Skip to main content
Splunk Home
LANTERN HOME
  1. Splunk Lantern
  2. Step-by-Step Procedures
  3. Regulatory Compliance
  4. GDPR

GDPR

Follow New articles New articles and comments
  • Access to unencrypted resources
  • Activity from expired user identity
  • Brute force access behavior detected
  • Device with outdated anti-malware
  • Expected host not reporting events
  • Geographically improbable access detected
  • New connection to device
  • Systems with the update service disabled
  • Unauthorized access to Splunk indexes
  • Unauthorized access to systems
  • Unauthorized connection through firewall
The information provided in Splunk Lantern is intended for informational and educational purposes only. All information is provided in good faith, however, Splunk disclaims any and all representations and warranties, express and implied, regarding the information provided, including without limitation any warranties and representations regarding the completeness, adequacy or accuracy of the information. You agree to take full responsibility for the results arising from the use of the information provided.
Splunk Home LANTERN HOME
  • Facebook
  • Twitter
  • LinkedIn
Splunk, Splunk> and Turn Data Into Doing are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.