Splunk® Add-on for Microsoft Active Directory

Install and use the Splunk Add-on for Microsoft Active Directory

Download manual as PDF

Download topic as PDF

Release notes

The latest version of the Splunk Add-on for Microsoft Active Directory was released on October 25, 2016.

Known issues

The Splunk Add-on for Microsoft Active Directory has the following known issues:

None at this time.

Fixed Issues

Publication Date Defect Number Description
2016-10-10 TAG-11961 Update to latest common build.

Sourcetype changes for WinEventLog data

The Splunk Add-on for Windows version 5.0.x introduces changes to WinEventLog data sourcetypes, and now assigns the WinEventLog sourcetype to the following WinEventLog inputs of the Splunk Add-on for Microsoft Active Directory:

Windows AD input Sourcetype
WinEventLog://DFS Replication WinEventLog
WinEventLog://Directory Service WinEventLog
WinEventLog://File Replication Service WinEventLog
WinEventLog://Key Management Service WinEventLog

WinEventLogs are distinguished by their source.

PREVIOUS
Source types for the Splunk Add-on for Microsoft Active Directory
  NEXT
Hardware and software requirements for the Splunk Add-on for Microsoft Active Directory

This documentation applies to the following versions of Splunk® Add-on for Microsoft Active Directory: 1.0.0


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters