icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.
Splunkbase will be undergoing a scheduled migration and will be unavailable on Saturday, Oct 1, 2022, from 11AM to 3PM PDT

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Microsoft SMTP App for Splunk
SHA256 checksum (microsoft-smtp-app-for-splunk_22.tgz) ebc7481b7f4b0adadb6f83acaf1f72e32f7284765d5d631abbe5e19e4492e075 SHA256 checksum (microsoft-smtp-app-for-splunk_21.tgz) 71e448d4b522d21ed83e3f34d6bbdf0e65e775f667ec18e256ff9881ee416289 SHA256 checksum (microsoft-smtp-app-for-splunk_20.tgz) 7bac68b9be9cb24153df3b7e77bf157ff1eb1eed351f7c0514fe031e9562d6ec SHA256 checksum (microsoft-smtp-app-for-splunk_10.tgz) 4dc2b582455b1993b8dfd1443501414bac3c6a949a3f418a03aac8285362f647
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Microsoft SMTP App for Splunk

Splunk Cloud
Overview
Details
The Microsoft SMTP App for Splunk provides easy onboarding of SMTP IIS log in W3C format and same time customize Splunk searches and dashboards for Simple Mail Transfer Protocol server events. All dashboards are highly optimized for fast performance and contain custom drill-downs. This app can be used to gain analytical insights to your mail server logs. Also, SMTP server error code details are incorporated in this app.

Feel free to write to us at support@avotrix.com

Overview
The Microsoft SMTP app for Splunk, it provides custom Splunk searches and dashboards for Simple mail transfer protocol server logs. All dashboards have been highly optimized for fast performance and contain custom drilldowns. Use to gain visibility and add insights to your mail sever logs. SMTP server error codes details is also incorporated in the app.
This app also provide monitoring for SMTP logs and helps to onboard logs into Splunk with pre-existing sourcetype and monitoring stanza to extract SMTP IIS logs in w3c Format.
Here we get two type of log SMTP daily email logs and BAD email logs.

Using this App:
Enable SMTP Server log settings:
SMTP log format selected is “W3C Extended Log File Format“ as W3C Extended format is a customizable ASCII format with a variety of different properties. You can log properties important to you, while limiting log size by omitting unwanted property fields. Properties are separated by spaces. Time is recorded as UTC.
Go to link for enabling SMTP server logging https://avotrix.com/docs/How_to_enable_logging_for_IIS_SMTP_server_in_windows-converted.pdf

Configuration and Installation:
Please see Splunk's official documentation for the initial installation of the app. To use the dashboards

Deployment Guide:
Pre-requisite: This app contains monitoring stanza ,path can be edited as per specific path given by user for SMTP logs in server.
Index we are using here is Infra . Although no indexes. conf is given in package it should be made by user only while installation.
If you are using some index other, then Infra edit macro "smtp_index" for dashboard population, also edit eventype "smtp_ip" and put client_ip as per your logs
Links for eventtypes and macros used in app for modularity:
/manager/SMTP_IIS_Add-on_For_Splunk/saved/eventtypes
/manager/SMTP_IIS_Add-on_For_Splunk/admin/macros

Link to lookup used for showing error code details in smtp logs:
/manager/SMTP_IIS_Add-on_For_Splunk/data/lookup-table-files

• Single Instance
Install app here.
• Distributed deployment
Heavy Forwarder/Universal forwarder – Install app here. Enable monitoring stanza from inputs.conf (place index and add monitor path if not using standard)
Search Head – Install app here

Sourcetype details:
smtp:iis:w3c – Getting SMTP email transactions logs
ms:iis:Badmail – Getting SMTP bad email logs

Dashboard:
On the dashboard tab, you can use a time range to filter a result as per need. Selecting a new option in this panel will automatically reload all the graphs.
The very first row gives overview of daily count of Total, Outbound, Bounced and Erroneous with a trend line. Also provided drilldwon in these panels.
Outbound Email drilldown gives us details of mail sent to some recipient with other than permitted domain.
Bounced Email drilldown gives us details of delivery failure.
Error code generated while mail transaction will get captured with issue details. Drilldown for error code time will give insights of failed mail.
Error code statistics gives statistical data for all generated error codes.

Reports - Existing schedule and triggering condition can be altered as per required
Daily report to collect Error code generated: This report runs daily on 00:00 AM and collects all the error code with details
Daily report to collect Outbound Email list: This report runs daily on 00:00 AM and collects details of all outbound email sent
Daily report to collect Bounced Email list: This report runs daily on 00:00 AM and collects details of all Bounced email

Alerts - Existing schedule and triggering condition can be altered as per required
Error code generated -Email failed: Triggers when Error code count is greater than 20, runs at every three hours
Outbound Email sent: Triggers when an outbound email sent is greater than 0, runs at every hour past 15 minutes
Bounced Email alert generated: Triggers when Bounced email count is greater than 20, runs at every three hours

Contact US
Email: support@avotrix.com

Release Notes

Version 2.2
Feb. 1, 2022

Updated dashboard queries and enriched installation and configuration document

Version 2.1
Nov. 17, 2021

Added Splunk Cloud Compatibility

Version 2.0
Aug. 27, 2021
Version 1.0
Sept. 20, 2020

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.