Skip to main content

 

Splunk Lantern

Search

  • Filter Results
  • Location
  • Classification
    • Article Type
    • Applies To
    • Technical Add-On
    • Industry
    • Technical App
    • Login Wall
    • Author Name
    • Contributing Group
    • Written by Splunk Partner
    • SOAR Connector
    • Platform UCE Industry
    • Translation Status
  • Include attachments
Searching in
About 6 results
  • https://lantern.splunk.com/Security/UCE/Foundational_Visibility/Compliance/Running_common_General_Data_Protection_Regulation_(GDPR)_compliance_searches
    How to set up searches to monitor GDPR compliance in Splunk, with tips and tricks from Splunk experts.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Cyber_frameworks/Prescriptive_Adoption_Motion_-_Cyber_frameworks
    A cybersecurity framework provides a common language and set of standards for security leaders across countries and industries to better understand their security postures and those of their vendors.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Cyber_frameworks/Getting_started_with_MITRE_in_Enterprise_Security_and_Security_Essentials
    The MITRE ATT&CK framework and its application to existing SIEM deployments, particularly Splunk Enterprise Security, helps security teams understand where they have threats covered and where they do ...The MITRE ATT&CK framework and its application to existing SIEM deployments, particularly Splunk Enterprise Security, helps security teams understand where they have threats covered and where they do not.
  • https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Protecting_a_Salesforce_cloud_deployment
    How to use Splunk software to monitor queries, downloads of records and files, and set up searches to alert you to other high-risk events.
  • https://lantern.splunk.com/Security/UCE/Foundational_Visibility/Compliance/Recognizing_improper_use_of_system_administration_tools
    How to use Splunk software to examine Windows security logs for unusual authentication events and then investigate events taken by those logged-in users.
  • https://lantern.splunk.com/Security/UCE/Foundational_Visibility/Compliance/Detecting_non-privileged_user_accounts_conducting_privileged_actions
    Detect all the actions taken by any individual with root or administrative privileges or when user non-privileged accounts attempt to conduct escalated actions.