<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search events generated by TA. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-events-generated-by-TA/m-p/467918#M191896</link>
    <description>&lt;P&gt;@Arpmjdr &lt;/P&gt;

&lt;P&gt;Are you using "Splunk Add-on for Microsoft IIS" (&lt;A href="http://splunkbase.splunk.com/app/3185"&gt;http://splunkbase.splunk.com/app/3185&lt;/A&gt;)? If yes then check events by executing below search?&lt;/P&gt;

&lt;P&gt;1) &lt;CODE&gt;sourcetype="ms:iis:auto"&lt;/CODE&gt;&lt;BR /&gt;
2) &lt;CODE&gt;sourcetype="ms:iis:default"&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Sep 2019 11:06:43 GMT</pubDate>
    <dc:creator>kamlesh_vaghela</dc:creator>
    <dc:date>2019-09-04T11:06:43Z</dc:date>
    <item>
      <title>How to search events generated by TA.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-events-generated-by-TA/m-p/467917#M191895</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I am using Splunk enterprise and splunk enterprise security. I have windows IIS TA configured as well.How to find the IIS events in splunk search in order to create alert.Kindly help&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 10:33:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-events-generated-by-TA/m-p/467917#M191895</guid>
      <dc:creator>Arpmjdr</dc:creator>
      <dc:date>2019-09-04T10:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to search events generated by TA.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-events-generated-by-TA/m-p/467918#M191896</link>
      <description>&lt;P&gt;@Arpmjdr &lt;/P&gt;

&lt;P&gt;Are you using "Splunk Add-on for Microsoft IIS" (&lt;A href="http://splunkbase.splunk.com/app/3185"&gt;http://splunkbase.splunk.com/app/3185&lt;/A&gt;)? If yes then check events by executing below search?&lt;/P&gt;

&lt;P&gt;1) &lt;CODE&gt;sourcetype="ms:iis:auto"&lt;/CODE&gt;&lt;BR /&gt;
2) &lt;CODE&gt;sourcetype="ms:iis:default"&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 11:06:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-events-generated-by-TA/m-p/467918#M191896</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2019-09-04T11:06:43Z</dc:date>
    </item>
  </channel>
</rss>

