Welcome to the Splunk for Security Investigation Experience. In this third video, we continue our investigation and use visual drill downs to examine specific activities between targeted hosts and compromised workstations. Watch the video, then try it yourself by following these instructions with this online Splunk instance pre-loaded with security data. Already using Splunk? Download the Getting Started with Splunk Security App, to get demo data and follow along with the scenarios.