Splunk Attack Range Setup Guide

Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data Into Splunk. In this on-demand video Bill Ouellette (Principal Splunk Security Engineer) will provide a Step by Step Guide on setting up the “Attack Range Framework” within your Splunk test instance. …Learn MoreSplunk Attack Range Setup Guide

Hardening Your Splunk Environment

According to the Ponemon Institute the average cost of data breach for a company is $3.8 million dollars. Regardless of whether you are operating in the cloud or on-premise taking steps to harden your operating system is an absolute must to limit potential security weaknesses.…Learn MoreHardening Your Splunk Environment

Should I Migrate my Splunk Environment to Python 3? Yes…No…Yes!!!

Now that Splunk’s newest release (8.0) supports Python3 we have fielded many questions from customers on what the practical approach for migration is. In this blog, we will discuss the steps you should make when migrating your environment to Python3.…Learn MoreShould I Migrate my Splunk Environment to Python 3? Yes…No…Yes!!!

CIM Compliance – A Simple Walkthrough

Making data CIM compliant can be a daunting and confusing exercise for new Splunkers and experienced ones alike. Often the biggest misconceptions have to do with the approach rather than the exercise itself. My biggest piece of advice – start with the end in mind.…Learn MoreCIM Compliance – A Simple Walkthrough