From the course: Splunk for Security Analytics and Monitoring

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Configuring Snort IDS alerts for Splunk

Configuring Snort IDS alerts for Splunk - Splunk Tutorial

From the course: Splunk for Security Analytics and Monitoring

Configuring Snort IDS alerts for Splunk

- [Instructor] We all know how important security monitoring has become with our IT environments. Think about your network. Do you have security appliances deployed, perhaps on the network perimeter? Or do you have security solutions that are hardware-based or maybe software, agent-based running on servers? Do you have some kind of security software running on endpoint devices including malware detection? The answer is probably, yes to some if not all of those questions. Well, let's say that we have a situation where we've got a Linux server that is using the free open source Snort Intrusion Detection System to detect suspicious activity on the network and on that host. What we want to do is we want to take that alert information from that intrusion detection sensor and have it sent to Splunk Enterprise to be indexed. That's what we're going to do. So here, we've got a Linux host, it's Ubuntu Linux. The first order of…

Contents