Splunk Attack Range: Build, Simulate, Detect
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark Topic
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content

WATCH NOW
- Chapters
- descriptions off, selected
- captions settings, opens captions settings dialog
- captions off, selected
- en (Main), selected
This is a modal window.
Beginning of dialog window. Escape will cancel and close the window.
End of dialog window.
This is a modal window. This modal can be closed by pressing the Escape key or activating the close button.
Can your security teams successfully perform attack simulations to visualize and record attacks?
Splunk Attack Range 2.0 allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk. Watch the Tech Talk, Splunk Attack Range: Build, Simulate, Detect and join the Splunk Threat Research Team for a demo of Splunk Attack Range v2.0 and to learn about:
- How the Splunk Threat Research Team leverages the Splunk Attack Range
- The newest features available in the Splunk Attack Range v2.0
- Future plans for Splunk Attack Range v3.0
Also don’t forget to view all the resources available to continue your Splunk journey:
Blogs
- Introducing Splunk Attack Range v1.0
- Introducing Splunk Attack Range v2.0
- Simulating, Detecting, and Responding to Log4Shell with Splunk
Resources
Recommended .conf22 Sessions
- Home on the Range: Detection Engineering with Splunk Attack Range
- Linux Threat Detection with Attack Range
- Purple Teaming - Build, Attack, and Defend Your Organization
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.