Security Investigation with Splunk
In this exercise, I investigated failed authentication attempts with Splunk to detect potential threat actors attempting to gain access to the environment.
This exercise is divided into three parts: Detection, Validation, and Scoping.
I found this re...
bolanta.hashnode.dev7 min read