We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent b97cf57 commit 3d8919fCopy full SHA for 3d8919f
macros/ms_defender.yml
@@ -1,4 +1,4 @@
1
-definition: source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational"
+definition: source="WinEventLog:Microsoft-Windows-Windows Defender/Operational"
2
description: customer specific splunk configurations(eg- index, source, sourcetype).
3
Replace the macro definition with configurations for your Splunk Environment.
4
name: ms_defender
0 commit comments