About security use cases
Refer to this manual to see example use cases that demonstrate how to use the Splunk platform to centralize essential security data and build a strong security operations center. With a central view, you can search and investigate threats in your environment to quickly detect and triage security alerts; and reduce the risk of breach, disruption, or damage from security alerts.
The example use cases are sourced from Splunk Enterprise Security (ES) and Splunk Security Essentials (SSE). Additionally, each example references validated best practices published on Splunk Answers.
ES is a premium solution you need for use cases examples that depend on correlation searches. For non-correlation example use cases you like, but either don't have the required data or haven't loaded it yet, download the Splunk Security Essentials app on Splunkbase. The SSE app is free and has the bonus of demo data.
Each use case provides guidance about the apps, source types, prerequisites, and searches needed to help increase your security posture. Apply the following example use cases to reduce security risks in your environment:
Security monitoring examples
This documentation applies to the following versions of Splunk® Platform Use Cases: usecases