Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
CCX Microsoft Windows Extensions (Defender for Endpoint and Sysmon) app icon

CCX Microsoft Windows Extensions (Defender for Endpoint and Sysmon)

About Us: CyberCX is Australia’s greatest force of cyber security experts. Our highly skilled professional services team operates a 24x7 on-shore security operations centre (SOC) servicing corporate and public sector organisations across Australia and New Zealand, specialising in Security Operations services leveraging Splunk. Description: The CCX Add-on CCX Microsoft Windows Sources Extensions looks to provide additional field extraction and CIM compliance for Windows log sources captured via Splunk Add-on for Microsoft Windows installed on Splunk agents (UF). This Technical Add-on does not replace the public Splunk Add-ons "Splunk Add-on for Microsoft Windows" (https://splunkbase.splunk.com/app/742/) and "Splunk Add-on for Sysmon" (https://splunkbase.splunk.com/app/5709) version 4.0.1 or higher, but works as an additional extension to be deployed on Search Heads (only). This add-on currently provides additional extraction and CIM compliance for sources: - XmlWinEventLog:Security (Registry) - WinRegistry - XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational - WinEventLog:Microsoft-Windows-Windows Defender/Operational - WinEventLog:Microsoft-Windows-Sysmon/Operational Fully compatible with Splunk Enterprise and Splunk Cloud, built by an Ops team for Ops teams. Features: This TA currently supports logtypes tagged under the following CIM datamodels: Alerts, Change, Endpoint, Network Traffic, Network Resolution (DNS), and Malware.

splunk product badge

Latest Version 1.0.7
September 18, 2024
Compatibility
Not Available
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0
CIM Version: 5.x
Rating

0

(0)

Log in to rate this app
Support
CCX Microsoft Windows Extensions (Defender for Endpoint and Sysmon) support icon
Developer Supported addon
About Us: CyberCX is Australia’s greatest force of cyber security experts. Our highly skilled professional services team operates a 24x7 on-shore security operations centre (SOC) servicing corporate and public sector organisations across Australia and New Zealand, specialising in Security Operations services leveraging Splunk. Description: The CCX Add-on CCX Microsoft Windows Sources Extensions looks to provide additional field extraction and CIM compliance for Windows log sources captured via Splunk Add-on for Microsoft Windows installed on Splunk agents (UF). This Technical Add-on does not replace the public Splunk Add-ons "Splunk Add-on for Microsoft Windows" (https://splunkbase.splunk.com/app/742/) and "Splunk Add-on for Sysmon" (https://splunkbase.splunk.com/app/5709) version 4.0.1 or higher, but works as an additional extension to be deployed on Search Heads (only). This add-on currently provides additional extraction and CIM compliance for sources: - XmlWinEventLog:Security (Registry) - WinRegistry - XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational - WinEventLog:Microsoft-Windows-Windows Defender/Operational - WinEventLog:Microsoft-Windows-Sysmon/Operational Fully compatible with Splunk Enterprise and Splunk Cloud, built by an Ops team for Ops teams. Features: This TA currently supports logtypes tagged under the following CIM datamodels: Alerts, Change, Endpoint, Network Traffic, Network Resolution (DNS), and Malware.

Categories

Created By

Henrique Linsmeyer

Type

addon

Downloads

1,338

Resources

Login to report this app listing