<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how log monitoring used and whether it is secure? in Monitoring Splunk</title>
    <link>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251446#M8048</link>
    <description>&lt;P&gt;how log monitoring used and whether it is secure?.Please reply to my question in brief&lt;/P&gt;</description>
    <pubDate>Fri, 26 Aug 2016 11:11:50 GMT</pubDate>
    <dc:creator>anjumtcs</dc:creator>
    <dc:date>2016-08-26T11:11:50Z</dc:date>
    <item>
      <title>how log monitoring used and whether it is secure?</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251446#M8048</link>
      <description>&lt;P&gt;how log monitoring used and whether it is secure?.Please reply to my question in brief&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 11:11:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251446#M8048</guid>
      <dc:creator>anjumtcs</dc:creator>
      <dc:date>2016-08-26T11:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: how log monitoring used and whether it is secure?</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251447#M8049</link>
      <description>&lt;P&gt;I'm afraid you'll have to be a bit more specific in your answers question.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 11:20:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251447#M8049</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-08-26T11:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: how log monitoring used and whether it is secure?</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251448#M8050</link>
      <description>&lt;P&gt;I want to know about log monitoring,its uses and whether it is safe to use log monitoring?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 12:25:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251448#M8050</guid>
      <dc:creator>anjumtcs</dc:creator>
      <dc:date>2016-08-26T12:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: how log monitoring used and whether it is secure?</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251449#M8051</link>
      <description>&lt;P&gt;Log, but more generally &lt;EM&gt;machine data&lt;/EM&gt;, monitoring &lt;EM&gt;and correlation&lt;/EM&gt;, is used by many different businesses to accomplish a wide variety of goals. You may be interested in reviewing a number of the Splunk customer stories: &lt;A href="http://www.splunk.com/customers"&gt;http://www.splunk.com/customers&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;As a concept log monitoring in and of itself is neither dangerous nor safe, rather there are a number of considerations and details about your environment including (but not limited to) access controls, transport protocols, and even the nature of the data being collected itself, that may present various risk factors and that you would want to mitigate when implementing a log monitoring strategy, if such risks are not acceptable to the organization. Careful evaluation of these risks and implementation of mitigations of unacceptable risks allows for the successful deployment of data aggregation solutions in even the most secure environments (and it as a concept could even be used to mitigate other material risks to the organization)&lt;/P&gt;

&lt;P&gt;Splunk for its part provides some of the basics in terms of tunables available with their software in the docs: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.2/Security/WhatyoucansecurewithSplunk"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.2/Security/WhatyoucansecurewithSplunk&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Splunk and a number of their partners with certain sets of skills can also be contracted to provide Professional Services that can help with secure deployment in risk adverse environments.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 12:59:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251449#M8051</guid>
      <dc:creator>acharlieh</dc:creator>
      <dc:date>2016-08-26T12:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: how log monitoring used and whether it is secure?</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251450#M8052</link>
      <description>&lt;P&gt;It's totally safe.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 15:04:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/how-log-monitoring-used-and-whether-it-is-secure/m-p/251450#M8052</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-08-26T15:04:14Z</dc:date>
    </item>
  </channel>
</rss>

