Which argument to the | tstats command restricts the search to summarized data only?
What does the risk framework add to an object (user, server or other type) to indicate increased risk?
Analysts have requested the ability to capture and analyze network traffic data. The administrator has researched the documentation and, based on this research, has decided to integrate the Splunk App for Stream with ES.
Which dashboards will now be supported so analysts can view and analyze network Stream data?
When creating custom correlation searches, what format is used to embed field values in the title, description, and drill-down fields of a notable event?
Which setting is used in indexes.conf to specify alternate locations for accelerated storage?
What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?
Which of the following steps will make the Threat Activity dashboard the default landing page in ES?
Which lookup table does the Default Account Activity Detected correlation search use to flag known default accounts?
Which columns in the Assets lookup are used to identify an asset in an event?
Which of the following are the default ports that must be configured for Splunk Enterprise Security to function?
Which correlation search feature is used to throttle the creation of notable events?
How is it possible to navigate to the list of currently-enabled ES correlation searches?
The Brute Force Access Behavior Detected correlation search is enabled, and is generating many false positives. Assuming the input data has already been validated. How can the correlation search be made less sensitive?
ES apps and add-ons from $SPLUNK_HOME/etc/apps should be copied from the staging instance to what location on the cluster deployer instance?
Which of the following are data models used by ES? (Choose all that apply)