Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
Warning

This app is archived. Learn more

Splunk Add-On for Microsoft Sysmon app icon

Splunk Add-On for Microsoft Sysmon

IMPORTANT NOTE! The Splunk Add-on for Sysmon is a new Splunk-supported add-on, and is different from the Splunk Add-on for Microsoft Sysmon (this add-on). The community-supported add-on will continue to exist, but because the Splunk Add-on for Sysmon contains enhancements to events field mappings and Common Information Model (CIM) changes, the best practice is to migrate your Microsoft Sysmon data ingestion from this community-supported add-on to the Splunk-supported add-on. For information on the differences in the technical support for different Splunkbase app or add-ons, see the Support content topic in the Splunk Developer Guide at this URL: https://docs.splunk.com/Documentation/AddOns/released/MSSysmon/Sysmonproductcomparisons It's important to thoroughly test your correlation searches and other Splunk knowledge objects with the new TA before you migrate! Provides a data input and CIM-compliant field extractions for Microsoft Sysmon. The Microsoft Sysmon utility provides data on process creation (including parent process ID), network connections, and much more. This add-on was originally created by Adrian Hall. We appreciate Adrian's contribution and his willingness to turn over control to the current team for ongoing maintenance and development.

Built by Splunk Works
splunk product badge

Latest Version 10.6.2
March 8, 2020
Compatibility
Not Available
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0, 8.2, 8.1, 8.0, 7.3, 7.2, 7.1, 7.0
CIM Version: 4.x, 3.x
Rating

0

(0)

Log in to rate this app
Support
Splunk Add-On for Microsoft Sysmon support icon
Not Supported
Learn more
Ranking

#37

in Security, Fraud & Compliance

#41

in IT Operations
IMPORTANT NOTE! The Splunk Add-on for Sysmon is a new Splunk-supported add-on, and is different from the Splunk Add-on for Microsoft Sysmon (this add-on). The community-supported add-on will continue to exist, but because the Splunk Add-on for Sysmon contains enhancements to events field mappings and Common Information Model (CIM) changes, the best practice is to migrate your Microsoft Sysmon data ingestion from this community-supported add-on to the Splunk-supported add-on. For information on the differences in the technical support for different Splunkbase app or add-ons, see the Support content topic in the Splunk Developer Guide at this URL: https://docs.splunk.com/Documentation/AddOns/released/MSSysmon/Sysmonproductcomparisons It's important to thoroughly test your correlation searches and other Splunk knowledge objects with the new TA before you migrate! Provides a data input and CIM-compliant field extractions for Microsoft Sysmon. The Microsoft Sysmon utility provides data on process creation (including parent process ID), network connections, and much more. This add-on was originally created by Adrian Hall. We appreciate Adrian's contribution and his willingness to turn over control to the current team for ongoing maintenance and development.

Categories

Created By

Splunk Works

Contributors

James Brodsky, Jim Apger, Dave Herrald, Mark Karlstrand, Evan Fenner (C), Adam Ryznar, Marcin Bukowski, Richard Kent, Izabela Plokita

Type

addon

Downloads

46,197

Resources

Login to report this app listing