Splunk® App for Windows Infrastructure (Legacy)

Splunk App for Windows Infrastructure Reference

On October 20, 2021, the Splunk App for Windows Infrastructure will reach its end of life. After this date, Splunk will no longer maintain or develop this product. The functionality in this app is migrating to a content pack in Data Integrations. Learn about the Content Pack for Windows Dashboards and Reports.
This documentation does not apply to the most recent version of Splunk® App for Windows Infrastructure (Legacy). For documentation on the most recent version, go to the latest release.

Network Activity

This topic discusses the Network Activity page, which shows you information about the network activity that has been collected from your Windows hosts.

How to use this page

Choose a list box to filter network activity based on that filter. You can either select an entry from the list box or select the search field and type in an entry. When you type in a string, the page only matches entries for events that have been collected previously.

You can choose or enter data from one of the following filters:

  • Local Host: Where the network transaction originated.
  • Direction: Whether the transaction was inbound or outbound from the local host.
  • Protocol: The protocol of the network activity (TCP or UDP).
  • Packet Type: The type of packet that was used in the transaction, one of "connect", "accept", or "transport".
  • Remote Host: Where the network transaction was destined.
  • Remote Port: The remote port that the network transaction used.
  • Local Port: The local port that the network transaction used.
  • Process Name: The program that initiated the network transaction.
  • User Name: The user that initiated the network transaction.

The Network Information pane shows all network transactions that apply to the filters you set. You can use the time picker in the upper right to limit the range of data that the panel shows.

Last modified on 05 October, 2016
Host Monitoring Services   Top Hosts and Processes

This documentation applies to the following versions of Splunk® App for Windows Infrastructure (Legacy): 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.2.1, 1.3.0, 1.4.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters