Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Splunk Enterprise Security

(225)4.3/5

52.0

Nps Score

Already have Splunk Enterprise Security?

All Splunk Enterprise Security Discussions

# What does Splunk Enterprise do? What does Splunk Enterprise do? ##### Post Metadata
- Posted at: almost 3 years ago - Author title: Pinned by G2 as a common question
# What is the difference between Splunk Enterprise and Splunk Enterprise Security? What is the difference between Splunk Enterprise and Splunk Enterprise Security? ##### Post Metadata
- Posted at: over 3 years ago - Author title: Pinned by G2 as a common question
# Which Splunk app is used for enterprise security? Which Splunk app is used for enterprise security? ##### Post Metadata
- Posted at: over 3 years ago - Author title: Pinned by G2 as a common question
# What is Splunk Enterprise Security? What is Splunk Enterprise Security? ##### Post Metadata
- Posted at: almost 4 years ago - Author title: Pinned by G2 as a common question
# Does anyone has like a proper process to achieve CIM compliance once you have been running for a while and have a gigantic variety of logs? When you get introduced to a new Splunk instance, it may have many logs you won't recognize, so you need to sample them and get a grasp of what is where, I haven't found a standard on how to achieve this. ##### Post Metadata
- Posted at: almost 5 years ago
- Net upvotes: 1
# "Splunk Enterprise Security Hello Team, I am confused about SA , DA or TA as given in doc . "Splunk Enterprise Security The Splunk Enterprise Security package includes a set of add-ons. The add-ons that include "SA-" or "DA-" in the name make up the Splunk Enterprise Security framework. You do not need to take any additional action to deploy or configure these add-ons, because their installation and setup is handled as part of the Splunk Enterprise Security installation process. Do not disable any add-ons that make up the Splunk Enterprise Security framework. The rest of the add-ons include "TA-" in the name and are technology-specific and provide the CIM-compliant knowledge necessary to incorporate that source data into Enterprise Security. ##### Post Metadata
- Posted at: about 6 years ago
- Net upvotes: 1
# How can we increase the search functionality in a better way Since the search functionality is very slow comparatively ##### Post Metadata
- Posted at: over 5 years ago

Start a New Software Discussion

Have a software question?

Get answers from real users and experts

Start A Discussion

Product Avatar Image

Have you used Splunk Enterprise Security before?

Answer a few questions to help the Splunk Enterprise Security community

Top Contributors in Splunk Enterprise Security

1
AK

Andreas K.

Enterprise Architect

1 pt