A set of correlation searches are enabled at a new ES installation, and results are being monitored. One of the correlation searches is generating many notable events which, when evaluated, are determined to be false positives.
What is a solution for this issue?
An administrator is asked to configure an “Nslookup” adaptive response action, so that it appears as a selectable option in the notable event’s action menu when an analyst is working in the Incident Review dashboard. What steps would the administrator take to configure this option?
An administrator wants to ensure that none of the ES indexed data could be compromised through tampering. What feature would satisfy this requirement?
After data is ingested, which data management step is essential to ensure raw data can be accelerated by a Data Model and used by ES?
Which of the following steps will make the Threat Activity dashboard the default landing page in ES?
Which of the following are examples of sources for events in the endpoint security domain dashboards?
“10.22.63.159”, “websvr4”, and “00:26:08:18: CF:1D” would be matched against what in ES?
Analysts have requested the ability to capture and analyze network traffic data. The administrator has researched the documentation and, based on this research, has decided to integrate the Splunk App for Stream with ES.
Which dashboards will now be supported so analysts can view and analyze network Stream data?
Which of the following threat intelligence types can ES download? (Choose all that apply)
A newly built custom dashboard needs to be available to a team of security analysts In ES. How is It possible to Integrate the new dashboard?
If a username does not match the ‘identity’ column in the identities list, which column is checked next?
What role should be assigned to a security team member who will be taking ownership of notable events in the incident review dashboard?
Glass tables can display static images and text, the results of ad-hoc searches, and which of the following objects?
A security manager has been working with the executive team en long-range security goals. A primary goal for the team Is to Improve managing user risk in the organization. Which of the following ES features can help identify users accessing inappropriate web sites?
Which of the following is part of tuning correlation searches for a new ES installation?