Explore
- Active directory (4)
- AlienVault (1)
- Android (1)
- apache (1)
- ASP.net (1)
- AWS (6)
- Azure (1)
- bcpdrp (1)
- Beats (1)
- boto3 (1)
- business continuity (1)
- C# (1)
- CCISO (2)
- CCSP (2)
- CISSP (1)
- Cloud (9)
- Cloud certification (1)
- Cloud security (7)
- Cordova (1)
- Curator (1)
- Cyber kids (2)
- Cyber parents (1)
- Cyber safety (3)
- Cybersecurity KPI (1)
- Data leakage (1)
- Data privacy (1)
- Docker (1)
- ec2 (1)
- Elastalert (1)
- Elasticsearch (10)
- ELK (11)
- email signature (0)
- esp8266 (2)
- GDPR (1)
- Google Finance (1)
- Graph API (1)
- greenbone (1)
- Group Policy (1)
- IIS (1)
- Information security (8)
- Intune (1)
- iot (2)
- IT metrics (2)
- itop (1)
- IT Security (1)
- LogonTracer (1)
- Log review (2)
- Logstash (3)
- McAfee (1)
- metricbeat (1)
- Mobile security (1)
- mqtt (2)
- MSP (1)
- Neo4j (1)
- network monitoring (2)
- php (2)
- php-ldap (2)
- Powershell (1)
- Python (5)
- rds (1)
- Risk assesment (3)
- RSA (1)
- Scripting (4)
- Search guard (1)
- Security incident (1)
- SIEM (6)
- SLA (1)
- Slack (1)
- snmp (1)
- Social Engineering (1)
- Sophos (1)
- Splunk (20)
- Splunk cluster (4)
- SQL Injection (1)
- SSH tunneling (1)
- SSL installation (1)
- sysvol replication (1)
- ubuntu (1)
- Virtualization (1)
- Vulnerabilities (2)
- Wazuh (1)
- Whatsapp (1)
- Windows (2)
- Work from Home (1)
Architecting Splunk Deployment
Architecting Splunk Deployment Scale Splunk Enterprise functionality to handle the data needs for enterprises of any size and complexity. Access diverse or dispersed data sources.…...
Characteristics of IaaS, PaaS and SaaS
IaaS Characteristics Scale Converged network and IT capacity pool Self-service and on-demand capacity High reliability and resilience IaaS key Benefits Usage is metered and price…...
How to configure Splunk Multi site Indexer Cluster
Deploy a multisite indexer cluster To deploy a multisite cluster, you configure the set of nodes for each site: A single master resides on one…...
USB Storage Device Monitoring using ELK
USB storage devices are commonly used in almost all organizations to store or transfer data. These devices act as the primary sources of malware or…...
Splunk deployment server configuration
Deployment Server is for distributing configuration, and apps to Splunk Universal Forwarder, and allows you to manage remote Splunk forwarder centrally. Sending configuration file like…...