Discover many of the detected elements, methods, processes, etc. of an attack and develop a timeline of how the attacker gained initial access: Intrusion Detection With Splunk-> Finding the Source of ...
This TA maintains a lookup table containing the IEEE OUI reference table. It provides macros for Splunk to be use at search-time to lookup the organizationally-unique identifier (OUI) portion of a ...