-
Notifications
You must be signed in to change notification settings - Fork 594
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Too many Splunk Forwarder Events in base Sysmon Config #153
Comments
@tbalz2319 you can exclude these by creating new .xml file in 11_file_create folder and running the merge script. The content of the file can be something like this
|
Thank you I will try this out, what exactly merge command shall I use? I see a few different options |
$> cd sysmon modular |
Thank you , I will try this out |
Just tried this and it did not seem to work, The Splunk forwarder events for event-id 11 are still flowing non-stop Do we need to specify a RulgeGroup name? |
Hello,
We are using this config and really like it but we have noticed their are way too many Splunk forwarder events
event-id 11
and the image is Image="C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"
is their anyway I can exclude all of these? Do we need to run specific powershell commands ?
The text was updated successfully, but these errors were encountered: