Enterprise Security
A
C
- Comparing security domain dashboards in Enterprise Security
- Conducting an insider threat workshop in your organization
- Configuring Windows event logs for Enterprise Security use
- Configuring Windows security audit policies for Enterprise Security visibility
- Creating an action plan from an insider threat workshop
- Customizing Enterprise Security dashboards to improve security monitoring
E
F
I
M
O
P
S
- Searching investigation artifacts with the Analyst queue in Enterprise Security 8.0
- Selecting insider threat use cases for your organization
- Sending Splunk Observability events as Alert Actions from Splunk Enterprise Security
- Sharing data between Splunk Enterprise Security and Splunk ITSI
- Splunk Enterprise Security with Intelligence Management Demo
U
- Understanding the Event Sequencing engine
- Using Enterprise Security 8.0 workflows
- Using risk-based alerting and detection in Enterprise Security 8.0
- Using the rest command to work with data from REST API endpoints
- Using the Splunk Enterprise Security assets and identities framework
- Using the workbench in an Enterprise Security investigation
Splunk Training & Certification has a number of excellent courses for Splunk Enterprise Security if you are looking for a more sequenced learning opportunity. Click here to learn more.