Hello @SplunkExplorer, Indeed you're right, you can add some lines in the inputs.conf file to tell your Splunk UF to "Monitor more stuff". More precisely, during the UF installation, Splunk should have created an application with an inputs.conf file that you can open and modified at this path : C:\Program Files\SplunkUniversalForwarder\etc\apps\SplunkUniversalForwarder\local If you want to keep all your monitored files/channels in the same place, you can add the new configuration at the bottom of this file (otherwise you could have created a new app and create a new input.conf file)... Nevermind, in order to monitor the powershell logs, you can simply add a new stanza with the following : It will be very similar to the stanza that Splunk created during installation time, since all those type of logs can be retrieved from windows event channels (powershell is just another one, like system, application or security...) [WinEventLog://Windows PowerShell]
checkpointInterval = 5
current_only = 1
disabled = 0
renderXml = 1
evt_resolve_ad_obj = 1 If you want detail of what is the purpose of each key, feel free to check the official inputs.conf doc : https://docs.splunk.com/Documentation/Splunk/9.0.5/Admin/Inputsconf Do not forget to restart your Splunk UF (restart the service or use the "splunk restart" command) ! For DNS logs, I do not know if the logs are registered in a Win Event Channel... Or do you save the logs in a specific location ? This location could be monitored with the same inputs.conf file. Hope it helps ! GaetanVP
... View more