Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Overview
Explore
Expertise

Select a tab

1 result found

Basic SIEM Setup and Log Collection using Splunk

In this module, Samantha, a developing SOC analyst, focuses on the foundational steps of setting up a SIEM system using Splunk. With guidance from her senior SOC analyst, she configures log forwarders on both Ubuntu and Windows machines, ensuring real-time log ingestion into the Splunk server. Samantha generates and simulates login events, allowing her to analyze critical logs such as successful and failed login attempts. By completing this module, Samantha will establish a functional SIEM setup, gaining visibility into system logs that are crucial for detecting and responding to potential security incidents.
Foundations Lab
•Fundamentals
•316 launches

Splunk

Splunk makes machine data accessible across an organization by identifying data patterns, providing metrics, diagnosing problems, and providing intelligence for business operations.

77 Followers

At a glance

35Total
14Videos
13Blogs
4Articles
2WWT Research
1Lab
1Playlist
What's related
  • Cisco
  • AI & Data
  • Cisco AI Solutions
  • Security
  • Automation
  • Observability & AIOps
  • Cisco Secure AI Factory with NVIDIA
  • AI Security
  • Cisco UCS
  • High-Performance Architecture (HPA)
  • Networking
  • ThousandEyes
  • ATC
  • AI Proving Ground Podcast
  • Data Center Networking
  • AI Proving Ground
  • Blog
  • Cisco AI Defense
  • Applied AI
  • WWT Presents

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies