Splunk® App for Fraud Analytics

User Guide

Recommended types of data sources for fraud detection

Following is a list of recommended types of data sources for fraud detection:

  • Web logs, clickstream logs
  • Transaction logs
  • Form submission logs
  • New customer accounts data
  • Business application logs
  • Network and security device logs
  • Authentication events
  • Active Directory data
  • Endpoint events
  • Purchases data
  • Claims data
  • Payments data
  • Risk and threats data
  • Threat intelligence feeds
  • Domains data
Last modified on 29 July, 2024
Macros in Splunk App for Fraud Analytics   Correlation searches in Splunk App for Fraud Analytics

This documentation applies to the following versions of Splunk® App for Fraud Analytics: 1.1.3, 1.2.4


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters