December 2014
Beginner to intermediate
344 pages
7h 34m
English
Splunk uses a typical role-based security model to provide flexible and effective ways to protect all the data indexed by Splunk, by controlling the searches and results in the presentation layer.
More creative methods of implementing access control can also be employed, such as:
More advanced methods of implementing access control are field encryptions, searching exclusion, ...
Read now
Unlock full access