Ensure that your alerts are rock solid with this obscure pro move that some might have thought was impossible.
In this post, we’ll review some frequently asked questions concerning the Splunk Common Information Model, or Splunk CIM.
Learn Splunk deployment best practices our Splunk Professional Services consultants wish they’d known.
Learn how threat intelligence helps incident response teams respond efficiently and effectively to unexpected incidents.
Gain insight into how to advance your organization’s security data journey using Splunk Security Essentials.
Learn things our Splunk Professional Services consultants wish they’d known about managing data in Splunk.
Despite the clear benefits that a SIEM delivers to significantly enhance an organization’s security posture, not every organization is ready to deploy a SIEM.
Meet your new best friend! This time I’ll introduce you to a seldom used but powerful command: foreach. It’s a tricky thing to pin down and it takes some effort to understand its purpose.
Assets and identities provide critical context to the notable events generated by your correlation searches. Learn tips for properly configuring Splunk ES assets and identities.
Perfect for archiving data that is infrequently needed, but is still searchable by Splunk.