Thanks for the video, useful stuff for analysing proxy logs. Since this video was 2 years ago, do you have any additional splunk searches that you use? I am looking to build a list of splunk searches for proxy traffic. I really like splunk's ability to transform raw data into effective and meaningful results with all the stats. It can be very powerful when utilised to its full potential.
Great information. I appreciate your efforts. No much information available on this subject. can you please do more videos on threat hunting using Splunk. Thank you
Good video. No much material on this stuff. I'm interested to see ways POST. Using this SPL +-5 mins of an event will layout a nice table surfing the web and getting redirected. | table _time, category, method, result, host(domain), referer, url
Thanks for the video, useful stuff for analysing proxy logs. Since this video was 2 years ago, do you have any additional splunk searches that you use? I am looking to build a list of splunk searches for proxy traffic. I really like splunk's ability to transform raw data into effective and meaningful results with all the stats. It can be very powerful when utilised to its full potential.
Great information. I appreciate your efforts. No much information available on this subject. can you please do more videos on threat hunting using Splunk. Thank you
Quality video.... appreciated much
Can you post more videos related security
Your wish is my command! Jokes apart, I am working on getting some cool stuff for security. Pretty soon, we will have good collection!
Good video. No much material on this stuff. I'm interested to see ways POST. Using this SPL +-5 mins of an event will layout a nice table surfing the web and getting redirected.
| table _time, category, method, result, host(domain), referer, url
Can you share those query in text?