Hundreds of security teams use this app to process CIM compliant DNS, IP, HTTP, TLS, and DHCP events within Splunk and flag compromised hosts. Use Network Behavior Analytics for Splunk to instantly uncover DNS and ICMP tunnels, DGA traffic, C2 callbacks and implant beaconing, data exfiltration, Tor and I2P anonymizing circuit activity, cryptomining, and threats without known signatures or indicators.
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources