Question 61

What is the first step when preparing to install ES?
  • Question 62

    Which of the following would allow an add-on to be automatically imported into Splunk Enterprise Security?
  • Question 63

    The Brute Force Access Behavior Detected correlation search is enabled, and is generating many false positives. Assuming the input data has already been validated. How can the correlation search be made less sensitive?
  • Question 64

    A set of correlation searches are enabled at a new ES installation, and results are being monitored. One of the correlation searches is generating many notable events which, when evaluated, are determined to be false positives.
    What is a solution for this issue?
  • Question 65

    What does the risk framework add to an object (user, server or other type) to indicate increased risk?