icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading TA for Microsoft Windows Defender
SHA256 checksum (ta-for-microsoft-windows-defender_108.tgz) f85293d051f68fd04f68c7774abce63039df980c015425be9074c82419fb5f92 SHA256 checksum (ta-for-microsoft-windows-defender_106.tgz) 9f71daa2bec673791dd48757c95f23c7083c268319c49bfcd8854888c1ac1f36 SHA256 checksum (ta-for-microsoft-windows-defender_105.tgz) ace1d45ec8e82607462949a105095585f0185031af933ac78dd8f943954998fd SHA256 checksum (ta-for-microsoft-windows-defender_104.tgz) 09dd25fd73c7281d662e01d996b5a159e2d607a5ec7e4a17da7b57a7127ac3e5 SHA256 checksum (ta-for-microsoft-windows-defender_103.tgz) 2714f25da154e1fd8c6441653c1398a1c6f1b9235dae89e333874900ff9dce4b SHA256 checksum (ta-for-microsoft-windows-defender_102.tgz) 1057faa6c406162ce689639c4663d7ce8038f0eedcb791a0745ca1d7b1219f8b
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

TA for Microsoft Windows Defender

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
Microsoft Windows Defender TA for Splunk®. Contains inputs and extractions for use with Splunk. Also contains mapping to the Malware CIM, particularly useful for use with Splunk Enterprise Security.

TA-microsoft-windefender

Microsoft Windows Defender TA for Splunk®. Inputs and extractions for use
with Splunk®.

Author information

   Original Author: Patrick O'Connell
   Version/Date: 1.0.2 / Oct 1, 2017
   Sourcetype: XmlWinEventLog:Microsoft-Windows-Windows Defender/Operational
   Has index-time ops: false

Update History

   1.0.2 Oct 1, 2017
   --------
   Fixing naming conventions and trademarks per SplunkBase documentation.

   1.0.1 Sep 28, 2017
   --------
   Fixed file_path and file_name extractions. Thanks to people both
   in Slack and the support team working at .Conf 2017.

   1.0.0 Sep 18, 2017
   --------
   Initial release

Using this TA

   Configuration: Install TA via GUI on all search heads, install
   via your preferred method (manual or Deployment Server) on
   forwarders running on Windows running Windows Defender.

   Ensure that you have at least version 6.2.0 universal forwarders.
   This is because of the Windows XML event log format.

   http://blogs.splunk.com/2014/11/04/splunk-6-2-feature-overview-xml-event-logs/

   For information on Windows Defender event codes, see below.
   https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus

Support

   This is a community supported TA. As such, post to answers.splunk.com
   and reference it. Someone should be with you shortly.

   Pull requests via github are welcome! The repository can be found
   at https://github.com/pdoconnell/TA-microsoft-windefender.

Release Notes

Version 1.0.8
Dec. 9, 2021
Version 1.0.6
April 28, 2018

Updates lookups for EventCodes to match new Microsoft definitions, found here (https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus#windows-defender-av-ids). Thanks to Mark Baumgartner of Creighton University for the catch.

Version 1.0.5
Dec. 30, 2017

1.0.5 Dec 30, 2017
--------
Fixed typo in EventTypes.conf. This makes tags work again. Thanks to
Chris Keladis from Katana1.

   1.0.4 Nov 1, 2017
   --------
   Fixed wrong file inclusion for certification.

   1.0.3 Oct 31, 2017
   --------
   Added definitions for all magic values found in Defender logs as of today.

   1.0.2 Oct 1, 2017
   --------
   Fixing naming conventions and trademarks per SplunkBase documentation.

   1.0.1 Sep 28, 2017
   --------
   Fixed file_path and file_name extractions. Thanks to people both
   in Slack and the support team working at .Conf 2017.

   1.0.0 Sep 18, 2017
   --------
   Initial release
Version 1.0.4
Nov. 1, 2017
Version 1.0.3
Oct. 31, 2017

Added definitions for all magic values found in Defender logs as of today.

Version 1.0.2
Oct. 1, 2017

TA for intake of Microsoft Windows Defender logs to Splunk. Initial release, with malware CIM field mapping.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.