
Scaling Security Monitoring with MITRE ATT&CK
At the end of 2020, as some of you might remember, there was a massive vulnerability that became known as the Solar Winds vulnerability. And in the wake of the SolarWinds vulnerability, I thought it would be helpful to put something together to talk about how critical mapping out your security monitoring coverage truly is.…
Tuning Your Search Head When Reach Concurrency Limitations
When you see the error for reaching max historical concurrent level jobs, or you get frequent messages like “waiting for queued job to start”, you are hitting either the User-level concurrent jobs limitation, the role level concurrent jobs limitation, or the system level concurrent jobs limitation. We will talk through each of these, where to…
Splunk.Myths.Misconceptions
Before I moved over to the PS world, I was a Splunk admin who thought he had it all figured out. I had been working with Splunk for almost three years before I made the jump and got hit with the realization that I didn’t know near as much as I thought I did. I…
Use Case Template
Use Case Template Each section of the use case template is below in a heading style with the instructions on populating that section between square brackets. General advice on implementing the use case is given in angle brackets. After this, build a document with these headings, populate it with information relevant to your organization, your…
ES Implementation Checklist
Introduction Almost every customer that purchases Splunk’s Enterprise Security will also use Professional Services to implement the product. This guide will serve as a checklist to help you ensure you are prepared for the most successful Enterprise Security deployment as possible. We will identify the Who, What, Why, and How of a successful ES deployment.…
Dos and Donts of Splunking Your Syslog
Syslog is plentiful in all environments, no matter what the size may be and Splunking your syslog is something that inevitably happens, one way or another. And believe it or not, there are tons of ways you can Splunk that data. As a Splunk Professional Services Consultant, I’ve seen many ways that customers send that…
Introduce Yourself (Example Post)
This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right. You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the…
Introduce Yourself (Example Post)
This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right. You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the…
Introduce Yourself (Example Post)
This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right. You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the…
Follow My Blog
Get new content delivered directly to your inbox.