- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

hello
I want to understand the concept of how Splunk security works.
I think that it has a database of signatures of threat and when we enter the logs, it does the pattern matching. Is that right?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Hi neermine,
Splunk is a platform for analyzing machine generated data of all kinds from server logs to even metadata about network communications. The analysis can include simple pattern matching, behavioral analytics (spikes and newness), machine learning, and more.
To get a good sense, I'd recommend you walk through some of our examples that show how Splunk works with Security including:
- The Essential Guide to Security (ebook)
- Security Investigation Workflow - click Try Now on that page to get access to a guided workflow showing how Splunk is used by SOCs
- Security Datasets Project - a similar guided walk through advanced datasets.
- Or just download it yourself and try with your own data for free. Consider apps like Splunk Security Essentials.
If you ever need more, don't hesitate to reach out to our sales org for help.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Hi neermine,
Splunk is a platform for analyzing machine generated data of all kinds from server logs to even metadata about network communications. The analysis can include simple pattern matching, behavioral analytics (spikes and newness), machine learning, and more.
To get a good sense, I'd recommend you walk through some of our examples that show how Splunk works with Security including:
- The Essential Guide to Security (ebook)
- Security Investigation Workflow - click Try Now on that page to get access to a guided workflow showing how Splunk is used by SOCs
- Security Datasets Project - a similar guided walk through advanced datasets.
- Or just download it yourself and try with your own data for free. Consider apps like Splunk Security Essentials.
If you ever need more, don't hesitate to reach out to our sales org for help.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

thanks 🙂
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Can you tell me if this uses machine learning decision tree techniques specifically? Thanks
