<br />
<b>Warning</b>:  Undefined array key "global_protection_id" in <b>/home/wikitechy/public_html/interview-questions/wp-content/plugins/content-protector/inc/class-ps-rest-handler.php</b> on line <b>51</b><br />
{"id":1184,"date":"2021-07-22T04:27:44","date_gmt":"2021-07-22T04:27:44","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=1184"},"modified":"2021-09-08T10:19:55","modified_gmt":"2021-09-08T10:19:55","slug":"what-are-the-security-data-source-in-splunk","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","title":{"rendered":"What are the security data source in Splunk ?"},"content":{"rendered":"<div class=\"TextHeading\">\n<div class=\"hddn\">\n<h2 id=\"security-data-source-in-splunk\" class=\"color-purple\" style=\"text-align: justify;\">Security data source in Splunk:<\/h2>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li><b>Proxy logs :\u00a0<\/b>It&#8217;s better for C2 analysis of files, domains, downloads of DLL\/EXE files.<\/li>\n<li><b>Anti\u2010virus logs :\u00a0<\/b>It&#8217;s good for analysis of malware, vulnerabilities of hosts, laptops, servers, monitor for suspicious file paths.<\/li>\n<li><b>Server Operating System logs :\u00a0<\/b>These logs are good for analysis of server activities such as users, runaway services, security logs.<\/li>\n<li><b>Firewall logs :\u00a0<\/b>Logs for network traffic of source\/destination ip addresses, ports, protocols.<\/li>\n<li><b>Mail logs :\u00a0<\/b>Logs for inbound\/outbound mail for malicious links, targeted recipients, unauthorized file out bound, data loss, bad attachments.<\/li>\n<li><b>Custom apps logs :\u00a0<\/b>Logs could be analyze for possible buffer overflow, code injection, SQL injection analyses.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li><b>Intrusion Prevention System logs :\u00a0<\/b>To alert on signatures firing off, COTS signatures, threat analysis of bad network packets.<\/li>\n<li><b>Database logs :\u00a0<\/b>It&#8217;s can be capture for authorized access to critical data tables, authorized logons, op ports, admin accounts.<\/li>\n<li><b>Virtual Private Network(VPN) logs :\u00a0<\/b>Capture logs to analyze users coming into network for situational awareness, monitored foreign ip subnets, compliance monitoring of browsers\/apps of connected hosts.<\/li>\n<li><b>Authentication logs :\u00a0<\/b>To monitor authorized\/unauthorized users, times of day of connection, how often, logons\/logoffs, BIOS analysis.<\/li>\n<li><b>Vulnerability Scan Data :\u00a0<\/b>Import data about assets, vulnerabilities, patch data, etc.<\/li>\n<li><b>Web Application logs :\u00a0<\/b>External facing logs to monitor suspicious SQL keywords, text patterns, REGEX for threats coming in through browser.<\/li>\n<li><b>DNS logs:\u00a0<\/b>To relate IP address what domain in a client level.<\/li>\n<li><b>DHCP logs :\u00a0<\/b>To monitor what systems are assign what IP address and how long, how often.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"ImageContent\" style=\"text-align: justify;\">\n<div class=\"hddn\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-medium\" src=\"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png\" alt=\" Security data source in Splunk\" width=\"1100\" height=\"572\" \/><\/div>\n<\/div>\n<div class=\"Content\">\n<div class=\"hddn\">\n<ul>\n<li style=\"text-align: justify;\"><b>Active Directory\/Domain Controller logs :\u00a0<\/b>Monitor user accounts for AD admins, privilege accounts, remote access, multiple admins across the domain, new account creation, event ID&#8217;s.<\/li>\n<li style=\"text-align: justify;\"><b>Badge Access logs :\u00a0<\/b>Logs to capture to correlate insider threat, situational awareness, correlate data with authentication logs.<\/li>\n<li style=\"text-align: justify;\"><b>Router\/Switch data (net-\u2010flow) :\u00a0<\/b>Capture this critical data source for APT monitoring, network monitoring, data exfiltration, flow analysis are very important data source.<\/li>\n<li style=\"text-align: justify;\"><b>Packet Capture logs(PCAP):\u00a0<\/b>Very difficult data source to capture for Advanced Persistent Threats, packet analysis, deep packet inspection, malware analysis, etc.<\/li>\n<li style=\"text-align: justify;\"><b>FW + AV :\u00a0<\/b>Will help detect and respond to viruses, worm propagation.<\/li>\n<li style=\"text-align: justify;\"><b>IPS + AV + FW :\u00a0<\/b>Detect\/alert on network based attacks such as buffer overflow, reconnaissance scans, code injection.<\/li>\n<li style=\"text-align: justify;\"><b>PROXY :\u00a0<\/b>The web based\/application layer is a majority attacks to monitor like: cross-site scripting, session hacking, browse redirects.<\/li>\n<li style=\"text-align: justify;\"><b>AV + PROXY :\u00a0<\/b>Monitor\/detect\/respond to download of bad files, remote code execution\u2026web-based attacks.<\/li>\n<li style=\"text-align: justify;\"><b>FW + PROXY :\u00a0<\/b>Detect outbound data exfiltration, detect potentially misconfig fw rules.<\/li>\n<li style=\"text-align: justify;\"><b>IPS + FW :\u00a0<\/b>Network packet of signature threats to be monitored.<\/li>\n<li style=\"text-align: justify;\"><b>AD Server :\u00a0<\/b>All user\/group modifications, deletes, updates for administrators to be monitored.<\/li>\n<li style=\"text-align: justify;\"><b>AD + PROXY :\u00a0<\/b>Monitor\/Detect\/Alert on post compromise analysis, lateral movement.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Answer : Proxy logs :\u00a0It&#8217;s better for C2 analysis of files, domains, downloads of DLL\/EXE files&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"passster_activate_protection":false,"passster_protect_child_pages":"","passster_protection_type":"password","passster_password":"","passster_activate_overwrite_defaults":"","passster_headline":"","passster_instruction":"","passster_placeholder":"","passster_button":"","passster_id":"","passster_activate_misc_settings":"","passster_redirect_url":"","passster_hide":"no","passster_area_shortcode":"","gtb_hide_title":false,"gtb_wrap_title":false,"gtb_class_title":"","gtb_remove_headerfooter":false,"footnotes":""},"categories":[8678],"tags":[195,201,1119,360,7383,203,199,2676,8706,205,2936,484,3054,196,207,202,208,367,206,8215,8687,8690,8708,8713,8710,8707,8688,8709,8712,8711,8689,200,197,2938,8705,280,364,216,8651,8704],"class_list":["post-1184","post","type-post","status-publish","format-standard","hentry","category-splunk","tag-accenture-interview-questions-and-answers","tag-allstate-solutions-pvt-ltd-interview-questions-and-answers","tag-att-interview-questions-and-answers","tag-atos-interview-questions-and-answers","tag-brillio-technologies-pvt-ltd-interview-questions-and-answers","tag-capgemini-interview-questions-and-answers","tag-casting-networks-india-pvt-limited-interview-questions-and-answers","tag-cvent-interview-questions-and-answers","tag-damco-solutions-pvt-ltd-interview-questions-and-answers","tag-dell-international-services-india-pvt-ltd-interview-questions-and-answers","tag-fis-global-business-solutions-india-pvt-ltd-interview-questions-and-answers","tag-genpact-interview-questions-and-answers","tag-globallogic-india-pvt-ltd-interview-questions-and-answers","tag-ibm-interview-questions-and-answers","tag-mphasis-interview-questions-and-answers","tag-photon-interactive-pvt-ltd-interview-questions-and-answers","tag-prokarma-softech-pvt-ltd-interview-questions-and-answers","tag-rbs-india-development-centre-pvt-ltd-interview-questions-and-answers","tag-sap-labs-india-pvt-ltd-interview-questions-and-answers","tag-sopra-steria-interview-questions-and-answers","tag-splunk-admin-interview-questions-and-answers","tag-splunk-admin-interview-questions-for-experienced","tag-splunk-data-source-assessment","tag-splunk-engineer-interview-questions","tag-splunk-enterprise-security-data-models","tag-splunk-enterprise-security-data-sources","tag-splunk-enterprise-security-interview-questions","tag-splunk-enterprise-security-release-notes","tag-splunk-enterprise-security-tutorial","tag-splunk-enterprise-security-upgrade","tag-splunk-software-engineer-interview-questions","tag-tech-mahindra-interview-questions-and-answers","tag-unitedhealth-group-interview-questions-and-answers","tag-us-technology-international-pvt-ltd-interview-questions-and-answers","tag-verizon-interview-questions-and-answers","tag-virtusa-consulting-services-pvt-ltd-interview-questions-and-answers","tag-wells-fargo-interview-questions-and-answers","tag-wipro-interview-questions-and-answers","tag-xavient-software-solutions-india-pvt-ltd-interview-questions-and-answers","tag-xinthe-technologies-interview-questions-and-answers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are the security data source in Splunk ? - Splunk Interview Questions<\/title>\n<meta name=\"description\" content=\"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the security data source in Splunk ? - Splunk Interview Questions\" \/>\n<meta property=\"og:description\" content=\"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-22T04:27:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-08T10:19:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/\",\"name\":\"What are the security data source in Splunk ? - Splunk Interview Questions\",\"isPartOf\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png\",\"datePublished\":\"2021-07-22T04:27:44+00:00\",\"dateModified\":\"2021-09-08T10:19:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757\"},\"description\":\"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage\",\"url\":\"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png\",\"contentUrl\":\"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the security data source in Splunk ? - Splunk Interview Questions","description":"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","og_locale":"en_US","og_type":"article","og_title":"What are the security data source in Splunk ? - Splunk Interview Questions","og_description":"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","og_site_name":"Wikitechy","article_published_time":"2021-07-22T04:27:44+00:00","article_modified_time":"2021-09-08T10:19:55+00:00","og_image":[{"url":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","name":"What are the security data source in Splunk ? - Splunk Interview Questions","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage"},"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png","datePublished":"2021-07-22T04:27:44+00:00","dateModified":"2021-09-08T10:19:55+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"description":"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage","url":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png","contentUrl":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png"},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/1184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=1184"}],"version-history":[{"count":3,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/1184\/revisions"}],"predecessor-version":[{"id":3005,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/1184\/revisions\/3005"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=1184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=1184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=1184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}