Splunk® Platform Use Cases

Security Use Cases

Download manual as PDF

Download topic as PDF

About security use cases

Refer to this manual to see example use cases that demonstrate how to use the Splunk platform to centralize essential security data and build a strong security operations center. With a central view, you can search and investigate threats in your environment to quickly detect and triage security alerts; and reduce the risk of breach, disruption, or damage from security alerts.

The example use cases are sourced from Splunk Enterprise Security (ES) and Splunk Security Essentials (SSE). Additionally, each example references validated best practices published on Splunk Answers.

ES is a premium solution you need for use cases examples that depend on correlation searches. For non-correlation example use cases you like, but either don't have the required data or haven't loaded it yet, download the Splunk Security Essentials app on Splunkbase. The SSE app is free and has the bonus of demo data.

Each use case provides guidance about the apps, source types, prerequisites, and searches needed to help increase your security posture. Apply the following example use cases to reduce security risks in your environment:

  NEXT
Security monitoring examples

This documentation applies to the following versions of Splunk® Platform Use Cases: usecases


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters