guid>
    </item>
    <item>
      <title>Google Threat Intelligence - v1.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7918/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Added support for python 3.13&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Supercharge Splunk SOAR with Google Threat Intelligence by integrating real-time IOCs, breach insights, and threat actor data from VirusTotal, Mandiant, and Google for automated, context-rich responses&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/24976888-326f-11f1-ba90-bae7fd19d53c.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">SOAR Community</dc:creator>
      <pubDate>Tue, 07 Apr 2026 10:47:17 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7918/#v1.1.0</guid>
    </item>
    <item>
      <title>CrowdStrike Scheduled Search Technical Add-on - v3.1.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/6902/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h1&gt;TA-crowdstrike-scheduled-search v3.1.0 Release Notes&lt;/h1&gt;
&lt;h2&gt;Bug Fix&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Resolved an issue with how CSV-format report data was processed and delivered to Splunk, ensuring reliable timestamp extraction regardless of payload size&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Improvements&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Strengthened authentication handling with network failure detection, OAuth2 error diagnostics, and mid-collection token expiry recovery&lt;/li&gt;
&lt;li&gt;Improved API resilience with exponential backoff, jitter-based retry desynchronization, and expanded retry coverage for server errors&lt;/li&gt;
&lt;li&gt;Hardened checkpoint integrity so the TA halts on delivery or parsing failures to prevent producing duplicates&lt;/li&gt;
&lt;li&gt;Added batched event delivery to prevent pipe buffer overflows when ingesting large scheduled search results&lt;/li&gt;
&lt;li&gt;Enhanced logging with TA version, SDK version, API trace IDs, rate limit headers, and checkpoint state transitions for faster troubleshooting&lt;/li&gt;
&lt;li&gt;Removed unsupported SOCKS proxy types, tightened input validation, and centralized configuration constants&lt;/li&gt;
&lt;li&gt;Updated dashboard queries and props.conf timestamp settings to align with current platform standards&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The CrowdStrike Falcon Platform provides customers with extensive visibility into the configuration of and events taking place on endpoints and workloads. While triggered detections are an important part of endpoint security, CrowdStrike also provides the ability to search the raw event data. Scheduled searches can be used to automate the recurrence of those searches. This technical add-on allows CrowdStrike Falcon customers to retrieve successful scheduled searched from the Falcon platform via public APIs and have the events indexed into Splunk.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/108f5c2c-3217-11f1-ba90-bae7fd19d53c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">CrowdStrike</dc:creator>
      <pubDate>Tue, 07 Apr 2026 00:25:02 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6902/#v3.1.0</guid>
    </item>
    <item>
      <title>WHOIS - v2.2.12 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5867/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Patch the URL for KRNIC, fixing lookups for Korean IPs. Works around an &lt;a href=&quot;https://github.com/secynic/ipwhois/issues/342&quot;&gt;existing issue&lt;/a&gt; in &lt;code&gt;ipwhois&lt;/code&gt; [PAPP-37759]&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app implements investigative actions that query the whois database&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/38139658-31e7-11f1-b5d9-72170e4042f6.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Mon, 06 Apr 2026 18:34:18 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5867/#v2.2.12</guid>
    </item>
    <item>
      <title>Google Big Query Input - v1.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/5692/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Python 3.13 and dependence fixes&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Get data from Google Big Query tables. Supports setting a timestamp field and checkpoint field.

Originally created by Justin Lai and Brett Adams&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/25bd1bb8-2e87-11f1-b81a-62cb08abdeb3.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brett Adams</dc:creator>
      <pubDate>Fri, 03 Apr 2026 05:56:35 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5692/#v1.1.0</guid>
    </item>
    <item>
      <title>Splunk Common Information Model (CIM) - v8.5.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/1621/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;&lt;a href=&quot;https://help.splunk.com/en/splunk-enterprise-security-8/common-information-model/6.4/introduction/release-notes-for-the-splunk-common-information-model-add-on&quot;&gt;https://help.splunk.com/en/splunk-enterprise-security-8/common-information-model/6.4/introduction/release-notes-for-the-splunk-common-information-model-add-on&lt;/a&gt;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Common Information Model is a set of field names and tags which are expected to define the least common denominator of a domain of interest. It is implemented as documentation on the Splunk docs website and JSON data model files in this add-on. Use the CIM add-on when modeling data or building apps to ensure compatibility between apps, or to just take advantage of these data models to pivot and report.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/e438112e-2ed2-11f1-8be0-0a1fd842b6f5.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Thu, 02 Apr 2026 22:12:17 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/1621/#v8.5.0</guid>
    </item>
    <item>
      <title>TA-user-agents - v1.7.12 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/1843/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;==== Version 1.7.12&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bug Fix&lt;br&gt;
** Fixed the &lt;code&gt;README/apl_logging.conf.spec&lt;/code&gt; to properly parse against the TA.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This Add-on provides a dynamic lookup for parsing User Agent strings. This version was built to be faster, and does not require internet access from your Splunk systems.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/366dfc5c-2ed2-11f1-ba90-bae7fd19d53c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aplura LLC</dc:creator>
      <pubDate>Thu, 02 Apr 2026 20:30:19 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/1843/#v1.7.12</guid>
    </item>
    <item>
      <title>TA-user-agents - v1.7.12 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/1843/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;==== Version 1.7.12&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bug Fix&lt;br&gt;
** Fixed the &lt;code&gt;README/apl_logging.conf.spec&lt;/code&gt; to properly parse against the TA.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This Add-on provides a dynamic lookup for parsing User Agent strings. This version was built to be faster, and does not require internet access from your Splunk systems.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/366dfc5c-2ed2-11f1-ba90-bae7fd19d53c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Aplura LLC</dc:creator>
      <pubDate>Thu, 02 Apr 2026 20:30:19 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/1843/#v1.7.12</guid>
    </item>
    <item>
      <title>Omega Core Audit for Oracle - v1.8.5 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/4307/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Version 1.8.5&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Omega Core Audit for Oracle App for Splunk integrates Omega Core Audit with Splunk. 

Omega Core Audit is a software-only security solution that implements access control, continuous audit monitoring and real-time protection for Oracle databases.

Omega Core Audit for Oracle App for Splunk provides an Executive, Security Analysts and Operational view on the activity performed on the enterprise’s Oracle databases monitored and protected by Omega Core Audit deployments.

DATAPLUS
Oracle Database security solutions
www.dataplus-al.com&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/07f1d0ee-2ebc-11f1-ba90-bae7fd19d53c.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Altin Karaulli</dc:creator>
      <pubDate>Thu, 02 Apr 2026 17:53:36 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/4307/#v1.8.5</guid>
    </item>
    <item>
      <title>Oracle Unified Audit - v1.2.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6172/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Version 1.2.0&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Oracle Unified Audit App for Splunk integrates Oracle database unified audit with Splunk.

Oracle Unified Audit App for Splunk provides an Executive, Security Analysts and Operational view on the activity of the enterprise’s Oracle databases.

DATAPLUS
Oracle Database security solutions
www.dataplus-al.com&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/91311c94-2eb6-11f1-bc67-2e62efba54ff.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Altin Karaulli</dc:creator>
      <pubDate>Thu, 02 Apr 2026 17:14:09 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6172/#v1.2.0</guid>
    </item>
    <item>
      <title>MS Graph for SharePoint - v1.5.2 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/6351/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; SOAR&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;fix: resolve json parsing error&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This app connects to SharePoint using the MS Graph API to support investigate and generic actions&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/709922f0-2eb2-11f1-944a-66d8262d44f0.svg&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Thu, 02 Apr 2026 16:38:56 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/6351/#v1.5.2</guid>
    </item>
    <item>
      <title>PingDirectory App for Splunk - v1.1.3 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/5523/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Qualification update.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The PingDirectory App for Splunk gathers and presents throughput, latency, and GC metrics from PingDirectory via a series of customized reports and graphical illustrations. Developed by Ping Identity, the app gathers and presents transaction metrics from PingDirectory via a series of customized reports and graphical illustrations. The application enables identity and access management (IAM) administrators, architects, and security managers to easily obtain custom reports.

This app supports PingDirectory version 8.0.0.0 and later.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/55bbb028-2e22-11f1-b3d5-eaae5bef3ccf.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ping Identity</dc:creator>
      <pubDate>Thu, 02 Apr 2026 15:35:01 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/5523/#v1.1.3</guid>
    </item>
    <item>
      <title>Qualys Technology Add-on (TA) for Splunk - v1.11.23 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/2964/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;-Bug fix for VM data input&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;The Qualys Technology Add-on (TA) for Splunk is a Technology Add-On for Qualys Cloud Platform data. It fetches Vulnerability Management (VM), Web Application Scanning (WAS), Policy Compliance (PC),  Container Security(CS), File Integrity Monitoring(FIM), Endpoint Detection &amp;amp; Response (EDR), Security Enterprise Mobility (SEM), Activity Log, KnowledgeBase (KB), Policy Compliance Reporting Services (PCRS), Cyber Security Asset Management(CSAM) and Certview data using modular input and indexes it which then can be searched using the Search app, Splunk Enterprise Security app or the Qualys VM App, WAS App or PC App, EDR App, FIM App, CS App , Policy Compliance Reporting Services (PCRS) App, Cyber Security Asset Management(CSAM) App , Certview App and TotalCloud for Splunk Enterprise.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/e0a4ee18-2e8e-11f1-b87d-8adba15b71a7.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Qualys Inc.</dc:creator>
      <pubDate>Thu, 02 Apr 2026 12:32:45 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/2964/#v1.11.23</guid>
    </item>
    <item>
      <title>Netskope Add-on For Splunk - v4.4.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/3808/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Added support for Netskope Log Streaming (NLS) sourcetypes with CSV parsing.&lt;/li&gt;
&lt;li&gt;Added comprehensive CIM field mappings for all NLS sourcetypes to maintain compatibility with Splunk Enterprise Security.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;THIS COMPONENT IS REQUIRED AND SHOULD BE INSTALLED BEFORE THE NETSKOPE APP FOR SPLUNK
PLEASE GO TO DETAILS AND READ THE INSTALLATION INSTRUCTIONS

!! UPGRADING IS SUPPORTED WITHIN THE &amp;gt;= 2.X CHAIN. IF COMING FROM 1.X, PLEASE REMOVE 1.X BEFORE INSTALLING ?=2.X !!

The Add-on typically imports and enriches data from Netskope API, creating a rich data set ready for direct analysis or use in an App. The Netskope Add-on for Splunk will provide the below functionalities:
* Collect data from Netskope via REST endpoints and store it in Splunk indexes
* Categorize the data in different source types
* Parse the data and extract important fields

## DEPRECATION INFO
* Input named &amp;quot;Web Transaction V1&amp;quot; has been been removed from v3.4.0. So, it is recommended to move to the &amp;quot;Web Transaction V2&amp;quot; input.
* Inputs named &amp;quot;Events (Deprecated)&amp;quot; and &amp;quot;Alerts (Deprecated)&amp;quot; has been removed from v3.7.0. So, it is recommended to move to &amp;quot;Events (Iterator)&amp;quot; and &amp;quot;Alerts (Iterator)&amp;quot; inputs.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/b744f3ac-2e65-11f1-a503-4ea230f6d807.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Technology Integrations</dc:creator>
      <pubDate>Thu, 02 Apr 2026 07:45:24 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/3808/#v4.4.0</guid>
    </item>
    <item>
      <title>OTel YAML Validator - v1.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7157/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h1&gt;Version 1.1.0&lt;/h1&gt;
&lt;ul&gt;
&lt;li&gt;Updated Creator to deprecate exporters and change to more recent options.&lt;/li&gt;
&lt;li&gt;Updated the default YAML definition as described here: &lt;a href=&quot;https://github.com/signalfx/splunk-otel-collector/blob/main/cmd/otelcol/config/collector/agent_config.yaml&quot;&gt;https://github.com/signalfx/splunk-otel-collector/blob/main/cmd/otelcol/config/collector/agent_config.yaml&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Updated links to Splunk Workshops&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;OTel YAML Validator is an app designed to help you both create and validate OTel config files for Splunk Observability Cloud. 

Check this out if you are setting up OTel collectors or using SIM, RUM, APM, or metrics in Splunk O11y Cloud.

The Create dashboard provides a point-and-click method of creating OTel config based on what you want to measure in your environment. The Validate dashboard provides code validation of the YAML against the public OTel spec, and shows a graph view of the receivers, processors, and exporters in your config.

Combined with some useful links to provide examples - you&amp;#x27;ll have everything you need to get your O11y journey up and running.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/74bc67e0-2e56-11f1-8460-4a5d62a7ae5f.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel Spavin</dc:creator>
      <pubDate>Thu, 02 Apr 2026 05:42:12 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7157/#v1.1.0</guid>
    </item>
    <item>
      <title>Splunk MCP Server - v1.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/7931/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;p&gt;Splunk MCP Server App 1.1.0 adds support for configuring the Splunk platform as an OAuth 2.1 server for Model Context Protocol (MCP) connectivity, and introduces beta features for running saved searches and applying MCP Server rate limiting.&lt;/p&gt;
&lt;p&gt;What's New&lt;br&gt;
• Added support for configuring the Splunk platform as an Open Authorization version 2.1 (OAuth 2.1) server that operates using the Model Context Protocol (MCP), enabling external applications to connect to and access data stored on the Splunk platform.&lt;br&gt;
• Controlled Access: OAuth 2.1 server configuration on the Splunk platform is currently a Controlled Access feature. Contact Splunk Support to enable or disable this feature in your environment. Speak with your Support representative for specific details.&lt;br&gt;
• Beta feature: Run Saved Search — Added the Run Saved Search tool to Splunk MCP, enabling AI assistants to run existing Splunk saved searches directly through MCP.&lt;br&gt;
• Beta feature: MCP Server rate limiting — Added rate limiting support for the MCP Server. Since the MCP Server can be accessed by multiple agents and shares critical resources with both the MCP app and the Splunk instance, rate limiting helps maintain app performance and security.&lt;/p&gt;
&lt;p&gt;Notes / Considerations&lt;br&gt;
• OAuth 2.1 server support is available only through Controlled Access.&lt;br&gt;
• Run Saved Search and MCP Server rate limiting are beta features in this release.&lt;br&gt;
• Configured rate limits apply per instance only.&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;MCP Server for Splunk Platform
The Model Context Protocol (MCP) is an open standard and framework that enables seamless, secure, and standardized two-way communication between AI applications (like large language models) and external data sources or tools. It acts as a universal adapter allowing AI systems to access, execute, and integrate functionalities from diverse systems through a common protocol, simplifying data sharing and tool interoperability without custom coding for each integration.

Splunk&amp;#x27;s Model Context Protocol (MCP) server leverages this to provide a standardized, secure, and scalable interface to connect AI assistants, agents, and other intelligent systems with data in the Splunk platform for both Enterprise &amp;amp; Cloud customers in beta.

🔑 Key Features

- Universal Connectivity
Seamlessly connects AI agents and tools to Splunk data resources in a secure and efficient manner.
- Enterprise-Grade Security
Includes built-in authentication, authorization, and Role-Based Access Control (RBAC).
- Rapid Deployment
Offers a plug-and-play solution, eliminating the need for custom integrations.

⚙️ Core Capabilities

- Explore the Data
Navigate and interact with Splunk data effortlessly.
- Discover Knowledge Objects
Identify and access relevant saved searches, lookups, and other knowledge assets.
- Execute Searches
Run powerful Splunk queries to extract insights and drive intelligent workflows.
- Leverage AI capabilities from Splunk’s AI Assistant for SPL &amp;amp; MLTK
SPL search generation from natural language, search optimization, search explanation, retrieve MLTK models and algorithms.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/ffadda30-2dea-11f1-bd2c-ceabd2a2762a.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Splunk LLC</dc:creator>
      <pubDate>Thu, 02 Apr 2026 04:02:25 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7931/#v1.1.0</guid>
    </item>
    <item>
      <title>MaxMind GeoIP App - v1.1.0 [Version Update]</title>
      <link>https://splunkbase.splunk.com/app/8554/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;ul&gt;
&lt;li&gt;Set &lt;code&gt;local = true&lt;/code&gt; for the &lt;code&gt;geoip&lt;/code&gt; search command so it runs on the search&lt;br&gt;
  head instead of distributed peers. This avoids failures in distributed&lt;br&gt;
  searches when indexers do not have the MaxMind databases or updater-managed&lt;br&gt;
  app state available locally.&lt;/li&gt;
&lt;/ul&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Short Description:&lt;/strong&gt;&lt;br&gt;MaxMind GeoIP database lookups for Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;This is a Splunk app for MaxMind GeoIP database lookups. It provides IP geolocation and enrichment using MaxMind&amp;#x27;s GeoIP and GeoLite databases, including country, city, anonymous IP detection, ISP, and more.

The app provides a streaming search command (geoip) that enriches events with data from one or more MaxMind databases.&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/ddd7ae18-2e17-11f1-9de8-ea98fe85489e.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">William Storey</dc:creator>
      <pubDate>Wed, 01 Apr 2026 22:19:23 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/8554/#v1.1.0</guid>
    </item>
    <item>
      <title>Microsoft Teams Collaboration Observability - v1.1.0 [New App Release]</title>
      <link>https://splunkbase.splunk.com/app/7997/</link>
      <description>&lt;p&gt;&lt;strong&gt;Platform:&lt;/strong&gt; Splunk&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Release Notes:&lt;/strong&gt;&lt;br&gt;&lt;h1&gt;Release Notes&lt;/h1&gt;
&lt;h2&gt;Version 1.1.0&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Feature Release — April 1, 2026&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;New Dashboard&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Collaboration Experience Dashboard&lt;/strong&gt; — Fully redesigned dashboard replacing the previous multi-dashboard layout with a unified, tabbed experience for Microsoft Teams call observability&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Dashboard Tabs&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Overview&lt;/strong&gt; — Command center view with Total Calls, Total Participants, Total Sessions, Active Locations, and quality distribution across Audio, Video, VBSS, and Call Types&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network Insights&lt;/strong&gt; — Average and maximum values for Latency, Jitter, Audio Network Jitter, and Packet Loss; includes Network Performance Over Time chart for surfacing peak degradation events beyond averages&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Stream Quality&lt;/strong&gt; — Audio, Video, and VBSS stream quality breakdowns with four-band classification (Poor, Fair, Good, Excellent) at both aggregate and per-location levels&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Location Performance&lt;/strong&gt; — Ranked location table with call volume, session counts, and network metrics side by side; supports column sorting to surface outliers; quality-by-location bar chart&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Trends and Analysis&lt;/strong&gt; — Calls Over Time, Participants Over Time, and Sessions Over Time charts for identifying volume patterns and correlating activity with quality signals&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Quality&lt;/strong&gt; — Data stream classification summary (Total, Good, Poor, Unclassified); Data Stream Quality Over Time area chart; Data Quality by Location table&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Enhancements&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Global Location Filter&lt;/strong&gt; — New dropdown input scopes all visualizations to a selected location simultaneously, enabling site-specific investigation without leaving the dashboard&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Improved Table Usability&lt;/strong&gt; — Numeric columns are center-aligned for easier scanning; all location and data tables standardized to display 50 rows&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Contextual Help Text&lt;/strong&gt; — Inline help and annotation panels added throughout each tab to guide interpretation of metrics and visualizations&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Bug Fixes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Corrected location filter token resolution to ensure accurate per-location data scoping across all tabs&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Known Issues&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;None&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;&lt;em&gt;Note: This release introduces a redesigned dashboard experience. The previous individual dashboards (Executive Overview, Time Series Analytics, Location Performance Analytics) are superseded by the new unified tabbed layout.&lt;/em&gt;&lt;/p&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;Transform Microsoft Teams performance visibility with comprehensive network, stream quality, and user experience observability powered by Kollective Technology. Monitor call quality across every modality—audio, video, and screen sharing—analyze participant engagement, and gain actionable insights into your Teams deployment across all organizational locations with analytics and six purpose-built interactive dashboards designed for IT operations teams.

Ready to optimize your Teams experience? Contact salesinfo@kollective.com for a free trial or connect with your account manager for activation.

Learn more: http://kollective.com | LinkedIn: linkedin.com/company/kollective-technology&lt;/p&gt;&lt;img height=&quot;36px&quot; width=&quot;36px&quot; src=&quot;https://cdn.splunkbase.splunk.com/media/public/icons/47074dee-2df5-11f1-b81a-62cb08abdeb3.png&quot;&gt;</description>
      <dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kollective Technology</dc:creator>
      <pubDate>Wed, 01 Apr 2026 20:06:00 +0000</pubDate>
      <guid>https://splunkbase.splunk.com/app/7997/#v1.1.0</guid>
    </item>
  </channel>
</rss>
