Skip to main content
Splunk Home
LANTERN HOME
  1. Splunk Lantern
  2. Use Case Library
  3. Reducing Cyber Risks
  4. Improving Security Operations

Improving Security Operations

Follow New articles New articles and comments
  • Managing firewall rules
  • Monitoring Kubernetes sensitive object access
  • Monitoring Kubernetes sensitive role activities
  • Detecting Kubernetes scanning activity
  • Detecting UDP service amplification abuse
  • Investigating a ransomware attack
  • Monitoring a network for DNS exfiltration
  • Reconstructing a website defacement
The information provided in Splunk Lantern is intended for informational and educational purposes only. All information is provided in good faith, however, Splunk disclaims any and all representations and warranties, express and implied, regarding the information provided, including without limitation any warranties and representations regarding the completeness, adequacy or accuracy of the information. You agree to take full responsibility for the results arising from the use of the information provided.
Splunk Home LANTERN HOME
  • Facebook
  • Twitter
  • LinkedIn
Splunk, Splunk> and Turn Data Into Doing are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.