Skip to main content
Applies to BloodHound Enterprise only The BloodHound Enterprise Splunk app provides several dashboards that allow you to gain insights into your environments. These dashboards visualize data ingested from various BloodHound Enterprise data inputs, including posture statistics, attack paths, audit logs, and tier zero assets.
You configure the data inputs for these dashboards during the installation and configuration of the BloodHound Enterprise Splunk app.
Each dashboard offers filtering options to help you analyze data based on different parameters such as BloodHound Enterprise tenant, domain, and time range. Dashboards also provide standard Splunk controls for managing dashboards and visualizations. See the Splunk documentation for more information.

Dashboard Summary

Use this overview to find the right dashboard quickly. Detailed panels and filters are documented in each subsection below.
DashboardPurposeData Input
Posture HistoryMonitor posture trends (exposure, findings, attack paths, Tier Zero assets) over time for selected tenants and environmentsPosture Statistics
Attack PathsAnalyze attack paths across domains, including principals involved, exposure levels, severity, and associated findingsAttack Paths
Audit LogsFilter and analyze administrative and system audit events collected by BloodHound EnterpriseAudit Logs
Tier Zero AssetsInventory Tier Zero assets across domains and analyze their distribution and detailsTier Zero Assets

Posture History

The Posture History dashboard helps you monitor posture trends over time for your BloodHound Enterprise tenants and environments. It provides insights about trends in exposure levels, findings, attack paths, and Tier Zero assets. All panels in this dashboard use data from the Posture Statistics data input and share the following filters:
  • BloodHound Tenant
  • Environment
  • Time Range
The following sections describe each panel on this dashboard.

Exposure

This panel shows the trend (by percentage) of exposure over time for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Posture History Exposure panel in the BloodHound Enterprise Splunk app

Findings

This panel shows the trend (by count) of posture findings over time for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Posture History Findings panel in the BloodHound Enterprise Splunk app

Attack Path

This panel shows the trend (by count) of critical attack paths over time for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Posture History Attack Path panel in the BloodHound Enterprise Splunk app

Assets

This panel shows the trend (by count) of Tier Zero assets over time for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Posture History Assets panel in the BloodHound Enterprise Splunk app

Attack Paths

The Attack Paths dashboards allows you to analyze attack paths identified by BloodHound Enterprise across your configured domains. It provides detailed information about principals that can compromise the Tier Zero Privilege Zone, their exposure levels, severity, and associated findings.

Overview

This dashboard summarizes attack path findings (by count, severity, and frequency) across selected BloodHound tenant(s) and environment(s) within a specified time range. All panels in this dashboard use data from the Attack Paths data input and share the following filters:
  • BloodHound Tenant
  • Environment
  • Severity
  • Time Range

Total Domain Wise Attack Paths per Domain

This panel shows the total count of attack paths (by domain) identified in the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Attack Paths Total Domain Wise Attack Paths per Domain panel in the BloodHound Enterprise Splunk app

Severity Breakdown

This panel shows the distribution of findings (by severity) for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Attack Paths Severity Breakdown panel in the BloodHound Enterprise Splunk app

Top 5 Non-Tier Zero Principals Involved

This panel shows the top five non-tier Zero principals most frequently involved in attack path findings for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Attack Paths Top 5 Non-Tier Zero Principals Involved panel in the BloodHound Enterprise Splunk app

Top 5 Most Common Findings

This panel shows the top five most common finding types (by frequency) for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Attack Paths Top 5 Most Common Findings panel in the BloodHound Enterprise Splunk app

Top 5 Most Common Findings Per Environment

This panel shows the top five most common finding types (by frequency) per environment for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Attack Paths Top 5 Most Common Findings Per Environment panel in the BloodHound Enterprise Splunk app

Top 10 Attack Paths by Exposure

This panel shows the top ten attack paths (by exposure percentage) for the selected BloodHound tenant(s) and environment(s) within a specified time range.
A view of the Attack Paths Top 10 Attack Paths by Exposure panel in the BloodHound Enterprise Splunk app
Details also include links to BloodHound Enterprise remediation documentation.

Details

This dashboard provides more granular details about specific attack paths identified by BloodHound Enterprise. It allows you to investigate principals involved in attack paths, their exposure levels, and associated findings. All panels in this dashboard use data from the Attack Paths data input and share the following filters:
  • BloodHound Tenant
  • Environment
  • Attack Paths
  • Severity
  • Time Range

Principals

This panel shows the all principals based on the selected filters. It provides the following detailed information about each principal:
Non-Tier Zero PrincipalImpact Count
Tier Zero PrincipalSAM Account Name
Display NameSensitive
Finding NameLast Logon
Distinguished NameLast Logon Timestamp
Severity LevelCreated Timestamp
Impact PercentageFirst Seen
Last Updated
A view of the Attack Paths Details Principals panel in the BloodHound Enterprise Splunk app

Maximum Exposure Percentage

This panel shows the highest exposure (by percentage) for the specified filters.
A view of the Attack Paths Details Maximum Exposure Percentage panel in the BloodHound Enterprise Splunk app

Total Number of Findings

This panel shows the total number of findings (by count) for the specified filters.
A view of the Attack Paths Details Total Number of Findings panel in the BloodHound Enterprise Splunk app
This dashboard provides trend analysis of attack path findings over time. It helps you understand how the exposure and frequency of findings change over time for selected BloodHound tenant(s) and environment(s) within a specified time range. All panels in this dashboard use data from the Attack Paths data input and share the following filters:
  • BloodHound Tenant
  • Environment
  • Category
  • Time Period
This panel shows the trend (by category) of attack paths over time for the selected BloodHound tenant(s) and environment(s) within a specified time range. Categories include:
  • Tier Zero
  • Kerberos
  • AD Certificate Services
  • Relay attacks
  • Least privilege
  • Entra ID
  • Hybrid
  • Microsoft Graph
  • Azure Resource Manager
A view of the Attack Paths Finding Trends panel in the BloodHound Enterprise Splunk app

Audit Logs

This dashboard allows you to filter and analyze administrative and system audit events collected by BloodHound Enterprise. All panels in this dashboard use data from the Audit Logs data input and share the following filters:
  • BloodHound Tenant
  • Event Type
  • Actor Name
  • Time Range
The audit log table provides the following information about each event:
IDCreated At
Actor IDActor Name
Actor emailAction (event type)
FieldsRequest ID
Source IP addressCommit ID
Status
A view of the Audit Logs dashboard in the BloodHound Enterprise Splunk app
Clicking on any row in the Audit Logs table will open a detailed view of the selected audit event, providing additional context and information.

Tier Zero Assets

This dashboard provides an inventory of Tier Zero assets identified by BloodHound Enterprise across your configured domains. It helps you analyze the distribution and details of Tier Zero assets. All panels in this dashboard use data from the Tier Zero Assets data input and share the following filters:
  • BloodHound Tenant
  • Environment
  • Type

Tier Zero Assets List

This panel provides a detailed listing of Tier Zero assets across your configured domains. It includes the following information about each asset:
  • Name
  • Environment
  • Type
  • Object ID
A view of the Tier Zero Assets List panel in the BloodHound Enterprise Splunk app

Tier Zero Assets Distribution By Environment

This panel shows how Tier Zero assets are distributed across the selected BloodHound tenant(s), environment(s), and asset type(s).
A view of the Tier Zero Assets Distribution By Environment panel in the BloodHound Enterprise Splunk app
See the Splunk documentation for details about using Splunk Search to create custom queries and visualizations based on BloodHound Enterprise data.

Administration

See install and configure the BloodHound Enterprise Splunk app for details about configuring data inputs and other administrative tasks.