Splunk Enterprise

Monitoring Trellix log

sswigart
Explorer
I have a requirement to monitor log files created by Trellix on my windows 11 and 2019 hosts. 
The log files are located at C:\ProgramData\McAfee\Endpoint Security\Logs\AccessProtection_Activity.log
                                                                                                                                                              \ExploitPrevention_Activity.log
                                                                                                                                                               \OnDemandScan_Activity.log
                                                                                                                                                                \SelfProtection_Activity.log
 
My stanza in the input.conf are configured as:
 
[monitor://C:\ProgramData\McAfee\Endpoint Security\Logs\AccessProtection_Activity.log
disabled = 0
index = winlogs
sourcetype = WinEventLog:HIPS
start_from = oldest
current_only = 0
checkpointInterval = 5
renderXel = false
 
Same format for each log.
For some reason Splunk is not ingesting the log data.
Labels (2)
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @sswigart 

Please can you confirm if you can see the _internal events for the hosts which are monitoring those files?

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

sswigart
Explorer

Sir,

When I do a query (index=_internal) looking for records from any of the logs, there are no results.

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Apologies if I wasnt previously clear - the purpose of the check in the _internal index is to check that your forwarder is successfully sending its own internal logs to your indexer(s) - this allows us to establish if the cause is due to a forwarding issue from the forwarder, or a problem reading in the data.

Do you see your forwarder host sending *any* logs (not specific to Trellix) in the _internal index?

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

sswigart
Explorer

I am getting records from 5 or more .log s .

0 Karma

PickleRick
SplunkTrust
SplunkTrust

No, the question wasn't for the logs from the Trellix solution. The question is whether you're geting any Splunk forwarder's own events into your _internal index from the hosts from which you will also want to pull Trellix events.

Also - where and how are you putting those inputs.conf settings?

0 Karma

sswigart
Explorer

I am using the Splunk  Add-on for Microsoft Windows.

The inputs.conf files on the hosts are located in:

C:\SplunkUF\etc\apps\Splunk_TA_windows\local\inputs.conf

0 Karma
Get Updates on the Splunk Community!

Splunk Search APIを使えば調査過程が残せます

   このゲストブログは、JCOM株式会社の情報セキュリティ本部・専任部長である渡辺慎太郎氏によって執筆されました。 Note: This article is published in both Japanese ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...