Splunk User Behavior Analytics Owner's Manual
This manual describes the recommended ongoing maintenance tasks, along with their schedules, that the owner of a Splunk UBA implementation should perform to keep their implementation functional.
Featured: Splunk Synthetic Monitoring
Rigor to Splunk Synthetics Migration - Customer FAQ
Splunk will sunset the legacy Rigor platform as of February 28, 2025, and replace it with Splunk Synthetic Monitoring, which offers a similar synthetic testing experience within Splunk Observability Cloud. This document answers some frequently asked questions about this change.
Featured: Splunk Platform
Using Amazon SageMaker to predict risk scores
While you use the Splunk platform as a data aggregator and analytics engine, you are more comfortable with Amazon tools than with Splunk add-ons. You want to use Amazon SageMaker to deploy machine learning models to predict customers who might engage in fraud, based on their past risk scores.
Resources for Splunk Program Managers
Accelerate and increase the value you derive from your data with Splunk software using the Splunk Success Framework (SSF), a flexible collection of best practices for setting up Splunk Enterprise or Splunk Cloud Platform as a program.
Data Ingestion and Application
Bring data to every question, decision, and action across your organization with comprehensive guidance for getting data in and applying data to your key use cases.
Get the latest
- Data Descriptors
- The data sources in use at your organization can all be linked to common use cases. Get recommendations from Splunk experts and then start getting answers from your data.
- Antivirus and antimalware data
- Application data
- Application server data
- Authentication data
- Backup data
- Vendor-specific data
- Endpoint detection and response (EDR) data
- Intrusion detection and prevention data (IDS and IPS)
- Load balancer data
- Email data
- Network communication data
- Patch management data
- Physical security data
- Web proxy data
- Change events data
- Configuration management data
- IP address assignment data
- Vulnerability detection data
- Web server data
- DNS data
- Linux and Unix
- Carbon Black
- Check Point
- Palo Alto Networks
- Trend Micro
- Mac OS
- Firewall data