Skip to main content
Applies to BloodHound Enterprise only After installation and configuration are complete, you can view attack path findings from BloodHound Enterprise in Splunk SOAR. This allows you to monitor potential attack paths in real-time and trigger automated response playbooks based on BloodHound Enterprise detections. To view attack path findings from BloodHound Enterprise in Splunk SOAR:
  1. Log in to your Splunk SOAR instance.
  2. Click the Events tab to view all polled events.
Splunk SOAR events view showing BloodHound Enterprise findings
See the Splunk SOAR documentation for more information about working with events.