Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320

Splunk 7 "What's New"

Splunk Enterprise 7 new release marks “the end of meh-trics,” and delivers improvements in machine learning, as well as speed and scale improvements for analytics, monitoring and alerting.

Read More

Splunk Enterprise 6.6 Has Been Released

This blog release will cover the areas that we have experienced when exploring the latest version of Splunk. Within Splunks latest version, we have found that its easier than ever for a wide selection of administrators/users to leverage data sets, create dashboards, gather answers and share information. We have also experienced the improvements made with Indexer and Search Head clustering which makes the platform much more manageable at a large scale.

Read More

Splunk Detecting Zero-Day Attacks - Use-Case

Zero-day attacks take full advantage of unknown weaknesses within software. The most common method of obtaining an initial gateway is via spear phishing emails with an enclosed malware payload. When the unsuspecting work employee opens the malicious email, the malware executes its payload onto the unpatched machine and will establish a command and control communication, this will then attempt to move laterally across the internal network accessing sensitive data.

Read More

Splunk And Your Logs - Who Is That IP?

If you’re using Splunk already, it’s a fair assumption that you’re currently investigating some form of network access logs. Whether that’s from your edge firewalls or some sort of IDS or IPS, email or web filtering gateway, a proxy, a wireless access point or any other form of Internet facing system. Somewhere within your Splunk instance you will be seeing public IP addresses of locations that someone or something within your network is trying to get out.

Read More

Filtering Data within Splunk

Typically within a business an instance of Splunk would be indexing varied forms of data at copious volumes. A few examples would be Windows registry, event logs, application web logs, Linux configuration syslog, application web logs, and database audits.

Read More