SlideShare ist ein Scribd-Unternehmen logo
1 von 81
Downloaden Sie, um offline zu lesen
Splunking the	Endpoint
Simon	O’Brien
Sales	Engineer/Security	SME,	Splunk
SOB@SPLUNK.COM
2
Disclaimer
During	the	course	of	this	presentation,	we	may	make	forward	looking	statements	regarding	future	
events	or	the	expected	performance	of	the	company.	We	caution	you	that	such	statements	reflect	our	
current	expectations	and	estimates	based	on	factors	currently	known	to	us	and	that	actual	events	or	
results	could	differ	materially.	For	important	factors	that	may	cause	actual	results	to	differ	from	those	
contained	in	our	forward-looking	statements,	please	review	our	filings	with	the	SEC.	The	forward-looking	
statements	made	in	the	this	presentation	are	being	made	as	of	the	time	and	date	of	its	live	presentation.	
If	reviewed	after	its	live	presentation,	this	presentation	may	not	contain	current	or	accurate	information.	
We	do	not	assume	any	obligation	to	update	any	forward	looking	statements	we	may	make.	
In	addition,	any	information	about	our	roadmap	outlines	our	general	product	direction	and	is	subject	to	
change	at	any	time	without	notice.	It	is	for	informational	purposes	only	and	shall	not,	be	incorporated	
into	any	contract	or	other	commitment.	Splunk	undertakes	no	obligation	either	to	develop	the	features	
or	functionality	described	or	to	include	any	such	feature	or	functionality	in	a	future	release.
DEMO,	PART	I
4
Do	you	know	this	man?
• Why	is	Splunkingan	endpoint	important?
• Most	POS	systems	are	based	on	windows…
• Infecting	unprotected	endpoints	is	easy
• Exfiltration	of	data	can	be	easy
5
Do	you	know	this	man?
6
Session	Goals
• Understand	why	you	should	Splunk	
the	endpoint
• Believe	that	the	Universal	Forwarder	
is	awesome
• Learn	about	customer	success
• Get	some	artifacts	you	can	use
• Bring	home	what	you	can	do	today
7
WHY?
1. It	is	relatively	inexpensive	to	Splunk	
your	endpoints,	and	it	will	improve	
your	security	posture.
2. VISIBILITY!	You	will	have	more	
complete	information in	the	case	of	
breach.
3. The	information	from	your	
endpoints	maps	well	to security	
guidance,	including	the	CIS	20	and	
the	ASD	top	35.
8
You	may	have	heard…
Endpoint/Server	Vulnerabilities Endpoint-Based	Malware
9
So	these	happened	in	2014/2015…
Endpoint/Server	Vulnerabilities Endpoint-Based	Malware
….the	endpoints?
Could	we	be	more	secure	if	we
10
Executive	Summary:
YES!(so	do	that)
THANKYOU!
12
The	Endpoint	is	important!
Closest	to	humans Versatile
Underprotected Data-rich
13
The	Endpoint	is	important!
Closest	to	humans Versatile
Underprotected Data-rich
70%of	successful	breaches	
start	on	the	endpoint*
*IDC	study	2014
14
The	UF:	It’s	more	than	you	think
Logs
….your	endpoints.
The	Universal	Forwarder	allows	
you	to
15
The	UF:	It’s	more	than	you	think
Logs
16
The	UF:	It’s	more	than	you	think
Scripts
Perfmon
Wire	Data
Logs
Process/Apps/FIM
Registry
Sysmon
17
Splunk	Universal	Forwarder	for	ETD*!
• “Free”
• Lightweight
• Secure
• Runs	on	many	versions	of	
Windows	&	*NIX	&	OSX
• Flexible
• Centrally	configurable
• SCALE!
*Endpoint	Threat	Detection	(Response?)
18
What	about	the	“Response”?
VISIBILITY
reactivity
(for	now)
19
What	about	the	“Response”?
There’s	stuff	out	
there.	YMMV.
20
Splunk	Forwarder	for	ETD*!
• “Free”
• Lightweight
• Secure
• Runs	on	many	versions	of	
Windows	&	*NIX	&	OSX
• Flexible
• Centrally	configurable
• SCALE!
*Endpoint	Threat	Detection	(Response?)
Come	on.	Is	anyone	using	the	
Universal	Forwarder	in	this	way?
YES.
21
Use	Case	1:	Large	Internet	Company
…x	(Many	
indexers)
on	prem dmz
Int.	forwarders
ds
install
config
internet
UF
x10,000!
Individual	
certs
• Windows	event	logs
• OSX	/var/log/*
• Carbon	Black	output
• Crash	logs	for	IT	Ops
• Custom	script	for	apps	
installed
• UNIX	TA	(upon	request)
• Windows	TA	(upon	request)
• Additional	granularity	for	
execs	and	their	admins
• Moving	to	Splunk	Cloud
search
!
22
Central	Control	with	Deployment	Server
One	(Linux)	
DS	=	10,000	
endpoints!
Proxy	Logs
23
Additional	ways	to	gather	endpoint	data
Integrity	
Management
NG	Endpoint	
Protection
Whitelisting
Look	for	apps	
on	
splunkbase!
24
Back	to	these	breaches…
Endpoint-Based	Malware
Registry	Entries
System	Event	Logs
New	Services
New	Files
Comms/Running	 Proc
Security	Event	Logs
Known	Vulns/Apps
25
Let’s	map	these	to	the	capabilities	of	the	UF…
Registry	Entries
System	Event	Logs
New	Services
New	Files
Comms/Running	 Proc
Security	Event	Logs
Known	Vulns/Apps
26
We	configure	the	forwarder	to	give	us	data	of	
interestRegistry	Entries
System	Event	Logs
Security	Event	Logs
New	Services
New	Files
Comms/Running	 Proc
WinRegMon
WinEventLog:	System	
and	WinHostMon
WinEventLog:	Security	+	
Auditing
Scripted	Inputs
WinEventLog:	System
WinEventLog:	Security
TA-Microsoft-Sysmon
Stream,	WinHostMon
Windows	Update
Monitor:	WindowsUpdate.log
Known	Vulns/Apps
Scripted	Inputs	or	
WinHostMon
Configuration	
examples?	See	
demo	&	appendix
27
What	could	we	look	for?
• ANY	new	Windows	services
• Registry	being	written	to	where	it	should	not
• Users	that	shouldn’t	be	used
• Unusual/unapproved	processes	being	launched	and	their	connections/hashes
• Unusual/unapproved	ports/connections	in	use
• Unapproved	USB	devices	being	inserted
• New	files	in	places	they	should	not	be	(WindowsSystem32…)
• Files	that	look	like	one	thing	but	are	really	another
• New	drive	letters	being	mapped
• Lack	of	recent	Windows	updates
• Versions	of	software	known	to	be	vulnerable
• …and	more
INSTANT,	GRANULAR	DATA	ABOUT	COMMON	BEHAVIOR	OF	WINDOWS	MALWARE!
DEMO,	PART	II
29
Use	Case	2:	UF	for	ATM	Security	+	Fraud
• Bank	uses	ATMs	that	are	Windows-based
• Each	ATM	has	a	UF	installed,	securely	sending	data	to	
intermediate	forwarder	on	prem and	then	up	to	
Splunk	Cloud
• Data	retrieved	from	custom	ATM	logs	– can	
understand	what’s	going	on	within	1-2	seconds
• Customer	reps	can	see	what	the	problem	is	easily
• Understand	baseline	– when	are	ATMs	popular?	
Handle	the	cash	levels
• Understand	fraud	– has	someone	stolen	a	card	+	PIN	
and	hitting	ATMs	in	close	clusters?	“Superman”	
correlation
• Conversion	Opp:	know	that	a	3rd-party	bank	customer	
hits	a	bank	ATM	every	Friday	for	$200
Regional	Bank	in	NE,	US
30
How	about	inventory	+	vulnerabilities?
31
How	about	inventory	+	vulnerabilities?
32
Two	ways	to	get	installed	apps,	there	are	more…	
Scripted	Input	from	Windows	TA	or	
WinHostMon
Microsoft	Sysmon
33
What	versions	of	what	exist	on	my	network?
Scripted	Input	from	Windows	TA	or	
WinHostMon
Do	I	have	known	
vulnerable	
software	on	
endpoints?
34
Hash	data	from	apps
Microsoft	Sysmon
Correlate	hash	
with	threat	intel
35
Windows	Update	data
36
Windows	Update	Data	(two	sourcetypes)
Monitor:	WindowsUpdate.log
Monitor:	WinEventLog:System
37
Windows	Port	Data
Scripted	input	from	Windows	TA	or	
WinHostMon
38
Windows	Port	Data
PID	data=easy	
correlation	to	
process	
responsible
Or	use	sysmon…
39
Endpoint	info	critical	to	CSC	(SANS)	20
1	&	2:	Log	hardware	info,	running	procs/svcs
3:	Scripted	inputs	to	check	for	config issues
4:	Evaluate	processes/services	for	vulns
5:	Look	for	malicious	new	services/processes	
11:	Look	for	malicious	ports/protocols	
12:	Look	for	local	use	of	priv accounts
14:	Gather	windows	events/*NIX	logs
16:	Evaluate	use	of	screensaver	locks
17:	Identify	lapses	in	local	encryption
You	could	do	all	of	that	with	the	Universal	Forwarder.
Similar	
mappings	to	
ASD	35…
40
Threat	Intelligence,	you	say?
File	names	and	hashes
Expired/bogus	certs
Known	Bad	IP
Processes/Services
41
Endpoint	vulns can	be	found	if	you	google what	to	
look	for…
42
Remember	this?
shellshock
• Publicly	announced	on	24/9/2014.
• One	Vulnerability	Management	vendor	had	a	plugin	
on	25/9.	That’s	pretty	good!
• Others	followed	on	26/9	and	29/9 – not	so	good.
• These	require authenticated scans.
43
Remember	this?
shellshock
• Publicly	announced	on	9/24/2014.
• One	Vulnerability	Management	vendor	had	a	plugin	
on	9/25.	That’s	pretty	good!
• Others	followed	on	9/26	and	9/29 – not	so	good.
• These	require authenticated scans.	
make	this	process	more	timely?
Could
44
The	Universal	Forwarder	as	self-help	guru
That	UF	sure	
does	a	lot	by	
itself!
45
The	Universal	Forwarder	as	self-help	guru
• If	you	had	the	Splunk	UF	on	all	of	your	production	
*NIX	servers…
• You	could	very	quickly	program	them	to	find	
shellshock	(or	ghost,	or	poodle,	or	heartbleed).
• You	avoid	Vulnerability	Management	Vendor	Lag
• You	could	then	report	on	remediation	efforts	over	
time.
• And the	data	ingest	would	be	very	small.
46
5	Step	Vulnerability	Tracking	Strategy
1. On	day	one,	become	aware	of	vulnerability
2. Google	“how	to	detect	$vulnerability$”
3. Adopt	code	via	script	(shell,	batch,	etc)	and	place	into	your	Splunk	deployment	server
4. Forwarders	run	code	and	deliver	results	into	Splunk	indexers
5. Report	on	the	results
A	good	step	
by	step
47
Use	Case	3:	UF	for	Shellshock	Tracking
“We	wrote	it	on	the	same	day	and	ran	
it	– it	was	really	fundamental	to	our	
defense.”	– Mark	Graff,	NASDAQ
Shellshock	on	20,000	Linux,	Solaris,	
AIX	servers	tracked	in	Splunk
(Large	payment	processing	
company)
48
How	about	wire	data?
• Technology	Add-on	or	TA	(Splunk_TA_stream)
• Provides	a	new	Data	Input	called	“Wire	Data”
– passively	captures	traffic	using	a	modular	
input
– C++	executable	called	“Stream	Forwarder”	
(streamfwd)
• Captures	application	layer	(level	7)	attributes
• Automatically	decrypts	SSL/TLS	traffic	using	RSA	
keys
Turn	the	UF	
into	a	little	
network	sniffer
49
Stream	Protocols/Platforms	Supported
• UDP
• TCP
• HTTP
• IMAP
• MySQL	
(login/cmd/query)
• Oracle	(TNS)
• PostgreSQL
• Sybase/SQL	
Server	(TDS)	
• FTP
• SMB
• NFS
• POP3
• SMTP
• LDAP/AD
• SIP
• XMPP
• AMQP
• MAPI
• IRC
Supports	Windows	7	(64-bit),	Windows	2008	R2	(64	bit),	Linux	(32-bit/64-bit)	and	Mac	OSX	(64-bit)
• DNS
• DHCP
• RADIUS
• Diameter
• BitTorrent
• SMPP
50
How	much	data?
TA-microsoft-sysmon
Splunk_TA_windows
“a	typical	day	at	
the	office…”
Nice	try,	O’Brien!
All	this	endpoint	Splunking will	
blow	up	my	license…
51
How	much	data?
TA-microsoft-sysmon
Splunk_TA_windows
“a	typical	day	at	
the	office…”
52
How	much	data?
A	12	hour	day.	
Even	in	
marketing!
53
How	much	data?
12	hours	of	standard	event	logs	=	5.5	MB.	Nice!
54
How	much	data?
Hmm.	Lot	more	
events…
55
How	much	data?
12	hours	of	Sysmon logs	=	241	MB.	Oh	crap.	There	goes	my	Splunk Live	talk…!!
56
How	much	data?
Lots	of	
red….let’s	take	
that	out.
57
How	much	data?
That’s	more	like	it.	16MB	of	Sysmon,	5.5MB	of	Windows	events	=	21.5MB	per	endpoint.
Coverage	for	1,000 Windows	endpoints?	21.5GBingest,	per	day.
58
Sysmon with	network/image	filtering?
• Start/Stop	of	all	processes
• Process	names	&	full	command	line	args
• Parent/child	relationships	(GUIDs)	between	processes
• Session	IDs
• Hash	and	user	data	for	all	processes
• Filenames	that	have	their	create	times	updated
• Driver/DLL	loads	with	hash	data
• Network	communication	per	process	(TCP	and	UDP)	including	IP	address,	size,	port	data
• Ability	to	map	communication	back	to	process	GUID	and	session	ID
You	still	get…
You	lose…
You	retain	far	
more	function	
than	you	lose.
59
So	you	can	still	do…
I	surfed	a	whole	lot	
in	Chrome	
today…listened	to	
some	tunes,	too!
60
And	also… I	really	DID	work	
on	that	300	slide	
powerpoint before	
lunch,	I	swear!
61
In	Summary
1. If	you’re	not	Splunking	the	data	from	your	various	endpoints	today,	
you	should	be.	
2. The	Splunk	Universal	Forwarder	is	a	super-powerful	tool	to	use	on	
your	endpoints,	free	to	install,	scales	well,	can	be	centrally	
configured,	and	data	volumes	are	quite	reasonable.	
3. The	Splunk Deployment	Server	can	be	used	to	turn	features	on	and	
off,	on	the	fly.
4. For	Windows,	event	data	is	critical.	Sysmon data	is	great	too,	and	
free	to	install.
5. Other	customers	from	many	verticals	are	having	continued	success	
with	the	data	they	can	gather	from	endpoints.
FINAL	QUESTIONS?
Please	join	the	Splunk Slack	channel!!!
splunk-usergroups.slack.com
#general		#apac
THANKYOU!
SOB@SPLUNK.COM
APPENDIX
SOB@SPLUNK.COM
SYSMON DETAILS
SOB@SPLUNK.COM
67
Sysmon Info
• Blog	post	from	November,	2014
• App	available	on	Splunkbase,	
works	with	current	(3.1)	version	
of	Sysmon:	
• Forwarder	6.2+	needed	to	get	
XML	formatted	Sysmon data	(a	
good	idea,	cuts	down	on	size)
68
Sysmon Filters
• This	works	for	Sysmon
3.1+
• Add	what	you	need
• If	you	actually	want	
Image	and	Network	data,	
add	those	stanzas
• Email	
brodsky@splunk.com for	
links	to	example	files!
Filter	out	all	the	
Splunk	activity
69
Sysmon Config List
• sysmon –c	with	no	
filename	will	dump	
config
Image	and	
Network	
disabled
70
Sysmon Config Load
• sysmon –c	with	
filename	will	load	
config
• No	restart	needed
• Ignore	errors
• Run	as	admin	(or	script	
as	admin)
Hash	Analysis	with	Sysmon
SOB@SPLUNK.COM
Windows	registry	monitoring
SOB@SPLUNK.COM
77
Registry	Monitoring	config
• Simple	examples	shown	
here
• Email	sob@splunk.com
for	an	extensive	registry	
monitoring	configbased	
on	Autoruns
78
PLACEHOLDER:	Winreg
Will	have	link	and	other	info	here	detailing	how	to	do	windows	registry	
with	sample	config of	400+	registry	keys	to	monitor.
If	you	monitor	
the	right	reg key	
you	can	find	new	
USB	insertions.
79
Registry	Results
• USB	inserted	with	
BlackPOS malware
• Malware	executed	–
these	are	the	registry	
changes	logged
winhostmon
SOB@SPLUNK.COM
81
WinHostMon
• Get	hardware	details,	
services,	processes,	
apps,	etc…
• Built	right	into	the	
forwarder,	no	scripts	
needed

Weitere ähnliche Inhalte

Ähnlich wie Splunking the Endpoint: Visibility and Security with the Universal Forwarder

Deception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary MovementsDeception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary MovementsSatnam Singh
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Webinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsWebinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsSplunk
 
SplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine LearningSplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine LearningSplunk
 
Machine Learning + Analytics
Machine Learning + AnalyticsMachine Learning + Analytics
Machine Learning + AnalyticsSplunk
 
SplunkLive Melbourne Splunk for Operational Security Intelligence
SplunkLive Melbourne Splunk for Operational Security Intelligence SplunkLive Melbourne Splunk for Operational Security Intelligence
SplunkLive Melbourne Splunk for Operational Security Intelligence Splunk
 
Splunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-OnSplunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-OnSplunk
 
5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise Security5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise SecuritySplunk
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsGabrielle Knowles
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunk
 
SplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsSplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsGabrielle Knowles
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunk
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsGabrielle Knowles
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunk
 
SplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsSplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsSplunk
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsGabrielle Knowles
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkSplunk
 
SplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine LearningSplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine LearningTom LaGatta
 
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...Georg Knon
 
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior AnalyticsSplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior AnalyticsGabrielle Knowles
 

Ähnlich wie Splunking the Endpoint: Visibility and Security with the Universal Forwarder (20)

Deception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary MovementsDeception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary Movements
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Webinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsWebinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: Analytics
 
SplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine LearningSplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine Learning
 
Machine Learning + Analytics
Machine Learning + AnalyticsMachine Learning + Analytics
Machine Learning + Analytics
 
SplunkLive Melbourne Splunk for Operational Security Intelligence
SplunkLive Melbourne Splunk for Operational Security Intelligence SplunkLive Melbourne Splunk for Operational Security Intelligence
SplunkLive Melbourne Splunk for Operational Security Intelligence
 
Splunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-OnSplunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-On
 
5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise Security5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise Security
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & Analytics
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
 
SplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsSplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & Analytics
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & Analytics
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & Analytics
 
SplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsSplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & Analytics
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & Analytics
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk
 
SplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine LearningSplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine Learning
 
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
 
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior AnalyticsSplunkLive Melbourne Enterprise Security & User Behavior Analytics
SplunkLive Melbourne Enterprise Security & User Behavior Analytics
 

Mehr von Gabrielle Knowles

SplunkLive Sydney Enterprise Security & User Behavior Analytics
SplunkLive Sydney Enterprise Security & User Behavior AnalyticsSplunkLive Sydney Enterprise Security & User Behavior Analytics
SplunkLive Sydney Enterprise Security & User Behavior AnalyticsGabrielle Knowles
 
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...Gabrielle Knowles
 
SplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for DevelopersSplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for DevelopersGabrielle Knowles
 
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...Gabrielle Knowles
 
SplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior AnalyticsSplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior AnalyticsGabrielle Knowles
 
SplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceSplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceGabrielle Knowles
 
SplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for DevelopersSplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for DevelopersGabrielle Knowles
 
SplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior AnalyticsSplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior AnalyticsGabrielle Knowles
 
SplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service IntelligenceSplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service IntelligenceGabrielle Knowles
 
Customer Presentation - Student Job Search
Customer Presentation - Student Job SearchCustomer Presentation - Student Job Search
Customer Presentation - Student Job SearchGabrielle Knowles
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsGabrielle Knowles
 
New Features, Pivot and Search Dojo
New Features, Pivot and Search DojoNew Features, Pivot and Search Dojo
New Features, Pivot and Search DojoGabrielle Knowles
 

Mehr von Gabrielle Knowles (14)

SplunkLive Sydney Enterprise Security & User Behavior Analytics
SplunkLive Sydney Enterprise Security & User Behavior AnalyticsSplunkLive Sydney Enterprise Security & User Behavior Analytics
SplunkLive Sydney Enterprise Security & User Behavior Analytics
 
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
 
SplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for DevelopersSplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for Developers
 
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
 
SplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior AnalyticsSplunkLive Perth Enterprise Security & User Behavior Analytics
SplunkLive Perth Enterprise Security & User Behavior Analytics
 
SplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceSplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service Intelligence
 
SplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for DevelopersSplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for Developers
 
SplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior AnalyticsSplunkLive Canberra Enterprise Security & User Behavior Analytics
SplunkLive Canberra Enterprise Security & User Behavior Analytics
 
SplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service IntelligenceSplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service Intelligence
 
Getting Started with Splunk
Getting Started with SplunkGetting Started with Splunk
Getting Started with Splunk
 
Customer Presentation - Student Job Search
Customer Presentation - Student Job SearchCustomer Presentation - Student Job Search
Customer Presentation - Student Job Search
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT Operations
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
New Features, Pivot and Search Dojo
New Features, Pivot and Search DojoNew Features, Pivot and Search Dojo
New Features, Pivot and Search Dojo
 

Kürzlich hochgeladen

Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfPratikPatil591646
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfnikeshsingh56
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...Jack Cole
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelBoston Institute of Analytics
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfNicoChristianSunaryo
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformationAnnie Melnic
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etclalithasri22
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are successPratikSingh115843
 

Kürzlich hochgeladen (17)

Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdf
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdf
 
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdf
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformation
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etc
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are success
 

Splunking the Endpoint: Visibility and Security with the Universal Forwarder