Splunk® Enterprise

Add Microsoft Windows data: Splunk Cloud

Download manual as PDF

Download topic as PDF

Enable Windows data collection

Collect Windows Event Logs using the Splunk add-on for Microsoft Windows.

Configure Windows to enable data collection

To collect Windows Event Logs using the Splunk add-on for Microsoft Windows, configure your Windows environment to collect data:

  1. Create and configure security groups with the user you want the universal forwarder to run as. You can optionally configure the universal forwarder account as a managed service account.
  2. On the universal forwarder, create and configure Group Policy objects (GPOs) for security policy and user rights assignment. Assign appropriate user rights to the GPO.
  3. Deploy the GPOs with the updated settings to the appropriate objects.
  4. Microsoft enables the administration of user rights and privileges for user accounts. For more information, see the Configuring User Rights topic of the Microsoft documentation.
PREVIOUS
Enable receiving on your Splunk Cloud deployment
  NEXT
Install the Splunk universal forwarder

This documentation applies to the following versions of Splunk® Enterprise: 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.3.0, 7.3.1, 7.3.2


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters