Configure and administer Splunk Enterprise Security
Splunk Enterprise Security uses the Splunk Platform's searching and reporting capabilities to provide the security practitioner with an overall view of their organization's security posture. Splunk Enterprise Security uses detections to provide visibility into security-relevant threats and generate findings to track identified threats. You can capture, monitor, and report on data from devices, systems, and applications across your environment.
Splunk Enterprise Security can be paired with Splunk SOAR (Cloud) to provide additional orchestration, automation, and response capabilities.
Use this manual to learn how to customize, maintain, audit, and administer Splunk Enterprise Security.
For an overview of the app and the analyst workflow, refer to the Use Splunk Enterprise Security manual.
For information on how to plan, install, deploy, upgrade, and pair Splunk Enterprise Security with other apps, refer to the Install and Upgrade Splunk Enterprise Security manual.
For information on telemetry, fixed issues, known issues, third party software credits, and so on, refer to the Splunk Enterprise Security Release Notes.
For information on troubleshooting common issues in Splunk Enterprise Security, refer to the Troubleshooting Splunk Enterprise Security manual.
Audience for this guide
The following table summarizes the various users of Splunk Enterprise Security and how they can use the information in this manual to achieve their goals:
User type or security mindset | Primary goals or administration tasks |
---|---|
Security analyst or incident response analyst |
|
SOC manager or incident response manager |
|
Threat hunter |
|
Security tools engineer |
|
Security architect |
|
Chief Information Security officer (CISO) |
|
Detection engineer |
|
Threat researcher |
|
See also
For more information on how to configure user roles in Splunk Enterprise Security, see the product documentation:
- Configure users and roles in Splunk Enterprise Security in the Install and Upgrade Splunk Enterprise Security manual.