Administering Splunk Enterprise Security 6.4

Administering Splunk Enterprise Security 6.4

Summary

This 13.5 hour course prepares architects and systems administrators to install and configure Splunk Enterprise Security (ES). It covers ES event processing and normalization, deployment requirements, technology add-ons, dashboard dependencies, data models, managing risk, and customizing threat intelligence.

Description

Course Topics

  • Examine how ES functions including data models, correlation searches, notable events and dashboards
  • Create custom correlation searches
  • Customize the Investigation Workbench
  • Learn how to install or upgrade ES
  • Learn the steps to setting up inputs using technology add-ons
  • Fine tune ES Global Settings
  • Customize risk and configure threat intelligence

Duration

3 Days

Objectives

Module 1 – Introduction to ES

  • Review how ES functions
  • Understand how ES uses data models
  • Configure ES roles and permissions

Module 2 – Security Monitoring

  • Customize the Security Posture and Incident Review dashboards
  • Create ad hoc notable events
  • Create notable event suppressions

Module 3 – Incident Investigation

  • Review the Investigations dashboard
  • Customize the Investigation Workbench
  • Manage investigations

Module 4 – Analyst Tool & Data Sources;

  • Troubleshoot missing dashboard data
  • Explain dashboard dependencies including data models and searches
  • Give an overview of risk
  • Review the Risk Analysis dashboard
  • Explain ways to assign risk

Module 5 – ES Deployment

  • Identify on-prem deployment topologies
  • Examine the deployment checklist
  • Understand pre-deployment requirements

Module 6 – Installation

  • Prepare a Splunk environment for installation
  • Download and install ES on a search head
  • Test a new install
  • Post-install configuration tasks

Module 7 – Initial Configuration

  • Set general configuration options
  • Add external integrations
  • Configure local domain information
  • Customize navigation
  • Configure Key Indicator searches

Module 8 – Validating ES Data

  • Verify data is correctly configured for use in ES
  • Validate normalization configurations
  • Install additional add-ons

Module 9 – Custom Add-ons

  • Design a new add-on for custom data
  • Use the Add-on Builder to build a new add-on

Module 10 – Tuning Correlation Searches

  • Configure correlation search scheduling and sensitivity
  • Tune ES correlation searches

Module 11 – Creating Correlation Searches

  • Create a custom correlation search
  • Manage adaptive responses
  • Export/import content

Module 12 – Asset and Identity Management

  • Review the Asset and Identity Management interface
  • Describe Asset and Identity KV Store Collections
  • Configure and add asset and identity lookups to the interface
  • Configure settings and fields for asset and identify lookups
  • Explain the asset and identity merge process
  • Describe the process for retrieving LDAP data for an asset or identity lookup

Module 13 – Threat Intelligence Framework

  • Understand and configure threat intelligence
  • Use the Threat Intelligence Management interface to configure a new threat list

Prerequisites

  • Splunk Fundamentals 1
  • Splunk Fundamentals 2
  • Splunk Enterprise System Administration
  • Splunk Enterprise Data Administration

Onsite Training

For groups of three or more

Request Quote

Public Training

EMEA UK Time - Virtual

APAC Singapore - Virtual

AMER Pacific Time - Virtual

AMER Eastern Time - Virtual

Chatswood, NSW


Don't see a date that works for you?

Request Class