{"id":1969,"date":"2021-08-05T14:44:57","date_gmt":"2021-08-05T06:44:57","guid":{"rendered":"http:\/\/10.10.10.99\/wordpress\/?post_type=product&#038;p=1969"},"modified":"2021-08-06T15:01:39","modified_gmt":"2021-08-06T07:01:39","slug":"splunk-3","status":"publish","type":"product","link":"https:\/\/www.udshk.com\/?product=splunk-3","title":{"rendered":"Splunk"},"content":{"rendered":"<p>You can correlate indicators of suspicious activity, known threats, or potential threats with your events by adding threat intelligence to Splunk Enterprise Security. Adding threat intelligence enhances your analysts&#8217; security monitoring capabilities and adds context to their investigations.<\/p>\n<p>Splunk Enterprise Security includes a selection of threat intelligence sources. Splunk Enterprise Security also supports multiple types of threat intelligence so that you can add your own threat intelligence.<\/p>\n<p>ES administrators can add threat intelligence to Splunk Enterprise Security by downloading a feed from the Internet, uploading a structured file, or inserting the threat intelligence directly from events in Splunk Enterprise Security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can correlate indicators of suspicious activity, known threats, or potential threats with your events&#8230;<\/p>\n","protected":false},"featured_media":2066,"template":"","meta":[],"product_cat":[45,42],"product_tag":[],"class_list":{"0":"post-1969","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-in-store-payment","7":"product_cat-threat-intelligence","9":"entry","10":"has-media","12":"first","13":"instock","14":"taxable","15":"shipping-taxable","16":"product-type-simple","17":"has-product-nav","18":"col","19":"span_1_of_4","20":"owp-content-center","21":"item-entry","22":"owp-thumbs-layout-horizontal","23":"owp-btn-normal","24":"owp-tabs-layout-horizontal","25":"has-no-thumbnails"},"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/product\/1969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/media\/2066"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1969"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_cat&post=1969"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fproduct_tag&post=1969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}