Enabling Sysmon on Windows with Splunk Universal Forwarder
This guide covers the complete setup of Sysmon with Splunk Universal Forwarder to avoid common access denied errors.Prerequisites
- Windows host with administrative access
- Splunk Universal Forwarder installed
- Sysmon executable downloaded
Installation Steps
1. Install Sysmon with Event Log Output
The-l flag is critical - it enables event log output which Splunk requires.
2. Configure Event Log Permissions
By default, the Splunk service account (NT SERVICE\SplunkForwarder) cannot read the Sysmon event log. This causes error code 5 (Access Denied).
3. Configure Splunk Inputs
Add Sysmon event log collection to your Splunk configuration. File:C:\Program Files\SplunkUniversalForwarder\etc\system\local\inputs.conf
4. Verify Configuration
Common Issues
Error: “errorCode=5” - Access Denied
Cause: Splunk service account lacks permission to read Sysmon event log. Solution: Follow step 2 above to grant Event Log Readers permissions.Error: “Could not subscribe to Windows Event Log channel”
Cause: Sysmon not installed with-l flag for event log output.
Solution: Reinstall Sysmon:
Deployment with north.sh
For automated deployment across multiple Windows hosts:Validation
Confirm Sysmon events are being collected:Key Takeaways
- Always use
-lflag when installing Sysmon for Splunk integration - Grant Event Log Readers permission to the Splunk service account immediately after install
- Set SID type to unrestricted before adding service accounts to groups
- Restart the Splunk service after permission changes to apply them Following these steps eliminates the common “Access Denied” errors and ensures reliable Sysmon event collection.