<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sysmon events not being parsed — stuck as xmlwineventlog even with TA-microsoft-sysmon installed in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754483#M23276</link>
    <description>&lt;P&gt;Thanks a lot for the clarification earlier — that really helped fix most of the issues.&lt;/P&gt;&lt;P&gt;Here’s what I’ve verified and observed so far:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;I’m using &lt;STRONG&gt;Splunk_TA_microsoft_sysmon v5.0.0&lt;/STRONG&gt; (no overrides anymore).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Events are now correctly coming in with:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;sourcetype=XmlWinEventLog&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;source=XmlWinEventLog:Microsoft-Windows-Sysmon/Operational&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The &lt;STRONG&gt;Splunk Common Information Model (SA-CIM)&lt;/STRONG&gt; add-on is now installed.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The CIM check works fine —&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;| tstats count &lt;SPAN class=""&gt;from&lt;/SPAN&gt; datamodel=Endpoint.Processes &lt;SPAN class=""&gt;where&lt;/SPAN&gt; &lt;SPAN class=""&gt;index&lt;/SPAN&gt;=sysmon_logs &lt;SPAN class=""&gt;by&lt;/SPAN&gt; Processes.process_name &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;shows valid results when using a historical time range (error earlier was found due to real-time search).&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, I’m still seeing the following issues:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;In the Events tab (index=sysmon_logs), logs are displayed as &lt;STRONG&gt;raw XML&lt;/STRONG&gt; (not parsed).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The &lt;STRONG&gt;Field values&lt;/STRONG&gt; shows two sourcetypes for the same index:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;XmlWinEventLog&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;xmlwineventlog&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;When I use index=sysmon_logs | head 5, I only see XmlWinEventLog, but not the parsed fields I’d expect from the Sysmon TA.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So it seems parsing and field extraction are &lt;STRONG&gt;only partially applied&lt;/STRONG&gt; — possibly due to inconsistent sourcetype assignment (xmlwineventlog vs XmlWinEventLog).&lt;/P&gt;&lt;P&gt;Could you please advise what could be causing both sourcetypes to appear and why the XmlWinEventLog events still show raw XML in the Events tab, even though CIM and the TA are installed correctly?&lt;/P&gt;&lt;P&gt;I’d really appreciate any additional guidance — your earlier input already helped a lot in getting Sysmon ingestion and CIM mapping working.&lt;/P&gt;</description>
    <pubDate>Mon, 20 Oct 2025 11:30:10 GMT</pubDate>
    <dc:creator>GuruDayal</dc:creator>
    <dc:date>2025-10-20T11:30:10Z</dc:date>
    <item>
      <title>Sysmon events not being parsed — stuck as xmlwineventlog even with TA-microsoft-sysmon installed</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754476#M23271</link>
      <description>&lt;P&gt;As i am struggling to solve this issue since 3 days. Need help in solving this ASAP, tried everything used GenAI tools. Still not resolved.&amp;nbsp;Your Help will be much appreciated.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Sysmon logs are ingesting fine but staying as raw XML with sourcetype xmlwineventlog.&lt;BR /&gt;Expected sourcetype (XmlWinEventLog:Microsoft-Windows-Sysmon/Operational) from the Splunk_TA_microsoft_sysmon is never applied — so no field extractions or CIM compliance.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Setup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;* Indexer/HF: Ubuntu (Splunk Enterprise)&lt;/P&gt;&lt;P&gt;* Forwarder: Windows UF (universal forwarder, unparsed data)&lt;/P&gt;&lt;P&gt;* Inputs: WinEventLog://Microsoft-Windows-Sysmon/Operational&lt;/P&gt;&lt;P&gt;* Installed Add-ons:&lt;/P&gt;&lt;P&gt;Splunk_TA_microsoft_sysmon&lt;/P&gt;&lt;P&gt;Splunk_TA_windows&lt;/P&gt;&lt;P&gt;*Index: sysmon_logs&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What’s happening&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;*In Events tab: raw XML visible (&amp;lt;Event xmlns=...&amp;gt;).&lt;/P&gt;&lt;P&gt;*In Statistics tab: only xmlwineventlog shows.&lt;/P&gt;&lt;P&gt;*Even after cleanup and restarts, Sysmon sourcetype never applied.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What I’ve tried&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1.Verified ingestion: UF sends XML fine to indexer.&lt;/P&gt;&lt;P&gt;2.Checked TA inputs: correct source and renderXml=1.&lt;/P&gt;&lt;P&gt;3.Removed duplicate stanzas in system/local.&lt;/P&gt;&lt;P&gt;4.Confirmed TA configs load correctly via btool.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;EM&gt;Created custom override (on indexer only):&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;EM&gt;# props.conf&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;[xmlwineventlog]&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;TRANSFORMS-fixsysmon = force_sysmon_sourcetype&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;EM&gt;# transforms.conf&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;[force_sysmon_sourcetype]&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;REGEX = (?i)Microsoft-Windows-Sysmon&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;SOURCE_KEY = _raw&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;DEST_KEY = MetaData:Sourcetype&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;FORMAT = sourcetype::XmlWinEventLog:Microsoft-Windows-Sysmon/Operational&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*Verified via btool that stanza loads fine.&lt;/P&gt;&lt;P&gt;*Restarted Splunk — still no change.&lt;/P&gt;&lt;P&gt;*grep force_sysmon_sourcetype splunkd.log → no hits (transform not firing).&lt;/P&gt;&lt;P&gt;*stats count by sourcetype → only xmlwineventlog grows; Sysmon one frozen.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Need Help With&lt;/STRONG&gt;-&lt;/P&gt;&lt;P&gt;*Why isn’t this index-time transform applying, even though it’s visible in btool and correctly configured?&lt;BR /&gt;*Is there a known precedence issue with xmlwineventlog that blocks sourcetype remapping?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="index=sysmon_logs sourcetype=* | stats count by sourcetype" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/40583iB68897EFBA106421/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-10-20 030436.png" alt="index=sysmon_logs sourcetype=* | stats count by sourcetype" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;index=sysmon_logs sourcetype=* | stats count by sourcetype&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="no events  or statistics are shown" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/40584i513FA674CBA036B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-10-20 030519.png" alt="no events  or statistics are shown" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;no events  or statistics are shown&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Example event (raw XML view) Not parsing" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/40586i70DA3A614BB8BCC1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-10-20 030636.png" alt="Example event (raw XML view) Not parsing" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Example event (raw XML view) Not parsing&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="props.conf + transforms.conf contents" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/40585iE45A07DBA65F1BD7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-10-20 030915.png" alt="props.conf + transforms.conf contents" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;props.conf + transforms.conf contents&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Oct 2025 21:54:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754476#M23271</guid>
      <dc:creator>GuruDayal</dc:creator>
      <dc:date>2025-10-19T21:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: Sysmon events not being parsed — stuck as xmlwineventlog even with TA-microsoft-sysmon installed</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754477#M23272</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/313693"&gt;@GuruDayal&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you verify your logs for cim complaint?&lt;BR /&gt;Eg:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count from datamodel=Endpoint.Processes where index=sysmon_logs by Processes.process_name&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also why you are forcing sourcetype &lt;STRONG&gt;XmlWinEventLog:Microsoft-Windows-Sysmon/Operational&lt;/STRONG&gt; ?&lt;BR /&gt;Newer add-on sourcetype is &lt;STRONG&gt;XmlWinEventLog&lt;/STRONG&gt; with source="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational"&lt;BR /&gt;#&lt;A href="https://splunk.github.io/splunk-add-on-for-microsoft-sysmon/Sourcetypes/" target="_blank"&gt;https://splunk.github.io/splunk-add-on-for-microsoft-sysmon/Sourcetypes/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;No need to force your sourcetype for the sysmon. Your UF inputs.conf should be something like this below,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-Sysmon/Operational]
disabled = false
renderXml = 1
source = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
index=sysmon_logs&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And put sysmon add-on #&lt;A href="https://splunkbase.splunk.com/app/5709" target="_blank"&gt;https://splunkbase.splunk.com/app/5709&lt;/A&gt; in your HF/Indexer where your parsing is happening&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Prewin&lt;BR /&gt;If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 04:57:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754477#M23272</guid>
      <dc:creator>PrewinThomas</dc:creator>
      <dc:date>2025-10-20T04:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Sysmon events not being parsed — stuck as xmlwineventlog even with TA-microsoft-sysmon installed</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754483#M23276</link>
      <description>&lt;P&gt;Thanks a lot for the clarification earlier — that really helped fix most of the issues.&lt;/P&gt;&lt;P&gt;Here’s what I’ve verified and observed so far:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;I’m using &lt;STRONG&gt;Splunk_TA_microsoft_sysmon v5.0.0&lt;/STRONG&gt; (no overrides anymore).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Events are now correctly coming in with:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;sourcetype=XmlWinEventLog&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;source=XmlWinEventLog:Microsoft-Windows-Sysmon/Operational&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The &lt;STRONG&gt;Splunk Common Information Model (SA-CIM)&lt;/STRONG&gt; add-on is now installed.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The CIM check works fine —&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;| tstats count &lt;SPAN class=""&gt;from&lt;/SPAN&gt; datamodel=Endpoint.Processes &lt;SPAN class=""&gt;where&lt;/SPAN&gt; &lt;SPAN class=""&gt;index&lt;/SPAN&gt;=sysmon_logs &lt;SPAN class=""&gt;by&lt;/SPAN&gt; Processes.process_name &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;shows valid results when using a historical time range (error earlier was found due to real-time search).&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;However, I’m still seeing the following issues:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;In the Events tab (index=sysmon_logs), logs are displayed as &lt;STRONG&gt;raw XML&lt;/STRONG&gt; (not parsed).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The &lt;STRONG&gt;Field values&lt;/STRONG&gt; shows two sourcetypes for the same index:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;XmlWinEventLog&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;xmlwineventlog&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;When I use index=sysmon_logs | head 5, I only see XmlWinEventLog, but not the parsed fields I’d expect from the Sysmon TA.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So it seems parsing and field extraction are &lt;STRONG&gt;only partially applied&lt;/STRONG&gt; — possibly due to inconsistent sourcetype assignment (xmlwineventlog vs XmlWinEventLog).&lt;/P&gt;&lt;P&gt;Could you please advise what could be causing both sourcetypes to appear and why the XmlWinEventLog events still show raw XML in the Events tab, even though CIM and the TA are installed correctly?&lt;/P&gt;&lt;P&gt;I’d really appreciate any additional guidance — your earlier input already helped a lot in getting Sysmon ingestion and CIM mapping working.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 11:30:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754483#M23276</guid>
      <dc:creator>GuruDayal</dc:creator>
      <dc:date>2025-10-20T11:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Sysmon events not being parsed — stuck as xmlwineventlog even with TA-microsoft-sysmon installed</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754532#M23294</link>
      <description>&lt;P&gt;Need Solution as earliest as possible, Help will be much appreciated as i am struggling since days of this issue, cannot go to the next step of my project.&lt;BR /&gt;&lt;BR /&gt;Here’s the latest update on my Sysmon parsing issue:&lt;/P&gt;&lt;P&gt;I’ve now confirmed the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Sysmon TA v5.0.0&lt;/STRONG&gt; (Splunk_TA_microsoft_sysmon) is installed on my Splunk VM (which acts as both &lt;STRONG&gt;Indexer + Search Head&lt;/STRONG&gt;).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;UF on Windows&lt;/STRONG&gt; forwards Sysmon logs using:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;[&lt;SPAN class=""&gt;WinEventLog&lt;/SPAN&gt;&lt;SPAN class=""&gt;://Microsoft-Windows-Sysmon/Operational&lt;/SPAN&gt;]&lt;BR /&gt;disabled = &lt;SPAN class=""&gt;false&lt;/SPAN&gt; renderXml = &lt;SPAN class=""&gt;1&lt;/SPAN&gt;&lt;BR /&gt;sourcetype = &lt;SPAN class=""&gt;XmlWinEventLog&lt;/SPAN&gt;&lt;BR /&gt;source = &lt;SPAN class=""&gt;XmlWinEventLog&lt;/SPAN&gt;&lt;SPAN class=""&gt;:Microsoft-Windows-Sysmon/Operational&lt;BR /&gt;&lt;/SPAN&gt;index = sysmon_logs&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Data ingestion works&lt;/STRONG&gt; — events arrive fine under&lt;BR /&gt;sourcetype=XmlWinEventLog and&lt;BR /&gt;source=XmlWinEventLog:Microsoft-Windows-Sysmon/Operational.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;TA overrides removed&lt;/STRONG&gt; (TA-sysmon-overrides.disabled) — verified no local props/transforms overriding the Sysmon TA.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;CIM installed&lt;/STRONG&gt; — &lt;FONT color="#FF9900"&gt;| tstats count from datamodel=Endpoint.Processes shows results.&lt;/FONT&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;btool verification&lt;/STRONG&gt; shows correct sourcetype chain; no misconfig or duplicates.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;However, &lt;STRONG&gt;Sysmon events are still shown as raw XML&lt;/STRONG&gt;, and &lt;STRONG&gt;none of the field extractions&lt;/STRONG&gt; (like Image, ParentImage, CommandLine) appear — even though ingestion and sourcetype are correct.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So far, I’ve verified:&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; ingestion and indexing&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; sourcetype normalization&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; TA version and configuration&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; CIM presence and tstats validation&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; no conflicting props/transforms&lt;/P&gt;&lt;P&gt;Yet parsing doesn’t occur at search-time.&lt;BR /&gt;Could this be an issue with the Sysmon TA’s extraction logic not triggering for XmlWinEventLog events (even though the sourcetype matches)?&lt;BR /&gt;Any next steps or validation checks you recommend to debug why XML extraction isn’t being applied?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Attached screenshots are merged in 1 png:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Raw Sysmon XML event from index=sysmon_logs&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Search showing sourcetype/source fields&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;btool props list XmlWinEventLog --debug output&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 21 Oct 2025 14:16:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754532#M23294</guid>
      <dc:creator>GuruDayal</dc:creator>
      <dc:date>2025-10-21T14:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: Sysmon events not being parsed — stuck as xmlwineventlog even with TA-microsoft-sysmon installed</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754562#M23297</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/313693"&gt;@GuruDayal&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Did you install&amp;nbsp;&lt;SPAN&gt;Splunk_TA_windows&lt;/SPAN&gt;&amp;nbsp;add-on also?&amp;nbsp;XmlWinEventLog sourcetype require this add-on also to parse everything.&amp;nbsp;&lt;/P&gt;&lt;P&gt;With&amp;nbsp;&lt;SPAN&gt;Splunk_TA_windows&lt;/SPAN&gt;&amp;nbsp;and&amp;nbsp;&lt;SPAN&gt;Splunk_TA_microsoft_sysmon&lt;/SPAN&gt;&amp;nbsp;add-on it should parse as expected.&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Prewin&lt;BR /&gt;If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2025 06:21:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754562#M23297</guid>
      <dc:creator>PrewinThomas</dc:creator>
      <dc:date>2025-10-22T06:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Sysmon events not being parsed — stuck as xmlwineventlog even with TA-microsoft-sysmon installed</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754569#M23298</link>
      <description>&lt;P&gt;1. XmlWinEventLog (or whatever the case is - it's not important) is the right sourcetype for XML formatted windows events. It's the source that distinguishes from which eventlog channel the event came.&lt;/P&gt;&lt;P&gt;2. Your data seems to be parsed properly (you have your fields extracted). It is not "prettyfied" in the UI but that's normal behaviour.&lt;/P&gt;&lt;P&gt;3. "Need this ASAP" doesn't work here. It's not a free support service. You want something done quickly? Find and engage your local Splunk Partner.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2025 11:03:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Sysmon-events-not-being-parsed-stuck-as-xmlwineventlog-even-with/m-p/754569#M23298</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-10-22T11:03:11Z</dc:date>
    </item>
  </channel>
</rss>

