
Source types for the Splunk Add-on for Sysmon
The Splunk Add-on for Sysmon collects data from Sysmon's dedicated Windows Event log.
Source type | Description | CIM data models |
---|---|---|
XmlWinEventLog
|
Windows Event Log data for Sysmon provided by WinEventLog in XML or standard format. | Endpoint |
Last modified on 17 February, 2023
PREVIOUS Sysmon product comparisons |
NEXT Release notes for the Splunk Add-on for Sysmon |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!