{"id":1184,"date":"2021-07-22T04:27:44","date_gmt":"2021-07-22T04:27:44","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=1184"},"modified":"2021-09-08T10:19:55","modified_gmt":"2021-09-08T10:19:55","slug":"what-are-the-security-data-source-in-splunk","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","title":{"rendered":"What are the security data source in Splunk ?"},"content":{"rendered":"<div class=\"TextHeading\">\n<div class=\"hddn\">\n<h2 id=\"security-data-source-in-splunk\" class=\"color-purple\" style=\"text-align: justify;\">Security data source in Splunk:<\/h2>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li><b>Proxy logs :\u00a0<\/b>It\u2019s better for C2 analysis of files, domains, downloads of DLL\/EXE files.<\/li>\n<li><b>Anti\u2010virus logs :\u00a0<\/b>It\u2019s good for analysis of malware, vulnerabilities of hosts, laptops, servers, monitor for suspicious file paths.<\/li>\n<li><b>Server Operating System logs :\u00a0<\/b>These logs are good for analysis of server activities such as users, runaway services, security logs.<\/li>\n<li><b>Firewall logs :\u00a0<\/b>Logs for network traffic of source\/destination ip addresses, ports, protocols.<\/li>\n<li><b>Mail logs :\u00a0<\/b>Logs for inbound\/outbound mail for malicious links, targeted recipients, unauthorized file out bound, data loss, bad attachments.<\/li>\n<li><b>Custom apps logs :\u00a0<\/b>Logs could be analyze for possible buffer overflow, code injection, SQL injection analyses.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li><b>Intrusion Prevention System logs :\u00a0<\/b>To alert on signatures firing off, COTS signatures, threat analysis of bad network packets.<\/li>\n<li><b>Database logs :\u00a0<\/b>It\u2019s can be capture for authorized access to critical data tables, authorized logons, op ports, admin accounts.<\/li>\n<li><b>Virtual Private Network(VPN) logs :\u00a0<\/b>Capture logs to analyze users coming into network for situational awareness, monitored foreign ip subnets, compliance monitoring of browsers\/apps of connected hosts.<\/li>\n<li><b>Authentication logs :\u00a0<\/b>To monitor authorized\/unauthorized users, times of day of connection, how often, logons\/logoffs, BIOS analysis.<\/li>\n<li><b>Vulnerability Scan Data :\u00a0<\/b>Import data about assets, vulnerabilities, patch data, etc.<\/li>\n<li><b>Web Application logs :\u00a0<\/b>External facing logs to monitor suspicious SQL keywords, text patterns, REGEX for threats coming in through browser.<\/li>\n<li><b>DNS logs:\u00a0<\/b>To relate IP address what domain in a client level.<\/li>\n<li><b>DHCP logs :\u00a0<\/b>To monitor what systems are assign what IP address and how long, how often.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"ImageContent\" style=\"text-align: justify;\">\n<div class=\"hddn\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-medium\" src=\"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png\" alt=\" Security data source in Splunk\" width=\"1100\" height=\"572\" \/><\/div>\n<\/div>\n<div class=\"Content\">\n<div class=\"hddn\">\n<ul>\n<li style=\"text-align: justify;\"><b>Active Directory\/Domain Controller logs :\u00a0<\/b>Monitor user accounts for AD admins, privilege accounts, remote access, multiple admins across the domain, new account creation, event ID\u2019s.<\/li>\n<li style=\"text-align: justify;\"><b>Badge Access logs :\u00a0<\/b>Logs to capture to correlate insider threat, situational awareness, correlate data with authentication logs.<\/li>\n<li style=\"text-align: justify;\"><b>Router\/Switch data (net-\u2010flow) :\u00a0<\/b>Capture this critical data source for APT monitoring, network monitoring, data exfiltration, flow analysis are very important data source.<\/li>\n<li style=\"text-align: justify;\"><b>Packet Capture logs(PCAP):\u00a0<\/b>Very difficult data source to capture for Advanced Persistent Threats, packet analysis, deep packet inspection, malware analysis, etc.<\/li>\n<li style=\"text-align: justify;\"><b>FW + AV :\u00a0<\/b>Will help detect and respond to viruses, worm propagation.<\/li>\n<li style=\"text-align: justify;\"><b>IPS + AV + FW :\u00a0<\/b>Detect\/alert on network based attacks such as buffer overflow, reconnaissance scans, code injection.<\/li>\n<li style=\"text-align: justify;\"><b>PROXY :\u00a0<\/b>The web based\/application layer is a majority attacks to monitor like: cross-site scripting, session hacking, browse redirects.<\/li>\n<li style=\"text-align: justify;\"><b>AV + PROXY :\u00a0<\/b>Monitor\/detect\/respond to download of bad files, remote code execution\u2026web-based attacks.<\/li>\n<li style=\"text-align: justify;\"><b>FW + PROXY :\u00a0<\/b>Detect outbound data exfiltration, detect potentially misconfig fw rules.<\/li>\n<li style=\"text-align: justify;\"><b>IPS + FW :\u00a0<\/b>Network packet of signature threats to be monitored.<\/li>\n<li style=\"text-align: justify;\"><b>AD Server :\u00a0<\/b>All user\/group modifications, deletes, updates for administrators to be monitored.<\/li>\n<li style=\"text-align: justify;\"><b>AD + PROXY :\u00a0<\/b>Monitor\/Detect\/Alert on post compromise analysis, lateral movement.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Answer : Proxy logs :\u00a0It&#8217;s better for C2 analysis of files, domains, downloads of DLL\/EXE files&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8678],"tags":[195,201,1119,360,7383,203,199,2676,8706,205,2936,484,3054,196,207,202,208,367,206,8215,8687,8690,8708,8713,8710,8707,8688,8709,8712,8711,8689,200,197,2938,8705,280,364,216,8651,8704],"class_list":["post-1184","post","type-post","status-publish","format-standard","hentry","category-splunk","tag-accenture-interview-questions-and-answers","tag-allstate-solutions-pvt-ltd-interview-questions-and-answers","tag-att-interview-questions-and-answers","tag-atos-interview-questions-and-answers","tag-brillio-technologies-pvt-ltd-interview-questions-and-answers","tag-capgemini-interview-questions-and-answers","tag-casting-networks-india-pvt-limited-interview-questions-and-answers","tag-cvent-interview-questions-and-answers","tag-damco-solutions-pvt-ltd-interview-questions-and-answers","tag-dell-international-services-india-pvt-ltd-interview-questions-and-answers","tag-fis-global-business-solutions-india-pvt-ltd-interview-questions-and-answers","tag-genpact-interview-questions-and-answers","tag-globallogic-india-pvt-ltd-interview-questions-and-answers","tag-ibm-interview-questions-and-answers","tag-mphasis-interview-questions-and-answers","tag-photon-interactive-pvt-ltd-interview-questions-and-answers","tag-prokarma-softech-pvt-ltd-interview-questions-and-answers","tag-rbs-india-development-centre-pvt-ltd-interview-questions-and-answers","tag-sap-labs-india-pvt-ltd-interview-questions-and-answers","tag-sopra-steria-interview-questions-and-answers","tag-splunk-admin-interview-questions-and-answers","tag-splunk-admin-interview-questions-for-experienced","tag-splunk-data-source-assessment","tag-splunk-engineer-interview-questions","tag-splunk-enterprise-security-data-models","tag-splunk-enterprise-security-data-sources","tag-splunk-enterprise-security-interview-questions","tag-splunk-enterprise-security-release-notes","tag-splunk-enterprise-security-tutorial","tag-splunk-enterprise-security-upgrade","tag-splunk-software-engineer-interview-questions","tag-tech-mahindra-interview-questions-and-answers","tag-unitedhealth-group-interview-questions-and-answers","tag-us-technology-international-pvt-ltd-interview-questions-and-answers","tag-verizon-interview-questions-and-answers","tag-virtusa-consulting-services-pvt-ltd-interview-questions-and-answers","tag-wells-fargo-interview-questions-and-answers","tag-wipro-interview-questions-and-answers","tag-xavient-software-solutions-india-pvt-ltd-interview-questions-and-answers","tag-xinthe-technologies-interview-questions-and-answers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the security data source in Splunk ? - Splunk Interview Questions<\/title>\n<meta name=\"description\" content=\"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the security data source in Splunk ? - Splunk Interview Questions\" \/>\n<meta property=\"og:description\" content=\"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-22T04:27:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-08T10:19:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\"},\"headline\":\"What are the security data source in Splunk ?\",\"datePublished\":\"2021-07-22T04:27:44+00:00\",\"dateModified\":\"2021-09-08T10:19:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/\"},\"wordCount\":457,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.wikitechy.com\\\/interview-questions\\\/Splunk\\\/what-are-the-security-data-source-in-splunk.png\",\"keywords\":[\"Accenture interview questions and answers\",\"Allstate Solutions Pvt Ltd interview questions and answers\",\"AT&amp;T interview questions and answers\",\"Atos interview questions and answers\",\"Brillio Technologies Pvt Ltd interview questions and answers\",\"Capgemini interview questions and answers\",\"CASTING NETWORKS INDIA PVT LIMITED interview questions and answers\",\"Cvent interview questions and answers\",\"Damco Solutions Pvt Ltd interview questions and answers\",\"Dell International Services India Pvt Ltd interview questions and answers\",\"FIS Global Business Solutions India Pvt Ltd interview questions and answers\",\"Genpact interview questions and answers\",\"Globallogic India Pvt Ltd interview questions and answers\",\"IBM interview questions and answers\",\"Mphasis interview questions and answers\",\"Photon Interactive Pvt Ltd interview questions and answers\",\"Prokarma Softech Pvt Ltd interview questions and answers\",\"RBS India Development Centre Pvt Ltd interview questions and answers\",\"SAP Labs India Pvt Ltd interview questions and answers\",\"Sopra Steria interview questions and answers\",\"splunk admin interview questions and answers\",\"splunk admin interview questions for experienced\",\"splunk data source assessment\",\"splunk engineer interview questions\",\"splunk enterprise security data models\",\"splunk enterprise security data sources\",\"splunk enterprise security interview questions\",\"splunk enterprise security release notes\",\"splunk enterprise security tutorial\",\"splunk enterprise security upgrade\",\"splunk software engineer interview questions\",\"Tech Mahindra interview questions and answers\",\"UnitedHealth Group interview questions and answers\",\"US Technology International Pvt Ltd interview questions and answers\",\"Verizon interview questions and answers\",\"Virtusa Consulting Services Pvt Ltd interview questions and answers\",\"Wells Fargo interview questions and answers\",\"Wipro interview questions and answers\",\"Xavient Software Solutions India Pvt Ltd interview questions and answers\",\"Xinthe Technologies interview questions and answers\"],\"articleSection\":[\"Splunk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/\",\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/\",\"name\":\"What are the security data source in Splunk ? - Splunk Interview Questions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.wikitechy.com\\\/interview-questions\\\/Splunk\\\/what-are-the-security-data-source-in-splunk.png\",\"datePublished\":\"2021-07-22T04:27:44+00:00\",\"dateModified\":\"2021-09-08T10:19:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\"},\"description\":\"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/splunk\\\/what-are-the-security-data-source-in-splunk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.wikitechy.com\\\/interview-questions\\\/Splunk\\\/what-are-the-security-data-source-in-splunk.png\",\"contentUrl\":\"https:\\\/\\\/cdn.wikitechy.com\\\/interview-questions\\\/Splunk\\\/what-are-the-security-data-source-in-splunk.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#website\",\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/#\\\/schema\\\/person\\\/4d5a581fb5470d1560324bddc5e8b757\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\\\/\\\/www.wikitechy.com\\\/interview-questions\\\/author\\\/editor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the security data source in Splunk ? - Splunk Interview Questions","description":"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","og_locale":"en_US","og_type":"article","og_title":"What are the security data source in Splunk ? - Splunk Interview Questions","og_description":"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","og_site_name":"Wikitechy","article_published_time":"2021-07-22T04:27:44+00:00","article_modified_time":"2021-09-08T10:19:55+00:00","og_image":[{"url":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png","type":"","width":"","height":""}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#article","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/"},"author":{"name":"Editor","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"headline":"What are the security data source in Splunk ?","datePublished":"2021-07-22T04:27:44+00:00","dateModified":"2021-09-08T10:19:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/"},"wordCount":457,"commentCount":0,"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png","keywords":["Accenture interview questions and answers","Allstate Solutions Pvt Ltd interview questions and answers","AT&amp;T interview questions and answers","Atos interview questions and answers","Brillio Technologies Pvt Ltd interview questions and answers","Capgemini interview questions and answers","CASTING NETWORKS INDIA PVT LIMITED interview questions and answers","Cvent interview questions and answers","Damco Solutions Pvt Ltd interview questions and answers","Dell International Services India Pvt Ltd interview questions and answers","FIS Global Business Solutions India Pvt Ltd interview questions and answers","Genpact interview questions and answers","Globallogic India Pvt Ltd interview questions and answers","IBM interview questions and answers","Mphasis interview questions and answers","Photon Interactive Pvt Ltd interview questions and answers","Prokarma Softech Pvt Ltd interview questions and answers","RBS India Development Centre Pvt Ltd interview questions and answers","SAP Labs India Pvt Ltd interview questions and answers","Sopra Steria interview questions and answers","splunk admin interview questions and answers","splunk admin interview questions for experienced","splunk data source assessment","splunk engineer interview questions","splunk enterprise security data models","splunk enterprise security data sources","splunk enterprise security interview questions","splunk enterprise security release notes","splunk enterprise security tutorial","splunk enterprise security upgrade","splunk software engineer interview questions","Tech Mahindra interview questions and answers","UnitedHealth Group interview questions and answers","US Technology International Pvt Ltd interview questions and answers","Verizon interview questions and answers","Virtusa Consulting Services Pvt Ltd interview questions and answers","Wells Fargo interview questions and answers","Wipro interview questions and answers","Xavient Software Solutions India Pvt Ltd interview questions and answers","Xinthe Technologies interview questions and answers"],"articleSection":["Splunk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/","name":"What are the security data source in Splunk ? - Splunk Interview Questions","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage"},"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png","datePublished":"2021-07-22T04:27:44+00:00","dateModified":"2021-09-08T10:19:55+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"description":"What are the security data source in Splunk ? - splunk developer interview questions - Splunk Enterprise Security requires that all data sources comply with the Splunk","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/splunk\/what-are-the-security-data-source-in-splunk\/#primaryimage","url":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png","contentUrl":"https:\/\/cdn.wikitechy.com\/interview-questions\/Splunk\/what-are-the-security-data-source-in-splunk.png"},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/1184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=1184"}],"version-history":[{"count":3,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/1184\/revisions"}],"predecessor-version":[{"id":3005,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/1184\/revisions\/3005"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=1184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=1184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=1184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}