<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>splunk enterprise security data sources - Wikitechy</title>
	<atom:link href="https://www.wikitechy.com/interview-questions/tag/splunk-enterprise-security-data-sources/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wikitechy.com/interview-questions/tag/splunk-enterprise-security-data-sources/</link>
	<description>Interview Questions</description>
	<lastBuildDate>Wed, 08 Sep 2021 10:19:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://www.wikitechy.com/interview-questions/wp-content/uploads/2025/10/cropped-wikitechy-icon-32x32.png</url>
	<title>splunk enterprise security data sources - Wikitechy</title>
	<link>https://www.wikitechy.com/interview-questions/tag/splunk-enterprise-security-data-sources/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What are the security data source in Splunk ?</title>
		<link>https://www.wikitechy.com/interview-questions/splunk/what-are-the-security-data-source-in-splunk/</link>
					<comments>https://www.wikitechy.com/interview-questions/splunk/what-are-the-security-data-source-in-splunk/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Thu, 22 Jul 2021 04:27:44 +0000</pubDate>
				<category><![CDATA[Splunk]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[AT&T interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Brillio Technologies Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Cvent interview questions and answers]]></category>
		<category><![CDATA[Damco Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[FIS Global Business Solutions India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Genpact interview questions and answers]]></category>
		<category><![CDATA[Globallogic India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[Photon Interactive Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Prokarma Softech Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Sopra Steria interview questions and answers]]></category>
		<category><![CDATA[splunk admin interview questions and answers]]></category>
		<category><![CDATA[splunk admin interview questions for experienced]]></category>
		<category><![CDATA[splunk data source assessment]]></category>
		<category><![CDATA[splunk engineer interview questions]]></category>
		<category><![CDATA[splunk enterprise security data models]]></category>
		<category><![CDATA[splunk enterprise security data sources]]></category>
		<category><![CDATA[splunk enterprise security interview questions]]></category>
		<category><![CDATA[splunk enterprise security release notes]]></category>
		<category><![CDATA[splunk enterprise security tutorial]]></category>
		<category><![CDATA[splunk enterprise security upgrade]]></category>
		<category><![CDATA[splunk software engineer interview questions]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[US Technology International Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Verizon interview questions and answers]]></category>
		<category><![CDATA[Virtusa Consulting Services Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Wells Fargo interview questions and answers]]></category>
		<category><![CDATA[Wipro interview questions and answers]]></category>
		<category><![CDATA[Xavient Software Solutions India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Xinthe Technologies interview questions and answers]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=1184</guid>

					<description><![CDATA[Answer : Proxy logs : It's better for C2 analysis of files, domains, downloads of DLL/EXE files...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="security-data-source-in-splunk" class="color-purple" style="text-align: justify;">Security data source in Splunk:</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><b>Proxy logs : </b>It&#8217;s better for C2 analysis of files, domains, downloads of DLL/EXE files.</li>
<li><b>Anti‐virus logs : </b>It&#8217;s good for analysis of malware, vulnerabilities of hosts, laptops, servers, monitor for suspicious file paths.</li>
<li><b>Server Operating System logs : </b>These logs are good for analysis of server activities such as users, runaway services, security logs.</li>
<li><b>Firewall logs : </b>Logs for network traffic of source/destination ip addresses, ports, protocols.</li>
<li><b>Mail logs : </b>Logs for inbound/outbound mail for malicious links, targeted recipients, unauthorized file out bound, data loss, bad attachments.</li>
<li><b>Custom apps logs : </b>Logs could be analyze for possible buffer overflow, code injection, SQL injection analyses.</li>
</ul>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><b>Intrusion Prevention System logs : </b>To alert on signatures firing off, COTS signatures, threat analysis of bad network packets.</li>
<li><b>Database logs : </b>It&#8217;s can be capture for authorized access to critical data tables, authorized logons, op ports, admin accounts.</li>
<li><b>Virtual Private Network(VPN) logs : </b>Capture logs to analyze users coming into network for situational awareness, monitored foreign ip subnets, compliance monitoring of browsers/apps of connected hosts.</li>
<li><b>Authentication logs : </b>To monitor authorized/unauthorized users, times of day of connection, how often, logons/logoffs, BIOS analysis.</li>
<li><b>Vulnerability Scan Data : </b>Import data about assets, vulnerabilities, patch data, etc.</li>
<li><b>Web Application logs : </b>External facing logs to monitor suspicious SQL keywords, text patterns, REGEX for threats coming in through browser.</li>
<li><b>DNS logs: </b>To relate IP address what domain in a client level.</li>
<li><b>DHCP logs : </b>To monitor what systems are assign what IP address and how long, how often.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img fetchpriority="high" decoding="async" class="aligncenter size-medium" src="https://cdn.wikitechy.com/interview-questions/Splunk/what-are-the-security-data-source-in-splunk.png" alt=" Security data source in Splunk" width="1100" height="572" /></div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;"><b>Active Directory/Domain Controller logs : </b>Monitor user accounts for AD admins, privilege accounts, remote access, multiple admins across the domain, new account creation, event ID&#8217;s.</li>
<li style="text-align: justify;"><b>Badge Access logs : </b>Logs to capture to correlate insider threat, situational awareness, correlate data with authentication logs.</li>
<li style="text-align: justify;"><b>Router/Switch data (net-‐flow) : </b>Capture this critical data source for APT monitoring, network monitoring, data exfiltration, flow analysis are very important data source.</li>
<li style="text-align: justify;"><b>Packet Capture logs(PCAP): </b>Very difficult data source to capture for Advanced Persistent Threats, packet analysis, deep packet inspection, malware analysis, etc.</li>
<li style="text-align: justify;"><b>FW + AV : </b>Will help detect and respond to viruses, worm propagation.</li>
<li style="text-align: justify;"><b>IPS + AV + FW : </b>Detect/alert on network based attacks such as buffer overflow, reconnaissance scans, code injection.</li>
<li style="text-align: justify;"><b>PROXY : </b>The web based/application layer is a majority attacks to monitor like: cross-site scripting, session hacking, browse redirects.</li>
<li style="text-align: justify;"><b>AV + PROXY : </b>Monitor/detect/respond to download of bad files, remote code execution…web-based attacks.</li>
<li style="text-align: justify;"><b>FW + PROXY : </b>Detect outbound data exfiltration, detect potentially misconfig fw rules.</li>
<li style="text-align: justify;"><b>IPS + FW : </b>Network packet of signature threats to be monitored.</li>
<li style="text-align: justify;"><b>AD Server : </b>All user/group modifications, deletes, updates for administrators to be monitored.</li>
<li style="text-align: justify;"><b>AD + PROXY : </b>Monitor/Detect/Alert on post compromise analysis, lateral movement.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/splunk/what-are-the-security-data-source-in-splunk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
