Microsoft Windows Defender TA for Splunk®. Inputs and extractions for use with Splunk®.
Original Author: Patrick O'Connell
Version/Date: 1.0.7 / Aug 31, 2020
Sourcetype: XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational
Has index-time ops: false
1.0.7 Aug 31, 2020
--------
Added support for using this with the Splunk Add-on for Windows version 7+
1.0.6 April 27, 2018
--------
Updated lookup for event ID messages to match new Microsoft definitions.
Thanks to Mark Baumgartner of Creighton University for the catch.
1.0.5 Dec 30, 2017
--------
Fixed typo in EventTypes.conf. This makes tags work again. Thanks to
Chris Keladis from Katana1.
1.0.4 Nov 1, 2017
--------
Fixed wrong file inclusion for certification.
1.0.3 Oct 31, 2017
--------
Added definitions for all magic values found in Defender logs as of today.
1.0.2 Oct 1, 2017
--------
Fixing naming conventions and trademarks per SplunkBase documentation.
1.0.1 Sep 28, 2017
--------
Fixed file_path and file_name extractions. Thanks to people both
in Slack and the support team working at .Conf 2017.
1.0.0 Sep 18, 2017
--------
Initial release
Configuration: Install TA via GUI on all search heads, install
via your preferred method (manual or Deployment Server) on
forwarders running on Windows running Windows Defender.
Ensure that you have at least version 6.2.0 universal forwarders.
This is because of the Windows XML event log format.
http://blogs.splunk.com/2014/11/04/splunk-6-2-feature-overview-xml-event-logs/
For information on Windows Defender event codes, see below.
https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus
This is a community supported TA. As such, post to answers.splunk.com
and reference it. Someone should be with you shortly.
Pull requests via github are welcome! The repository can be found
at https://github.com/pdoconnell/TA-microsoft-windefender.