Event Date: March 25, 2020
Hosted By: Splunk & Carahsoft
Attendees joined us on March 25th for the Getting Started with Splunk Data Manipulationworkshop, a hands-on introduction to the Splunk GUI. Attendees learned how to upload a .csv to Splunk, perform simple field extractions, and build basic dashboards and reports! During this virtual workshop, participants discovered how to utilize data to:
Build several searches to gain more insight on the data set
Explore how to set conditional searches
Build custom visualizations and how they can be edited with XML
Through the use of a second data set, attendees created a new set of data to allow us to correlate between the two. Upon completion, participants had a better understanding of how to:
Run a basic Splunk query
Build and customize a Splunk dashboard/report
Build a lookup table with Splunk and correlate between data sources
Use existing resources, such as Splunkbase to accelerate your Splunk usage
Today’s datacenter has evolved and IT environments are now more complex than ever – so don’t let your IT management and monitoring tools leave you behind. With Splunk for IT Operations, you get end-to-end visibility across IT infrastructure to fix problems faster.
Any government agency, whether it is a civilian, defense or
intelligence agency, depends on information technology to
help support data integrity, reduce mission risk and ensure the
confidentiality and availability of information.
In response to these needs, NIST published its Risk Management
The rapid pace of virtualization adoption in the datacenter creates
challenges for virtualization administrators. IT professionals
have limited operational visibility into their virtual infrastructure,
inadequate control over performance and security of virtual
machines, insufficient insights in...
Targeted attacks — including advanced persistent threats (APTs) — and the new generation of malware they employ are among the greatest security challenges facing today’s enterprises. Traditional security technologies are unable to reliably identify such threats in the first place, leading to h...
The cyberthreat landscape is rapidly changing. As attacks continue to increase in volume and sophistication, agency defenses must also evolve.In order to do so, many agencies are moving toward a more holistic, analytics-driven approach to security. By gaining an end-to-end view of what's happening i...
Security operations teams are drowning in machine data and strapped for people who can make sense of the signals coming from it. In today's rapidly evolving threat landscape, quickly drawing actionable insights from the data is the key to reducing risk.