Splunk Security Investigations, Part 3: Scoping
Welcome to the Splunk for Security Investigation Experience. In this third video, we continue our investigation and use visual drill downs to examine specific activities between targeted hosts and compromised workstations. Watch the video, then try it yourself by following these instructions with this online Splunk instance pre-loaded with security data. Already using Splunk? Download the Getting Started with Splunk Security App, to get demo data and follow along with the scenarios.
Видео Splunk Security Investigations, Part 3: Scoping канала Splunk
Видео Splunk Security Investigations, Part 3: Scoping канала Splunk
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Splunk for Security Investigation: Endpoint Advanced Malware AnalysisSplunk for Security Investigation: Command and Control AnalysisSOC 101: Real-time Incident Response Walkthrough"Splunk Enterprise 6 Basic Search"Splunk Security Investigations, Part 2: Threat ValidationArcSight Investigate Demo - How to investigate a suspicious URLSplunk Tutorials : SQL Injection DetectionSplunk Education: Creating AlertsSplunk for Security Investigation: RansomwareUse Case : Detecting Network and Port ScanningSplunk CIM (PART-3) : How to validate CIM compatibility and generate reportHow to Detect Insider ThreatsFinding the Right Security Content with Splunk Security EssentialsUsing Splunk Internal Indexes to Audit Security, Users, Searches and more.Splunk Security Investigations, Part 1: Threat DetectionGrey's Academy 101: Getting Started with SplunkLog Analysis with Splunk | How to use Splunk to analyse a Real time Log | Splunk Use Cases | EdurekaImplementing MITRE ATT&CK into a SOCSplunk: How to Prevent Insider Threats