This document provides an overview of security analytics methods available in the Splunk Security Essentials app. It begins with an introduction and agenda for the presentation. It then discusses key concepts in security analytics like different implementation approaches, and common challenges. The document provides an overview of the Splunk Security Essentials app, highlighting the many pre-built searches and analytics methods available out of the box. It demos several example searches in the app, including searches for suspicious file concentrations, authentication against new systems, and detecting spikes or anomalies in time series data. Finally, it discusses how these searches and analytics could be applied to analyze a hypothetical scenario involving a malicious insider.