To learn about the Splunk Add-on for Microsoft Windows, see the official documentation here on docs.splunk.com.
For information on what has been fixed as well as known issues, see the release notes.
The add-on has improved logic for extracting Windows Registry information. (TAG-9106)
Bug fixes.
The add-on has been updated to better handle interaction with host field values in generated event data. (TAG-8935)
Change log (what's been fixed)
A problem with the secrpt-new-users macro has been fixed. (TAG-8945)
A problem with a transform that prevented the "User Account Lockout" dashboard from display events correctly was fixed. (TAG-8915, TAG-8894)
A problem with a transform that prevented security log field extractions from working properly was fixed. (TAG-3433)
The add-on no longer invokes variable key-value field extractions unnecessarily. This should improve overall performance on apps which rely on the add-on. (MSAPP-3293)
Fixed issue where using the Add-On with Splunk 6 caused "typo in stanza" warnings on startup
CIM compliance updates; Compatible with Splunk 6.
The app has been updated to conform to application taxonomy requirements.
Compatible with Splunk App for Windows; Modified to conform with add-on guidelines.
The app is compatible with Splunk 5.0.
WMI performance counters are disabled by default.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.