Sysmon Setup for Splunk Universal Forwarder
Overview
This guide configures Sysmon event collection on Windows endpoints using Splunk Universal Forwarder for the north.sh platform.Prerequisites
- Windows endpoint with Splunk UF installed
- Administrative access
- Sysmon not yet installed
Installation Steps
1. Install Sysmon
Download and install Sysmon with SwiftOnSecurity’s configuration:2. Configure Splunk UF Inputs
Edit%SPLUNK_HOME%\etc\system\local\inputs.conf and add:
3. Restart Splunk UF
4. Verify Data Collection
Search in Splunk (north.sh platform):Common Issues
Sysmon events not appearing:- Verify Sysmon service is running:
Get-Service Sysmon64 - Check Event Viewer for Sysmon/Operational logs
- Ensure
renderXml = truefor proper field extraction Permission errors: - Run Splunk UF service as Local System (default)
- Verify service account has event log read permissions
Configuration Notes
renderXml = true: Enables proper field extraction for all Windows eventsstart_from = oldest: Collects historical events (change tocurrentfor new events only)checkpointInterval = 5: Prevents data loss during restarts- Default index is
windows(adjust per north.sh requirements)