Source types for the Splunk Add-on for Sysmon
The Splunk Add-on for Sysmon collects data from Sysmon's dedicated Windows Event log.
|Source type||Description||CIM data models|
||Windows Event Log data for Sysmon provided by WinEventLog in XML or standard format.||Endpoint|
Sysmon product comparisons
Release notes for the Splunk Add-on for Sysmon
This documentation applies to the following versions of Splunk® Supported Add-ons: released