The following are the spec and example files for
Version 7.3.4 *** DEPRECATED *** This file contains potential attribute/value pairs to use when configuring Windows registry monitoring. The procmon-filters.conf file contains the regular expressions you create to refine and filter the processes you want Splunk to monitor. You must restart Splunk to enable configurations. To learn more about configuration files (including precedence) please see the documentation located at http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles find out if this file is still being used.
* Name of the filter being defined. proc = <string> * Regex specifying process image that you want Splunk to monitor. type = <string> * Regex specifying the type(s) of process event that you want Splunk to monitor. hive = <string> * Not used in this context, but should always have value ".*"
# Version 7.3.4 # # This file contains example registry monitor filters. To create your own # filter, use the information in procmon-filters.conf.spec. # # To use one or more of these configurations, copy the configuration block into # procmon-filters.conf in $SPLUNK_HOME/etc/system/local/. You must restart # Splunk to enable configurations. # # To learn more about configuration files (including precedence) please see the # documentation located at # http://docs.splunk.com/Documentation/Splunk/latest/Admin/Aboutconfigurationfiles [default] hive = .* [not-splunk-optimize] proc = (?<!splunk-optimize.exe)$ type = create|exit|image
This documentation applies to the following versions of Splunk® Enterprise: 7.3.4