Homelab Documentation · v1.0

Installing Splunk Add-on for Sysmon

Splunk Free Edition · Universal Forwarder · Windows Server 2025
Add-on v5.0.0
April 2026
Status: Completed Successfully
Index: wineventlog

00Purpose

Set up proper ingestion and parsing of Sysmon logs from Windows Server 2025 into Splunk Free using the Universal Forwarder and the official Splunk Add-on for Sysmon (v5.0.0).

01Environment Overview

ComponentDetails
Target ServerWindows Server 2025
SysmonInstalled and running in Smart Mode (low noise configuration)
Universal ForwarderInstalled on Windows Server 2025
Splunk InstanceSplunk Free Edition (single-instance setup)
Indexwineventlog
Sysmon Input ConfigAlready added with renderXml = true

02Status Before Add-on Installation

  • Sysmon events were being collected via the Universal Forwarder.
  • Events arriving in Splunk showing as generic sourcetype (xmlwineventlog).
  • No proper field extractions for key Sysmon fields:
    Image CommandLine ParentImage hashes ProcessId DestinationIp
  • Splunk Free UI blocked "Manage Apps" due to missing Auth license feature.

03Download & Extraction Process

FieldValue
Add-on NameSplunk Add-on for Microsoft Sysmon
Version5.0.0
Downloaded FileC:\Tools\Sysmon\splunk-add-on-for-sysmon_500.tgz
Sourcesplunkbase.splunk.com/app/5709

Extraction Steps

1
Extract the .tgz archive

Input: splunk-add-on-for-sysmon_500.tgz  →  Output: Splunk_TA_microsoft_sysmon-5.0.0.tar

Tool: Windows built-in Extract All or 7-Zip

2
Extract the .tar archive

Input: Splunk_TA_microsoft_sysmon-5.0.0.tar  →  Output: Splunk_TA_microsoft_sysmon-5.0.0\

Tool: Windows built-in Extract All or 7-Zip

Extracted Folder Structure

📁 Splunk_TA_microsoft_sysmon-5.0.0\
    📁 default\
    📁 metadata\
NoteNo .exe installer or additional archives are present. This is normal behaviour for Splunk add-ons — they are pure configuration files.

04Installation Steps on Splunk Free

WorkaroundSplunk Free edition blocks the web-based "Install app from file" because it requires the Auth license feature. Manual folder copy to etc\apps\ followed by a restart is the reliable workaround.
1
Copy Add-on to Splunk Apps Directory
Required

Copy the entire extracted folder to the Splunk apps directory.

Source: Splunk_TA_microsoft_sysmon-5.0.0\

Destination: C:\Program Files\Splunk\etc\apps\

PowerShellCopy-Item -Recurse "Splunk_TA_microsoft_sysmon-5.0.0" "C:\Program Files\Splunk\etc\apps\"
2
Restart Splunk
Required

Restart Splunk using PowerShell (Run as Administrator) to load the new add-on.

PowerShellcd "C:\Program Files\Splunk\bin"
.\splunk.exe restart
NoteBoth PowerShell and Command Prompt work for this step.
3
Install on Universal Forwarder
Recommended

Optionally install the same add-on on the Universal Forwarder for improved local parsing and field extraction at the source.

Destination: C:\Program Files\SplunkUniversalForwarder\etc\apps\

PowerShellCopy-Item -Recurse "Splunk_TA_microsoft_sysmon-5.0.0" "C:\Program Files\SplunkUniversalForwarder\etc\apps\"
cd "C:\Program Files\SplunkUniversalForwarder\bin"
.\splunk.exe restart

05Verification

1
Confirm Add-on in Splunk Web

Open Splunk Web at http://localhost:8000 and confirm the add-on appears in the Apps list.

Expected ResultSplunk Add-on for Microsoft Sysmon listed under Apps.
2
Sourcetype Check Search

Run a search to verify the sourcetype has changed correctly.

SPLindex=wineventlog source=*sysmon*
| stats count by sourcetype source
Expected SourcetypeXmlWinEventLog:Microsoft-Windows-Sysmon/Operational
3
Field Extraction Test

Verify that key Sysmon fields are being extracted properly.

SPLindex=wineventlog sourcetype=*sysmon*
| table _time host EventCode Image CommandLine ParentImage ProcessId hashes DestinationIp

Expected fields populated:

_time host EventCode Image CommandLine ParentImage ProcessId hashes DestinationIp

06Lessons Learned

L1 Splunk Free blocks web-based app installation

The "Manage Apps → Install app from file" feature in Splunk Free is disabled because it requires the Auth license feature not included in the free tier.

Resolution: Manual folder copy to etc\apps\ and Splunk restart.

L2 Two-step extraction is required for Splunk add-ons

The download is a .tgz file which must be extracted twice: .tgz.tar, then .tar → folder.

Resolution: Use 7-Zip or Windows built-in Extract All for each layer.

L3 renderXml = true is mandatory

The renderXml = true setting in the Universal Forwarder's inputs.conf is essential. Without it, the Sysmon add-on cannot properly parse the incoming events.

Resolution: Ensure inputs.conf on the Forwarder includes renderXml = true for the Sysmon input.

L4 CLI restart is fully supported

Both PowerShell and Command Prompt work reliably for restarting Splunk and the Universal Forwarder.

Resolution: N/A — either CLI tool works.

07Next Steps

High Tune Sysmon Configuration
Review and refine the Sysmon config.xml to reduce event noise and stay within Splunk Free's 500 MB/day indexing limit.
Medium Create Dedicated Sysmon Index

Create a dedicated index (e.g., sysmon) to separate Sysmon events from other Windows event log data for easier searching and retention management.

SPLindex=sysmon
Medium Build Sysmon Dashboards

Create basic dashboards in Splunk for key Sysmon event codes:

1 Process Creation
3 Network Connection
7 Image Loaded
11 File Created
22 DNS Query
Low Explore Splunk Security Content

Investigate Splunk Security Content detections and analytics that leverage Sysmon data for threat detection use cases.

github.com/splunk/security_content

References