Which document provides information on best practices for writing Splunk-based hunting queries, predefined
queries which may be customized to hunt for suspicious network connections, and predefined queries which
may be customized to hunt for suspicious processes?
With Custom Alerts you are able to configure email alerts using predefined templates so you're notified about
specific activity in your environment. Which of the following outlines the steps required to properly create a
custom alert rule?