0 Splunk Enterprise Security-Designing a Custom Splunk Add-on-Section 12 Wrapping up the Design 2024-07-03 24
0 Splunk Enterprise Security-Managing Splunk Enterprise Security Data and Dashboards-Section 9 Splunk Enterprise Security-Managing Splunk Enterprise Security Data and Dashboard -Introduction!. 2024-05-07 24
0 Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 41 Continuing the Brute Force Attack Use Case 2024-07-06 23
0 شرح کلی هویتزدایی داده کسبوکارها برای بهبود محصولات، خدمات، کارآمدی و به طور کلی موفقیت خود، از دادههای کاربران استفاده میکنند. این شاید ترسناک باشد، اما با هویتزدایی داده، اطلاعات شخصی افراد به دادههای موردنظر کسبوکارها گره نخواهد خورد. 2024-09-15 22
0 Splunk Enterprise Security-Planning, Deploying, and Configuring-Section 14 Splunk Enterprise Security-Planning, Deploying, and Configuring – Splunk ES Users and Roles 2024-05-06 22
0 Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 37 Deep Diving User Intelligence 2024-07-06 22
0 Splunk Enterprise Security-Managing Splunk Enterprise Security Data and Dashboards-Section 17 Splunk Enterprise Security-Managing Splunk Enterprise Security Data and Dashboard -Creating a Notable Event 2024-05-08 22
0 Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 27 The Threat Intelligence workflow 2024-07-06 21
0 Splunk Enterprise Security-06-Configuring Threat Intelligence in Splunk Enterprise Security-Section 22 Defining Threat Intelligence. 2024-07-06 21