We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent c4d5915 commit e66bb09Copy full SHA for e66bb09
macros/ms_defender.yml
@@ -1,4 +1,4 @@
1
-definition: ( source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational"
+definition: source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" OR source="XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational"
2
description: customer specific splunk configurations(eg- index, source, sourcetype).
3
Replace the macro definition with configurations for your Splunk Environment.
4
name: ms_defender
0 commit comments