Splunk® Enterprise

Add Microsoft Windows data: Splunk Cloud

Acrobat logo Download manual as PDF

This documentation does not apply to the most recent version of Splunk. Click here for the latest version.
Acrobat logo Download topic as PDF

Enable Windows data collection

Collect Windows Event Logs using the Splunk add-on for Microsoft Windows.

Configure Windows to enable data collection

To collect Windows Event Logs using the Splunk add-on for Microsoft Windows, configure your Windows environment to collect data:

  1. Create and configure security groups with the user you want the universal forwarder to run as. You can optionally configure the universal forwarder account as a managed service account.
  2. On the universal forwarder, create and configure Group Policy objects (GPOs) for security policy and user rights assignment. Assign appropriate user rights to the GPO.
  3. Deploy the GPOs with the updated settings to the appropriate objects.
  4. Microsoft enables the administration of user rights and privileges for user accounts. For more information, see the Configuring User Rights topic of the Microsoft documentation.
Last modified on 28 May, 2019
Enable receiving on your Splunk Cloud deployment
Install the Splunk universal forwarder

This documentation applies to the following versions of Splunk® Enterprise: 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9

Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters