If you are trying to ingest Windows Event Logs locally, where you have installed Splunk, you can can set it up through the GUI. Take a look here under the section titled, "Use Splunk Web to configure event log monitoring".
If you want to ingest Windows Event Logs from a remote Windows machine, you will need to install a Universal Forwarder to collect and forward the data to your Splunk indexers. On the Windows version of the forwarder, it will prompt you for what you would like to monitor during installation (System, Security, Application logs, performance metrics). In this case, you will need to make sure of a few things:
There are no firewalls blocking communication between the forwarder and the indexers.
You need to configure Splunk to listen on port 9997 (default). see here
As for file monitoring, you can take a look here at the docs. This is a deprecated functionality, meaning, it still works, but could potentially go away in future versions of Splunk Enterprise.
... View more