Splunk Enterprise Security

How to make sense of data

michael_lee
Path Finder

So we have various types of logs that Splunk collects. E.g. Windows events, web server logs, syslogs, cisco switches and the likes. How do you make sense of such a huge amount of data that comes from different devices to find what you want, with context? Do you use Enterprise Security ? Or do you craft your own search algorithms? thanks

0 Karma
1 Solution

mdessus_splunk
Splunk Employee
Splunk Employee

Hi Michael,

It depends what you're looking for and your environment: you could just start with a few basic rules and dashboards (security or not) if you do not have much security background or are too busy. You might add ES later to have some more in depth view of your security, or add it at the beginning if you have enough people with security skills.
Keep in mind you should go step after steps, and that even with ES, you will need to adapt it to your company and threats.

View solution in original post

fdi01
Motivator

mdessus_splunk
Splunk Employee
Splunk Employee

Hi Michael,

It depends what you're looking for and your environment: you could just start with a few basic rules and dashboards (security or not) if you do not have much security background or are too busy. You might add ES later to have some more in depth view of your security, or add it at the beginning if you have enough people with security skills.
Keep in mind you should go step after steps, and that even with ES, you will need to adapt it to your company and threats.

Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...