<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to configure inputs.conf to get PowerShell and WinRM event logs from Windows hosts? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-inputs-conf-to-get-PowerShell-and-WinRM-event/m-p/234847#M45741</link>
    <description>&lt;P&gt;I've been asked to index both Operational.evtx and Analytic.etl from both \Winevt\Logs\Microsoft-Windows-WinRM and \Winevt\Logs\Microsoft-Windows-PowerShell from a few Windows hosts.&lt;/P&gt;

&lt;P&gt;I'm not quite sure how to configure the inputs.conf for this. I'm guessing that it's something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:PowerShell]
disabled = 1
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
renderXml=false
or

[WinEventLog:WinRM]
..
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But again, not really clear. (and not at all Windows literate) And then how do you differentiate between the Operational and Analytic objects. &lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2016 18:29:53 GMT</pubDate>
    <dc:creator>pkeller</dc:creator>
    <dc:date>2016-06-29T18:29:53Z</dc:date>
    <item>
      <title>How to configure inputs.conf to get PowerShell and WinRM event logs from Windows hosts?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-inputs-conf-to-get-PowerShell-and-WinRM-event/m-p/234847#M45741</link>
      <description>&lt;P&gt;I've been asked to index both Operational.evtx and Analytic.etl from both \Winevt\Logs\Microsoft-Windows-WinRM and \Winevt\Logs\Microsoft-Windows-PowerShell from a few Windows hosts.&lt;/P&gt;

&lt;P&gt;I'm not quite sure how to configure the inputs.conf for this. I'm guessing that it's something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:PowerShell]
disabled = 1
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
renderXml=false
or

[WinEventLog:WinRM]
..
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But again, not really clear. (and not at all Windows literate) And then how do you differentiate between the Operational and Analytic objects. &lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 18:29:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-inputs-conf-to-get-PowerShell-and-WinRM-event/m-p/234847#M45741</guid>
      <dc:creator>pkeller</dc:creator>
      <dc:date>2016-06-29T18:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure inputs.conf to get PowerShell and WinRM event logs from Windows hosts?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-inputs-conf-to-get-PowerShell-and-WinRM-event/m-p/234848#M45742</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Microsoft-Windows-PowerShell/Operational]
disabled = false

[WinEventLog://Microsoft-Windows-WinRM/Operational]
disabled = false
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 09 Jul 2016 03:33:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-inputs-conf-to-get-PowerShell-and-WinRM-event/m-p/234848#M45742</guid>
      <dc:creator>spayneort</dc:creator>
      <dc:date>2016-07-09T03:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure inputs.conf to get PowerShell and WinRM event logs from Windows hosts?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-inputs-conf-to-get-PowerShell-and-WinRM-event/m-p/234849#M45743</link>
      <description>&lt;P&gt;The following speaks about it - &lt;A href="http://blogs.splunk.com/2014/02/03/forwarding-windows-event-logs-to-another-host/"&gt;Forwarding Windows Event Logs to another host&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;In Step 4, it shows - &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://SOURCE-Security]
sourcetype = WinEventLog:Security
host = SOURCE
disabled = false
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 10 Jul 2016 20:59:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-inputs-conf-to-get-PowerShell-and-WinRM-event/m-p/234849#M45743</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2016-07-10T20:59:30Z</dc:date>
    </item>
  </channel>
</rss>

