Now, see the below process to install the add-on from Splunk Web: Ii) Then restart the Splunk using the following command, $SPLUNK_HOME/bin/splunk restartĪfter restarting, login to your Splunk instance, and search for index=windefender, you will get the logs of Windows defender. I) Move the add-on ( without ZIP ) in the following path after completing the above steps. You can also know about : How To Index The Last Line Of A Log File In Splunk ![]() We can install the add-on from the backend (Using File Explorer) and also from Splunk Web.Ī) Installing from backend(Using File Explorer) You need to install this add-on to that windows machine from where you want to gather the logs of Windows Defender.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |