Why You Should Never Use Leading Wildcards in Splunk Searches

This tutorial demonstrates the importance of proper wildcard use in Splunk searches and how simple changes significantly reduce the amount of time searches take to run.

Read More



Your All-In-One Guide to Setting up pfSense and Suricata in Splunk

Your All-In-One Guide to Setting up pfSense and Suricata in Splunk

Looking to improve your IDS setup in Splunk? This tutorial provides the guidance you need to set up pfSense and Suricata...

Read More
How to Use PowerShell Transcription Logs in Splunk

How to Use PowerShell Transcription Logs in Splunk

Are you looking to bring Windows PowerShell logs into Splunk? This tutorial will walk you through the process...

Read More
How to Leverage Splunk as an Offensive Security Tool

How to Leverage Splunk as an Offensive Security Tool

It’s important for both offensive and defensive security professionals to understand the attack vectors facing a Splunk...

Read More
The Practical User's Guide for Setting up LDAP in Splunk

The Practical User's Guide for Setting up LDAP in Splunk

This tutorial will walk you through how to successfully configure and ultimately set up LDAP authentication in Splunk....

Read More
Your Step-By-Step Guide for Splunking Data in Amazon S3

Your Step-By-Step Guide for Splunking Data in Amazon S3

Do you have log files in AWS S3 that you would like to ingest into Splunk? This tutorial will walk you through...

Read More
Threat Hunting with Splunk: Part 3, Getting Your Hands Dirty and Conclusion

Threat Hunting with Splunk: Part 3, Getting Your Hands Dirty and Conclusion

The third part of the threat hunting series covers hands-on examples using basic process creation log queries to...

Read More


Close off Canvas Menu