Source types for the Splunk Add-on for Sysmon
The Splunk Add-on for Sysmon collects data from Sysmon's dedicated Windows Event log.
Source type | Description | CIM data models |
---|---|---|
XmlWinEventLog
|
Windows Event Log data for Sysmon provided by WinEventLog in XML or standard format. | Endpoint |
Sysmon product comparisons | Release notes for the Splunk Add-on for Sysmon |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!