Hi @QuantumRgw , so you have to install an UF on your pcs and manage them using a Deployment Server ad descripted at https://lantern.splunk.com/Splunk_Platform/Product_Tips/Administration/Introducti...
See more...
Hi @QuantumRgw , so you have to install an UF on your pcs and manage them using a Deployment Server ad descripted at https://lantern.splunk.com/Splunk_Platform/Product_Tips/Administration/Introduction_to_the_Splunk_Distributed_Deployment_Server_(SDDS)#:~:text=The%20Splunk%20deployment%20server%20is,Enterprise%20and%20Universal%20Forwarder%20instances. Then you have to define your perimeter, in terms of hosts to monitor and, for each host, which logs to index. Than having the above information, you have to define your Use Cases, e.g. monitoring of administrator accesses, presence of not updated patches, presence of malicious known packets, etc... Ciao. Giuseppe