Splunk® Mission Control

Investigate and Respond to Threats in Splunk Mission Control

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Splunk Mission Control scenario library

The following scenarios feature examples from Buttercup Games, a fictitious game company. The scenarios feature Alex, a security operations center (SOC) analyst, and Wei, a SOC administrator, and share how they use Splunk Mission Control to investigate and respond to potential security threats.

  1. Scenario: Alex triages and investigates an incident in Splunk Mission Control
  2. Scenario: Alex responds to a security incident in Splunk Mission Control
  3. Scenario: Alex automates a security workflow in Splunk Mission Control
  4. Scenario: Wei creates an intelligence workflow in Splunk Mission Control to reduce false positives
  5. Scenario: Wei creates an intelligence workflow in Splunk Mission Control to enrich data
Last modified on 19 July, 2023
PREVIOUS
Monitor activities in Splunk Mission Control
  NEXT
Scenario: Alex triages and investigates an incident in Splunk Mission Control

This documentation applies to the following versions of Splunk® Mission Control: Current


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters