{"id":1194,"date":"2019-02-27T16:22:25","date_gmt":"2019-02-27T12:52:25","guid":{"rendered":"https:\/\/www.apk.co.ir\/video\/?p=1194"},"modified":"2020-04-05T12:01:40","modified_gmt":"2020-04-05T07:31:40","slug":"splunk-security-use-case","status":"publish","type":"post","link":"https:\/\/www.apk.co.ir\/video\/splunk-security-use-case\/","title":{"rendered":"SIEM \u0686\u06cc\u0633\u062a\u061f \u0645\u0632\u0627\u06cc\u0627\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 Splunk Enterprise Security \u062f\u0631 \u0633\u0627\u0632\u0645\u0627\u0646 \u0647\u0627"},"content":{"rendered":"

SIEM \u0686\u06cc\u0633\u062a\u061f \u0647\u0646\u06af\u0627\u0645 \u062d\u0645\u0644\u0647 Ransomware\u0647\u0627 \u0641\u0631\u0635\u062a \u0686\u0646\u062f\u0627\u0646\u06cc \u0628\u0631\u0627\u06cc \u0645\u0642\u0627\u0628\u0644\u0647 \u0648 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0627\u0632 \u062f\u0633\u062a \u0631\u0641\u062a\u0646 \u062f\u0627\u062f\u0647\u200c\u0647\u0627 \u0648\u062c\u0648\u062f \u0646\u062f\u0627\u0631\u062f. \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\u06cc\u060c \u0628\u0647 \u0648\u0627\u0633\u0637\u0647 \u0645\u0627\u0647\u06cc\u062a \u0645\u062e\u0631\u0628 \u062e\u0648\u062f\u060c \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0622\u0633\u06cc\u0628\u200c\u0647\u0627\u06cc \u0632\u06cc\u0627\u062f\u06cc \u0631\u0627\u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0648\u0627\u0631\u062f \u0646\u0645\u0627\u06cc\u0646\u062f. \u062f\u0631 \u0646\u062a\u06cc\u062c\u0647 \u0645\u062d\u0627\u0641\u0638\u062a \u0627\u0632 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u0648 \u062d\u0641\u0638 \u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647 \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u06cc\u060c \u0645\u0633\u062a\u0644\u0632\u0645 \u0631\u0648\u06cc\u06a9\u0631\u062f\u06cc \u062c\u0627\u0645\u0639\u200c \u0648 \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0627\u0635\u0644 \u201c\u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc\u201d \u0627\u0633\u062a.<\/p>\n

<Splunk<\/a>\u060c \u0627\u0645\u0646\u06cc\u062a \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0648 \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0647\u0648\u0634\u0645\u0646\u062f:<\/p>\n