<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows events log monitoring in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-events-log-monitoring/m-p/173729#M34955</link>
    <description>&lt;P&gt;You can configure this when you install the forwarder on the remote machine.  There is a setting GUI during the install that allows you to select which event logs to monitor.&lt;/P&gt;

&lt;P&gt;Settings for monitoring the event logs can be found in on the forwarder in the splunk\etc\apps*\local\inputs.conf files.  Some will be turned on, and others will be turned off.  You can turn them on or off by changing the "disabled" parameter value to 1 (off) or 0 (on).  If you make changes to inputs.conf you will need to restart the splunkd service on the forwarder for the changes to take affect.&lt;/P&gt;</description>
    <pubDate>Wed, 21 May 2014 13:47:48 GMT</pubDate>
    <dc:creator>lukejadamec</dc:creator>
    <dc:date>2014-05-21T13:47:48Z</dc:date>
    <item>
      <title>Windows events log monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-events-log-monitoring/m-p/173728#M34954</link>
      <description>&lt;P&gt;I need to monitor the windows event logs using the universal forwarder. Please help me out for the below queries:-&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;How to configure the inputs for remote machine.&lt;/LI&gt;
&lt;LI&gt;If i want to monitor only application events logs, how to filter the application event log for a particular application event logs.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Thanks in advance. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2014 13:06:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-events-log-monitoring/m-p/173728#M34954</guid>
      <dc:creator>RashmiGowda</dc:creator>
      <dc:date>2014-05-21T13:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Windows events log monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-events-log-monitoring/m-p/173729#M34955</link>
      <description>&lt;P&gt;You can configure this when you install the forwarder on the remote machine.  There is a setting GUI during the install that allows you to select which event logs to monitor.&lt;/P&gt;

&lt;P&gt;Settings for monitoring the event logs can be found in on the forwarder in the splunk\etc\apps*\local\inputs.conf files.  Some will be turned on, and others will be turned off.  You can turn them on or off by changing the "disabled" parameter value to 1 (off) or 0 (on).  If you make changes to inputs.conf you will need to restart the splunkd service on the forwarder for the changes to take affect.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2014 13:47:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-events-log-monitoring/m-p/173729#M34955</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-05-21T13:47:48Z</dc:date>
    </item>
  </channel>
</rss>

