{"id":1818,"date":"2019-05-22T10:00:47","date_gmt":"2019-05-22T05:30:47","guid":{"rendered":"https:\/\/www.apk.co.ir\/video\/?p=1818"},"modified":"2019-07-15T09:38:55","modified_gmt":"2019-07-15T05:08:55","slug":"splunk-enterprise-security-investigation-workbench","status":"publish","type":"post","link":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-investigation-workbench\/","title":{"rendered":"\u0648\u06cc\u062f\u0626\u0648\u06cc \u0645\u0639\u0631\u0641\u06cc \u0642\u0627\u0628\u0644\u06cc\u062a Investigation Workbench \u062f\u0631 \u0631\u0627\u0647\u06a9\u0627\u0631 Splunk ES"},"content":{"rendered":"\n
\u0642\u0627\u0628\u0644\u06cc\u062a Investigation Workbench<\/a> \u06cc\u0627 \u0647\u0645\u0627\u0646 \u06a9\u0627\u0631\u06af\u0627\u0647 \u062a\u062d\u0642\u06cc\u0642 \u0648 \u0628\u0631\u0631\u0633\u06cc \u062f\u0631 \u0631\u0627\u0647\u06a9\u0627\u0631 Splunk Enterprise Security<\/a> \u0628\u0631\u0627\u06cc \u062a\u062d\u0644\u06cc\u0644\u06af\u0631\u0627\u0646\u06cc \u06a9\u0647 \u06a9\u0627\u0631\u0634\u0627\u0646 \u062a\u062d\u0642\u06cc\u0642\u200c \u0648\u200c \u0628\u0631\u0631\u0633\u06cc \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647\u200c\u06cc \u062d\u0648\u0627\u062f\u062b \u0627\u0633\u062a \u0648 \u06a9\u0627\u0647\u0634 \u0632\u0645\u0627\u0646 \u0628\u0631\u0631\u0633\u06cc \u0648 \u067e\u0627\u0633\u062e \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u06a9\u0627\u0631\u0627\u0645\u062f\u06cc \u0641\u0631\u0627\u06cc\u0646\u062f\u200c\u0647\u0627\u06cc \u067e\u0627\u0633\u062e \u0628\u0647 \u062d\u0648\u0627\u062f\u062b\u060c \u0628\u0631\u0627\u06cc \u0622\u0646\u200c\u0647\u0627 \u0627\u0645\u0631\u06cc \u0628\u0633\u06cc\u0627\u0631 \u062d\u06cc\u0627\u062a\u06cc \u0627\u0633\u062a\u060c \u0628\u0633\u06cc\u0627\u0631 \u0645\u0641\u06cc\u062f \u0645\u06cc\u200c\u0628\u0627\u0634\u062f.<\/p>\n\n\n\n \u062f\u0631 \u0627\u06cc\u0646 \u0648\u06cc\u062f\u0626\u0648 \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u06cc\u0646 \u0648\u06cc\u0698\u06af\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u062a\u0639\u0644\u0642 \u0628\u0647 Splunk \u0635\u062d\u0628\u062a \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u062a\u062d\u0644\u06cc\u0644\u06af\u0631\u0627\u0646 \u0627\u06cc\u0646 \u062a\u0648\u0627\u0646\u0627\u06cc\u06cc \u0631\u0627 \u0628\u062f\u0647\u062f \u06a9\u0647 \u062a\u062d\u0642\u06cc\u0642 \u0648 \u0628\u0631\u0631\u0633\u06cc\u200c\u0647\u0627\u06cc \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u062d\u0648\u0627\u062f\u062b \u0631\u0627 \u062a\u0633\u0647\u06cc\u0644 \u0646\u0645\u0627\u06cc\u0646\u062f\u060c \u0632\u0645\u0627\u0646 \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u200c\u06cc\u0627\u0628\u06cc \u0628\u0647 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u0645\u062a\u0646\u06cc \u0648 \u0645\u062d\u062a\u0648\u0627\u06cc\u06cc (Contextual) \u0631\u0627 \u06a9\u0627\u0647\u0634 \u062f\u0647\u0646\u062f \u0648 \u067e\u0627\u0633\u062e \u0628\u0647 \u062d\u0648\u0627\u062f\u062b \u0631\u0627 \u0646\u06cc\u0632 \u062a\u0633\u0631\u06cc\u0639 \u06a9\u0646\u0646\u062f.<\/p>\n","protected":false},"excerpt":{"rendered":" \u0642\u0627\u0628\u0644\u06cc\u062a Investigation Workbench \u06cc\u0627 \u0647\u0645\u0627\u0646 \u06a9\u0627\u0631\u06af\u0627\u0647 \u062a\u062d\u0642\u06cc\u0642 \u0648 \u0628\u0631\u0631\u0633\u06cc \u062f\u0631 \u0631\u0627\u0647\u06a9\u0627\u0631 Splunk Enterprise Security \u0628\u0631\u0627\u06cc \u062a\u062d\u0644\u06cc\u0644\u06af\u0631\u0627\u0646\u06cc \u06a9\u0647 \u06a9\u0627\u0631\u0634\u0627\u0646 \u062a\u062d\u0642\u06cc\u0642\u200c \u0648\u200c \u0628\u0631\u0631\u0633\u06cc \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647\u200c\u06cc \u062d\u0648\u0627\u062f\u062b \u0627\u0633\u062a \u0648 \u06a9\u0627\u0647\u0634 \u0632\u0645\u0627\u0646 \u0628\u0631\u0631\u0633\u06cc \u0648 \u067e\u0627\u0633\u062e \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u06a9\u0627\u0631\u0627\u0645\u062f\u06cc \u0641\u0631\u0627\u06cc\u0646\u062f\u200c\u0647\u0627\u06cc \u067e\u0627\u0633\u062e \u0628\u0647 \u062d\u0648\u0627\u062f\u062b\u060c \u0628\u0631\u0627\u06cc \u0622\u0646\u200c\u0647\u0627 \u0627\u0645\u0631\u06cc \u0628\u0633\u06cc\u0627\u0631 \u062d\u06cc\u0627\u062a\u06cc \u0627\u0633\u062a\u060c \u0628\u0633\u06cc\u0627\u0631 \u0645\u0641\u06cc\u062f \u0645\u06cc\u200c\u0628\u0627\u0634\u062f. \u062f\u0631 \u0627\u06cc\u0646 \u0648\u06cc\u062f\u0626\u0648 \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u06cc\u0646 \u0648\u06cc\u0698\u06af\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc […]<\/p>\n","protected":false},"author":1001792,"featured_media":1822,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[1],"tags":[544,163,543,546,161,549,561,117,550,545,554,563,551,553,559,552,562,560,547,522,564,557,558,555,556,548],"cactus_badges":[],"video-series":[],"class_list":{"0":"post-1818","1":"post","2":"type-post","3":"status-publish","4":"format-video","5":"has-post-thumbnail","7":"category-security","8":"tag-investigation-workbench","9":"tag-splunk-enterprise","10":"tag-splunk-enterprise-security","11":"tag-splunk-es-","12":"tag-161","13":"tag--splunk-es","14":"tag-561","15":"tag-117","18":"tag---splunk-es","19":"tag-563","22":"tag-559","24":"tag-562","25":"tag-560","27":"tag-522","28":"tag-564","32":"tag-556","34":"post_format-post-format-video"},"yoast_head":"\n