Skip to main content
Splunk Home
LANTERN HOME
  1. Splunk Lantern
  2. Use Case Library
  3. Reducing Cyber Risks
  4. Managing Threats

Managing Threats

Follow New articles New articles and comments
  • Monitoring use of Git repositories
  • Protecting a Salesforce cloud deployment
  • Detecting lateral movement with Active Directory data
  • Detecting techniques in the Orangeworm attack group
  • Monitoring for signs of Windows privilege escalation attacks
  • Securing a work-from-home organization
  • Detecting the use of randomization in cyberattacks
  • Monitoring command line interface actions
  • Monitoring employee network traffic
  • Recognizing improper use of system administration tools
  • Monitoring for network traffic volume outliers
  • Creating a timebound picture of network activity
The information provided in Splunk Lantern is intended for informational and educational purposes only. All information is provided in good faith, however, Splunk disclaims any and all representations and warranties, express and implied, regarding the information provided, including without limitation any warranties and representations regarding the completeness, adequacy or accuracy of the information. You agree to take full responsibility for the results arising from the use of the information provided.
Splunk Home LANTERN HOME
  • Facebook
  • Twitter
  • LinkedIn
Splunk, Splunk> and Turn Data Into Doing are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.