Splunk Enterprise

Monitoring Trellix log

sswigart
Explorer
I have a requirement to monitor log files created by Trellix on my windows 11 and 2019 hosts. 
The log files are located at C:\ProgramData\McAfee\Endpoint Security\Logs\AccessProtection_Activity.log
                                                                                                                                                              \ExploitPrevention_Activity.log
                                                                                                                                                               \OnDemandScan_Activity.log
                                                                                                                                                                \SelfProtection_Activity.log
 
My stanza in the input.conf are configured as:
 
[monitor://C:\ProgramData\McAfee\Endpoint Security\Logs\AccessProtection_Activity.log
disabled = 0
index = winlogs
sourcetype = WinEventLog:HIPS
start_from = oldest
current_only = 0
checkpointInterval = 5
renderXel = false
 
Same format for each log.
For some reason Splunk is not ingesting the log data.
Labels (2)
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @sswigart 

Please can you confirm if you can see the _internal events for the hosts which are monitoring those files?

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

sswigart
Explorer

Sir,

When I do a query (index=_internal) looking for records from any of the logs, there are no results.

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Apologies if I wasnt previously clear - the purpose of the check in the _internal index is to check that your forwarder is successfully sending its own internal logs to your indexer(s) - this allows us to establish if the cause is due to a forwarding issue from the forwarder, or a problem reading in the data.

Do you see your forwarder host sending *any* logs (not specific to Trellix) in the _internal index?

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

sswigart
Explorer

I am getting records from 5 or more .log s .

0 Karma

PickleRick
SplunkTrust
SplunkTrust

No, the question wasn't for the logs from the Trellix solution. The question is whether you're geting any Splunk forwarder's own events into your _internal index from the hosts from which you will also want to pull Trellix events.

Also - where and how are you putting those inputs.conf settings?

0 Karma

sswigart
Explorer

I am using the Splunk  Add-on for Microsoft Windows.

The inputs.conf files on the hosts are located in:

C:\SplunkUF\etc\apps\Splunk_TA_windows\local\inputs.conf

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...