Splunk® Enterprise Security

Use Splunk Enterprise Security

Acrobat logo Download manual as PDF


This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.
Acrobat logo Download topic as PDF

Scenarios

This page is currently a work in progress. Any information presented here might be incomplete or incorrect, and frequent near-term updates are expected.

This topic provides a few common scenarios in which the Splunk App for Enterprise Security can used to discover and resolve security issues. Several different roles may be involved in resolving these issues.

Common security issues include:

Last modified on 29 May, 2014
PREVIOUS
Access the Splunk App for Enterprise Security
  NEXT
Brute force attacks

This documentation applies to the following versions of Splunk® Enterprise Security: 3.0, 3.0.1


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters