A community-built SPL + dashboard repository
GoSplunk
Discover field-tested SPL searches and full dashboard XML you can copy straight into Splunk.
Sample SPL
index=security EventCode=4625
| stats count by Account_Name, ComputerName
| sort - count 128
SPL searches
Hand-picked SPL searches from across the library.
Escalation of Privileges in a Windows Environment by User
Accounts Enabled
Create a lookup with random test ip's
Dashboard and App views by user
Reports Owned by Admin Users and Writable by Others
Windows security daily domain activities
Original posted in 2015 Testing an issue with brackets
Show your triggered alerts
Sysmon - Find Processes with Renamed Executables
Dashboards
Full XML dashboards with panels, inputs, and drilldowns. Copy once, ship instantly.