olafhartong / ThreatHunting

A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
MIT License
1.14k stars 178 forks source link

Newbie question #72

Closed y0d4a closed 3 years ago

y0d4a commented 4 years ago

Hi, i am very interested in this product but have beginner question... i do not understand how to setup... I installed app. also installed all additional (sankey, timeline...) and setup macros. But dont understand how to make data inside your index? i have separate indexes for different things, example network, windows, sysmon ... don`t understand part "Make sure the threathunting index is present on your indexers" i create index by that name, is that correct? What i miss?

thank you

y0d4a commented 3 years ago

ok, i reinstalled with version from github and now working :s seems problem is on splunk repo. side..