Splunk Attack Range: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Created via script) |
(Updated description via script) Tag: Reverted |
||
Line 1: | Line 1: | ||
=Description= | =Description=<br> | ||
<br> | The Splunk Attack Range is a free and open source tool that allows users to create and manage security simulations within their Splunk instance. With this tool, security analysts can define various attack scenarios and then monitor and analyze the data generated from these simulations. This allow users to identify potential security issues and gaps in their Splunk instance, and then take corrective action to mitigate these risks.=More Information= | ||
The Splunk Attack Range is a free and open source tool that allows users to create and manage security simulations within their Splunk instance. With this tool, security analysts can define various attack scenarios and then monitor and analyze the data generated from these simulations. This allow users to identify potential security issues and gaps in their Splunk instance, and then take corrective action to mitigate these risks. | |||
=More Information= | |||
<br> | <br> | ||
https://github.com/splunk/attack_range | https://github.com/splunk/attack_range |
Revision as of 04:50, 23 April 2024
=Description=
The Splunk Attack Range is a free and open source tool that allows users to create and manage security simulations within their Splunk instance. With this tool, security analysts can define various attack scenarios and then monitor and analyze the data generated from these simulations. This allow users to identify potential security issues and gaps in their Splunk instance, and then take corrective action to mitigate these risks.=More Information=
https://github.com/splunk/attack_range