Question 61
What is the first step when preparing to install ES?
Question 62
Which of the following would allow an add-on to be automatically imported into Splunk Enterprise Security?
Question 63
The Brute Force Access Behavior Detected correlation search is enabled, and is generating many false positives. Assuming the input data has already been validated. How can the correlation search be made less sensitive?
Question 64
A set of correlation searches are enabled at a new ES installation, and results are being monitored. One of the correlation searches is generating many notable events which, when evaluated, are determined to be false positives.
What is a solution for this issue?
What is a solution for this issue?
Question 65
What does the risk framework add to an object (user, server or other type) to indicate increased risk?