Blog Resources Splunk Administration: Tech Tips Splunk for Security Splunk Users: Tips and Tricks Things I Wish I'd Known about Splunk
Digital key on circuit board

Splunk Attack Range Setup Guide

Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data Into Splunk. In this on-demand video Bill Ouellette (Principal Splunk Security Engineer) will provide a Step by Step Guide on setting up the “Attack Range Framework” within your Splunk test instance.

Blog Resources Splunk Administration: Tech Tips Splunk Consulting Considerations Splunk for Security Splunk Users: Tips and Tricks Things I Wish I'd Known about Splunk
Arrow of animated people

CIM, What… Why… How…

During your SIEM journey there will be many terms thrown your way, understanding those terms is absolutely essential when it comes to your security environment. In this article, we will bring clarity to one of the more important terms in SIEM, CIM (Common Information Model) Lets Start with the Basics!