Combining Splunk alerting, Webooks, and an external tool allows an extra degree of flexibility beyond what is available...Read More
Are you suffering from too much (or too little) Windows event data in your Splunk environment? This post will teach you how to configure whitelists and blacklists for Windows Event Log inputs, as well as other techniques you can implement to enhance your design strategy.Read More
As new versions of Splunk are released, small refinements are often made to existing processes....Read More
If you’re in charge of managing your Splunk Enterprise Security (ES) deployment you might be getting tired of all the...Read More
This tutorial will help you understand how Splunk’s configuration enforcement system (the deployment server) works, and...Read More
This tutorial will serve as a resource to enhance your understanding of the splunk.secret, in terms of where and how it...Read More
If you're looking for something different than the typical "one-size-fits-all" security mentality, you've come to the right place.