All Apps and Add-ons

Index, Source and SourceType Missing?


Just installed this and configured the forwarder, but I'm getting the following error in Splunk.

Received event for unconfigured/disabled/deleted index=windefender with source="source::WinEventLog:Microsoft-Windows-Windows Defender/Operational" host="host::****" sourcetype="sourcetype::XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational". So far received events from 1 missing index(es).

I manually created the Index, and I'm receiving logs but they are a jumbled mess I'm guessing since the SourceType is missing.

I'm sure I could fumble my way through creating the SourceType, but is there an easier way to get this setup?

Thank you

0 Karma

Path Finder

Is that being indexed from a UF version 6.2.0 or later? That is a prerequisite. Additionally, do you have Splunk_TA_windows installed on that device as well? I believe that is what creates the XmlWinEventLog intake tooling.

0 Karma


Splunk_TA_windows is installed. Using Version 7 of the Forwarder.

0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

 (view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...