Splunk Server Attack: Reviewing The Logs

“When first accessing to a new Splunk implementation, I always want to poke around and review the information that’s already being indexed within the environment. I familiarize myself with the naming conventions, number of systems, and possibly valid usernames and/or passwords.”
-Ryan, TBG Security‘s Director of Security Engineering

[videoframes src=”https://youtu.be/PwUgFY4xz1g” skin=”17″ controls=”1″ headline_color=”#000000″ headline_size=”22″]

Get In Touch

Have a question? We’re here to help.

Contact Us