PII Leaked
DNS Generator Anomaly
Encrypted C and C
Command Anomaly
Command and Control Repudation Anomaly
File Action Anomaly
PowerShell Remote Access
SQL Shell Command
hi @thaheseens,
Here you go, lots of usecases to see here :
ES Dashboards :
https://docs.splunk.com/Documentation/ES/6.1.0/User/Overview
ES Content Update :
https://splunkbase.splunk.com/app/3449/#/details
List of usecases here :
https://docs.splunk.com/Documentation/ESSOC/1.0.52/stories/UseCase
SSE :
https://splunkbase.splunk.com/app/3435/#/details
List of usecases here :
https://docs.splunksecurityessentials.com/content-detail/
Hope this helps !
Cheers,
David