FileSure Defend for Splunk app icon

FileSure Defend for Splunk

Real-time Windows file system monitoring for Splunk. FileSure streams kernel-level audit events — user, file, operation, executable — via syslog with pre-built dashboards and CIM-mapped field extractions. Purpose-built for security and compliance teams.

Built by
splunk product badge
screenshot
screenshot
screenshot
screenshot

Last Updated
April 29, 2026
Compatibility
This app has no available versions
Rating

0

(0)

Log in to rate this app
Support
FileSure Defend for Splunk support icon
Developer Supported addon
FileSure Defend streams real-time file system audit events to Splunk via UDP syslog, giving security teams full visibility into file operations across Windows endpoints and servers. Each event captures the user, machine, file path, operation type, executable, and whether the action was allowed or denied — mapped to Splunk's Common Information Model. Deployed at U.S. national security facilities, FileSure Defend provides kernel-level file monitoring where traditional endpoint security falls short. Includes a pre-built dashboard, custom sourcetype (syslog_filesure), and field extractions out of the box.

Categories

Security, Fraud & Compliance, Endpoint

Created By

Gene Allen

Type

addon

Downloads

2

Resources

Log in to report this app listing