Use Case Videos
Splunk use case videos give users a practical approach to investigating and solving specific problems within their networks. These videos are particularly helpful to beginner and intermediate users, giving them actionable examples that they can start using today.
Use case video giving an example of how to use Splunk to check for any tampering done to Windows audit logs.
How to use Splunk with proxy data to find large file uploads that could point to data exfiltration in your network.
Using anti-virus logs to detect if malware is recurring on a host after being removed.
This use case video shows how to use Windows security logs to find possible brute force attacks on your network.
How to use Splunk with firewall logs to detect hosts that are running network and port scans.
Using Splunk to find unencrypted web communications that could lead to a data breach.
In this video, we will show you how to use IPs in your data to report and visualize user locations.
A slow loading web site can not only frustrate users, but can also hurt search rankings. In this video we will show you how to use Splunk Enterprise to find slow content using web server logs.
Often an attack will include the creation of a new user, followed by permissions being elevated to an admin level. In this video we show you how to use Splunk to find these accounts so that you can take action if needed.
Most service accounts should never interactively log into servers. This video will show you how to actively monitor your servers so you can quickly investigate if this happens.