Using Stats in Splunk Part 1: Basic Anomaly Detection

You may be aware of the stats command, but you may be unaware of how it can be used for anomaly detection with some additional SPL. This article explains how.

Read More



Your Step-By-Step Guide for Splunking Data in Amazon S3

Your Step-By-Step Guide for Splunking Data in Amazon S3

Do you have log files in AWS S3 that you would like to ingest into Splunk? This tutorial will walk you through...

Read More
Threat Hunting with Splunk: Part 3, Getting Your Hands Dirty and Conclusion

Threat Hunting with Splunk: Part 3, Getting Your Hands Dirty and Conclusion

The third part of the threat hunting series covers hands-on examples using basic process creation log queries to...

Read More
Threat Hunting with Splunk: Part 2, Process Creation Log Analysis

Threat Hunting with Splunk: Part 2, Process Creation Log Analysis

Part two of our threat hunting series shows basic queries for interrogating process creation logs in Splunk...

Read More
Threat Hunting with Splunk: Part 1, Intro to Process Creation Logs

Threat Hunting with Splunk: Part 1, Intro to Process Creation Logs

This tutorial helps you know where to start finding anomalous activity through the examination of process creation logs...

Read More
How to Set up Splunk HEC the Smart Way

How to Set up Splunk HEC the Smart Way

This tutorial will show you how to test and troubleshoot a Splunk HTTP Event Collector (HEC) configuration....

Read More
How to Use the 2019 CPTC Security Dataset in Splunk

How to Use the 2019 CPTC Security Dataset in Splunk

This tutorial will walk you through the process of importing the 2019 CPTC data into your own Splunk instance....

Read More


Close off Canvas Menu