Splunk® Supported Add-ons

Splunk Add-on for Sysmon

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Source types for the Splunk Add-on for Sysmon

The Splunk Add-on for Sysmon collects data from Sysmon's dedicated Windows Event log.

Source type Description CIM data models
XmlWinEventLog Windows Event Log data for Sysmon provided by WinEventLog in XML or standard format. Endpoint

Network Resolution (DNS) Network Traffic Change

Last modified on 09 June, 2022
PREVIOUS
Sysmon product comparisons
  NEXT
Release notes for the Splunk Add-on for Sysmon

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters