Integrating Acunetix 360 with Splunk

Splunk is a Security Information and Event Management (SIEM) software that is used to read and store machine-generated data.

Splunk aims to collect data like operating system logs, antivirus events, etc in a single central location to generate graphs, reports, and alerts. Integrating with Splunk helps you to increase information security so that you can collect identified issues or vulnerabilities.

This article explains how to integrate Splunk with Acunetix 360.

There are four stages:

Information

There are two add-ons for Splunk. Download the add-on based on your Splunk configuration.

How to install Splunk
  1. First, locate the Acunetix 360 Add-on in Splunkbase: https://splunkbase.splunk.com/app/4862/
  2. Follow these instructions to install the add-on: About installing Splunk add-ons.
  3. Once the Acunetix 360 add-on is installed, it should be configured to collect issues from the Acunetix 360 API (see How to Configure Add-on Settings). The add-on can collect data from both On-demand and On-premise editions of Acunetix 360.
How to install the add-on for Splunk Cloud
  1. First, locate the Acunetix 360 add-on For Splunk Cloud in Splunkbase: https://splunkbase.splunk.com/app/5510/ 
  2. Follow these instructions to install the add-on: Install an add-on in Splunk Cloud.
  3. Once the Acunetix 360 add-on is installed, it should be configured to collect issues from the Acunetix 360 API (see How to Configure Add-on Settings). The add-on can collect data from both On-demand and On-premise editions of Acunetix 360.

Information

The following instructions are valid for both add-ons.

How to configure Add-on settings

The Add-on settings must be configured in order to authenticate the API.

  1. In Splunk, navigate to Acunetix 360 Add-On, then Configuration.
  2. Select the Add-on Settings tab.

  1. Complete the Base URL, User ID, and Token fields. (The Base URL is the Acunetix 360 URL.)

Information

User ID and Token values can be found at API Settings.

  1. Click Save.
How to configure input
  1. In Splunk, navigate to the Acunetix 360 Add-On, then Inputs.

  1. To edit an existing Input, in the Actions column, select the Action dropdown, then the Edit link. (Alternatively, to create a new Input, select Create New Input.) The Update Vulnerability dialog is displayed.

  1. The Date Format should be equal to the value defined on the Change Account Settings page in Acunetix 360.
  2. In Splunk, the Website Group and Website fields are optional. (These values can be found on the Website Groups page in Acunetix 360.)

  1. Select Update (or Add).
How to search for vulnerabilities

Once the Add-on Settings and Input have been configured, Splunk starts to import data from the Acunetix 360 API.

  1. In Splunk, navigate to the Acunetix 360 Add-on, then select the Search tab to view the imported data.

  1. Select Data Summary. The Data Summary dialog is displayed.

  1. Select the Hosts, Sources, or SourceTypes tab to display issues.

 

« Back to the Acunetix Support Page