Splunk® Enterprise Security

Use Splunk Enterprise Security

This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.

Overview

The Splunk App for Enterprise Security provides the security practitioner with visibility into security-relevant threats found in today's enterprise infrastructure. Through the use of Splunk's unique and powerful search correlation and reporting capabilities, Enterprise Security provides a top-down and bottom-up view of an organization's security posture. The Splunk App for Enterprise Security is built on the Splunk Operational Intelligence platform and leverages Splunk's native search and correlation capabilities, allowing Enterprise Security customers to capture, monitor, and report on data from enterprise security devices, systems, and applications. As issues are identified, security administrators can quickly investigate and resolve the security threats in the areas of Access Protection, Endpoint Protection, and Network Protection.

This guide is intended for security analysts and security investigators who use Enterprise Security to monitor and investigate security problems within an enterprise environment. For additional information see the following documents:

  • Installation and Configuration Manual: This manual for administrators describes how to plan your Splunk Enterprise Security deployment and install and configure the Splunk App for Enterprise Security.
  • Data Source Integration Manual: This manual for administrators and developers describes how to add custom data sources to the Splunk App for Enterprise Security. It includes step-by-step instructions and a list of out-of-the box source types supported by the Splunk App for Enterprise Security.
Last modified on 09 May, 2013
  Access the Splunk App for Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 3.0, 3.0.1


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters