Skip to main content

 

Splunk Lantern

Search

  • Filter Results
  • Location
  • Classification
    • Article Type
    • Applies To
    • Technical Add-On
    • Industry
    • Technical App
    • Login Wall
    • Author Name
    • Contributing Group
    • Written by Splunk Partner
    • SOAR Connector
    • Platform UCE Industry
    • Translation Status
  • Include attachments
Searching in
About 17 results
  • https://lantern.splunk.com/hc/Withdrawn_Pages/Improving_Google_Chrome_security/Google_account_passwords_changed_via_Google_Chrome
    You need to check for Google account passwords changed via Google Chrome.
  • https://lantern.splunk.com/hc/Withdrawn_Pages/Security_searches/Google_Drive_sharing_detection
    ​You need to detect Google Drive sharing.
  • https://lantern.splunk.com/hc/Withdrawn_Pages/Security_searches/Spike_in_downloaded_documents_per_user_on_Salesforce_cloud
    You need to look for a sudden, high-volume increase in downloaded documents from Salesforce.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_intelligence/Using_threat_intelligence_in_Splunk_Enterprise_Security
    Threat intelligence enables cyber security teams to inform the SOC and incident response teams of potential and impending harmful activities and business risks.
  • https://lantern.splunk.com/Security/UCE/Foundational_Visibility/Security_monitoring/Monitoring_for_network_traffic_volume_outliers/Network_traffic_patterns_between_a_source-destination_pair
    How to find out the frequency and volume of network traffic between a source-destination pair in a certain period of time compared to all-time.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_a_ransomware_attack/Registry_key_modifications
    How to looks for modifications to registry keys that can be used to launch an application or service at system startup with this process you can run in Splunk software.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_a_ransomware_attack/Schtasks.exe_registering_binaries_or_scripts_to_run_from_a_public_directory
    How to detect schtasks.exe registering a binary or script to run from a public directory with this process you can run in Splunk software.
  • https://lantern.splunk.com/Security/UCE/Foundational_Visibility/Compliance/Recognizing_improper_use_of_system_administration_tools/User_account_changed
    Get a report of all user account changes with this search you can run in Splunk software.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_a_ransomware_attack/File_write_spikes
    How to detect spikes in file writes with this process you can run in Splunk software.
  • https://lantern.splunk.com/Security/UCE/Foundational_Visibility/Security_monitoring/Securing_a_work-from-home_organization
    You want to use Splunk software to create new baselines, then use this data to establish new alerts, monitoring, and reporting that fit with a home-based workforce.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_intelligence/Monitoring_for_indicators_of_ransomware_attacks
    Splunk Enterprise Security helps you ingest, monitor, investigate/analyze, and act on security data and insights.