Secure your configuration

If you haven't already, this is a good time to make sure that Splunk and your data are secure. Taking the proper steps to secure Splunk reduces the attack surface and mitigates the risk and impact of most vulnerabilities.

Some key actions you should take after installation:

The Securing Splunk Enterprise manual provides more information about ways you can secure Splunk. Including a checklist for hardening your configuration. See Securing Splunk Enterprise for more information.