LogoLogo
Anvilogic WebsiteProduct Documentation
  • Welcome to Anvilogic
  • What's New
    • What's new?
      • 6.x releases
      • 5.x releases
  • Get Started
    • Onboarding guide
      • Log in and set your password
      • Define your company's threat profile
      • Select your data repository and get data in
        • Integrate Splunk as your data repository
          • Download and install the Anvilogic App for Splunk
            • Splunk Cloud Platform
              • Verify requirements
              • Install the Anvilogic App for Splunk
            • Splunk Enterprise
              • Verify requirements
              • Download the Anvilogic App for Splunk
              • Install the Anvilogic App for Splunk
          • Create the Anvilogic indexes
          • Assign the avl_admin role
          • Configure the HEC collector commands
          • Connect to the Anvilogic platform
        • Integrate Snowflake as your data repository
          • Get data into Snowflake
      • Review data feeds
      • (Optional) Upload your existing detections
      • Review and deploy recommended content
      • Additional tasks
    • Reference Architectures
      • Anvilogic on Splunk Architecture
      • Anvilogic on Azure
      • Anvilogic on Snowflake Architecture
        • FluentBit
          • Linux data
          • Syslog data
          • Windows data
        • Fluentd
      • Anvilogic on Databricks Architecture
      • Hybrid - Anvilogic on Splunk & Snowflake Architecture
  • Anvilogic Free Trial
    • Introduction and Overview
    • Sign Up for Free Trial
    • Initial Setup
    • Detection Engineering Workflow
    • Explore the Armory
    • Building a Scenario-Based Detection
    • Create SQL Detections
    • MonteAI for SQL
    • Monte Copilot
      • Monte Copilot supported tools
      • Monte Copilot licensing
      • Monte Copilot privacy and controls
    • Set MITRE ATT&CK Priorities
    • Review Maturity Score
    • Further Exploration and Next Steps
  • Anvilogic Lab
    • Anvilogic Lab Intro
      • Create SQL Detections
      • MonteAI for SQL
      • MITRE & Detection Armory
      • Deploy New Detections
  • Security Controls
    • AI security controls
    • Monte Copilot & AI privacy and controls
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Install SIEM App
  2. Anvilogic SIEM

Install

Perform the following tasks to install and configure the Anvilogic app.

Last updated 8 months ago

Was this helpful?

  1. Ensure Connectivity

    The server must be able to connect to over port 443

  2. Download the App Download the Anvilogic App from the platform at -> Admin Settings -> Download Anvilogic App

  3. Install the App Install the app on your server, preferably the server that has access to security indexers/data. This requires a restart.

  4. Create Index Create an index "anvilogic" index. Those names are recommended but you can change them to match any naming standards you have.

  5. Assign Roles Assign yourself the avl_admin role and anyone else participating in the pilot, app roles and descriptions are in the document attached for reference.

  6. Create HEC Token Create a HEC token that can write to the 1 anvilogic index that was created. Ensure the search head has network connectivity to the box that has the HEC Collector enabled.

For Splunk Cloud Customers: Splunk Cloud Enterprise Security customers will have to allow IPs to send to the Splunk Cloud HEC endpoint on port 443. This setting still requires are a HEC token for authentication and is often used by customers to send data to Splunk Cloud from multiple devices with changing IPs like mobile devices.

  • Instructions on how to do this:

  • This should only be required if the Anvilogic App is installed on an Splunk Cloud Enterprise Security Search Head and you have a Splunk Cloud non-Enterprise Security Search Head

https://secure.anvilogic.com
https://secure.anvilogic.com
https://docs.splunk.com/Documentation/SplunkCloud/8.2.2203/Config/ConfigureIPAllowList