Tag: Splunk Soar

Latest Articles

How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security
Security
3 Minute Read

How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security

We worked with Peerspot to capture some of the ways customers have found success while using Splunk SOAR as part of their security stack.
Process Hunting with PSTree
Security
5 Minute Read

Process Hunting with PSTree

This tutorial shows how to use the pstree command & app to help you look through all the processes you have to investigate.
Reduce Operational Complexity with Splunk SOAR Logic Loops
Security
2 Minute Read

Reduce Operational Complexity with Splunk SOAR Logic Loops

Learn about the logic loops feature introduced in Splunk SOAR version 6.2 and how you can implement them in your own use cases and playbooks.
SOARing High for M-21-31
Industries
2 Minute Read

SOARing High for M-21-31

Explore three key considerations when implementing logging orchestration, automation, and response for OMB M-21-31.
Splunk Wins Awards for SIEM, SOAR and More
Security
1 Minute Read

Splunk Wins Awards for SIEM, SOAR and More

Splunk wins four PeerSpot Tech Leader awards in the SIEM and SOAR categories. A special thanks goes out to all the reviewers who shared their Splunk experience.
Splunk SOAR Playbook of the Month: Investigations with Playbooks
Security
2 Minute Read

Splunk SOAR Playbook of the Month: Investigations with Playbooks

For this month’s edition of Playbook of the Month, we’ll look at how you can perform investigations at machine speed using Splunk SOAR and one of our investigation playbooks, Internal Host WinRM Investigate.
Eliminate Manual Threat Analysis of Credential Phishing & Malware Threats with Splunk Attack Analyzer
.conf & .conf Go
2 Minute Read

Eliminate Manual Threat Analysis of Credential Phishing & Malware Threats with Splunk Attack Analyzer

Introducing a new addition to the Splunk unified security operations experience: Splunk Attack Analyzer (formerly Twinwave), which automates threat analysis of suspected malware or credential phishing threats.
Splunk SOAR Playbook of the Month: Threat Hunting with Playbooks
Security
2 Minute Read

Splunk SOAR Playbook of the Month: Threat Hunting with Playbooks

For this month’s edition of Playbook of the Month, we’ll look at how you can use Splunk SOAR’s Hunting playbook to perform threat hunting activities at machine speed.
From Registry With Love: Malware Registry Abuses
Security
13 Minute Read

From Registry With Love: Malware Registry Abuses

The Splunk Threat Research Team explores the common Windows Registry abuses leveraged by current and relevant malware families in the wild and how to detect them.
/en_us/blog/fragments/subscribe-footer