Baric's knowledge Base
Ctrlk
  • Baric
  • Security Programs
    • OSINT
    • Security FrameWorks
    • Threat Hunting
    • Shells
    • Reverse Engineering
    • Phishing
    • Browser Tools
    • Mobile
    • Audit and Scanners
    • Windows
    • Bug Bounty
    • Privacy
    • Useful Online Links
    • Spiders and Scrapers
    • Command and Control
    • HoneyPots
  • Development
    • BOF and Coff Executers
    • Code Scanners
    • Databases
    • Docker
    • API and Scraping Sources
    • Microsoft KQL
    • AD PS Commands
    • HomeLab
    • Compliance
    • Siems and EDR
      • Splunk
        • Splunk forwarder
        • Data / Searches
        • Resources
          • Detecting Business Email Compromise Using Splunk
          • Install Splunk AI Assistant for SPL
          • Open-source detection rules like SigmaRules and Splunk ESCU rules
          • Splunk research Detection, Analytics Playbooks and stats
          • Teams Detailed activity properties in the audit log
          • Accelerating Security Operations with Splunk and Foundation AI’s First Open-Source Security Model
          • (Github) Splunk Server resource
        • Splunkbase Apps
        • Splunk Deployment Server
        • Splunk Soar
        • Splunk Python scripting
        • Enterprise Security App
        • Server Health
        • Server Config
      • Wazuh
      • Gravwell
      • OpenEDR
      • Data for SIEM
    • Graphing Tools
    • Website Dev
    • Lanuages
    • GitHub
    • Gaming
    • Cursor AI code editor
    • IOS jailbreaking
  • IT Help
    • Windows
    • Mobile
    • Programs
    • Networking
    • Resume tools
  • Security Education
    • Monthly Security topics Outline
    • Do not call number spam
    • Games
    • Sec News
    • Online Learning
    • Comics
    • Communities
    • Videos
Powered by GitBook
On this page
  1. Development
  2. Siems and EDR
  3. Splunk

Resources

Detecting Business Email Compromise Using SplunkInstall Splunk AI Assistant for SPLOpen-source detection rules like SigmaRules and Splunk ESCU rulesSplunk research Detection, Analytics Playbooks and statsTeams Detailed activity properties in the audit logAccelerating Security Operations with Splunk and Foundation AI’s First Open-Source Security Model(Github) Splunk Server resource
PreviousExport Splunk results to CSV fileNextDetecting Business Email Compromise Using Splunk