- Use the dashboards to track the Active Directory and Azure attack paths of your environment
- Create alerts to detect when new attack paths emerge or exposure increases
- Enrich your SIEM data with information about the attack paths to and from principals
Installation
- Log into your Splunk installation and click on the Find More Apps button.

- Search for “BloodHound Enterprise” and hit Enter. The first result should be the app.

- Click Install. If not already logged in, you will be prompted for your Splunk.com username and password.

- After installation completes, click Open the App.

- The App will prompt you to configure itself. Click Continue to the app setup page.

-
If you have not already, create an API key/ID pair, following Create a non-personal API Key/ID pair
- The API user must at least have the read-only role. The Administrator role is required to collect BloodHound Enterprise audit logs.
-
In the setup screen, enter your BloodHound Enterprise domain name (
CODENAME.bloodhoundenterprise.io
), the API key/ID pair you created and click Submit Please note the warning—the initial collection can take some time, particularly for longer-term BloodHound Enterprise customers.

Create Index (Splunk cloud only)
The index “bhe-splunk-app” will be created automatically if running Splunk on-prem.- In Splunk Web, go to Settings > Indexes.
- On the Indexes page, click New Index.
- On the New Index page, in the Index Name field, enter “bhe-splunk-app”.
- Click Save.
Enable Data Input
- In Splunk Web, go to Settings > Data inputs.

- Scroll down, locate, and click on BloodHound Enterprise.

- Click Enable to enable the data input.

Customize Index
-
Update Data Input
- In Splunk Web, go to Settings -> Data Inputs
- Click BloodHound Enterprise
- Click Input
- Click More Settings & select preferred index from the drop-down.
- Click Save
-
Update Search Macro
- In Splunk Web, go to Settings -> Advanced Search
- Click Search Macros
- For App, Select BloodHound Enterprise
- Click bhe_index
- Update the Definition to match the custom index name. Example: index=<custom index name>
- Click Save