Splunk Enterprise Security

Splunk Security Essentials : Data Exfiltration



SSE use case maps to the MITRE ATT&CK tactics. As we can see from MITRE ATT&CK, each tactic has various techniques. For "Data Exfiltration" , the techniques are "Data Transfer Size Limits" , "Exfil over Alternate Protocol" etc.

For example: In SSE, the example "Sources Sending a High Volume of DNS Traffic" mapped to MITRE ATT&CK's DataExfiltration. Splunk reports outliers. How do I know which technique splunk used to determine the outlier? Or Splunk doesn't use any of these techniques , it just uses the total bytes transferred and looking for anomalies and deviations from normal traffic levels.?


Get Updates on the Splunk Community!

Splunk APM & RUM | Upcoming Planned Maintenance

There will be planned maintenance of the streaming infrastructure for Splunk APM and Splunk RUM in the coming ...

Part 2: Diving Deeper With AIOps

Getting the Most Out of Event Correlation and Alert Storm Detection in Splunk IT Service Intelligence   Watch ...

User Groups | Upcoming Events!

If by chance you weren't already aware, the Splunk Community is host to numerous User Groups, organized ...