Table of Contents
Release Notes ↵
Release notes for the Splunk Add-on for Microsoft IIS¶
Version 2.0.0 of the Splunk Add-on for Microsoft IIS was released on April 9, 2025.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms.
Splunk platform versions | 9.1.x, 9.2.x, 9.3.x, 9.4.x |
CIM | 5.3.1 |
Platforms | Platform-independent |
Vendor Products | Microsoft IIS 10.0 |
Note
Starting with the Add-on version 2.0.0, use the ms:iis:auto
sourcetype for your file monitoring inputs. The following sourcetypes ms:iis:default
, ms:iis:default:85
, and ms:iis:splunk
are now deprecated.
For more information on sourcetypes, see Source types for the Splunk Add-on for Microsoft IIS.
For more information on how to configure your file monitoring data to use ms:iis:auto
sourcetype, see Configure file monitoring inputs using the configuration files.
New features¶
- Introduced the monitoring dashboard. For more details on how to use the monitoring dashboard please refer to the page Monitoring Dashboard reference for the Splunk Add-on for Microsoft IIS
Fixed issues¶
Version 2.0.0 of the Splunk Add-on for Microsoft IIS has the following fixed issues.
Known issues¶
Version 2.0.0 of the Splunk Add-on for Microsoft IIS has the following known issues.
Third-party software attributions¶
Version 2.0.0 of the Splunk Add-on for Microsoft IIS does not incorporate any third-party software or libraries.
Release history for the Splunk Add-on for Microsoft IIS¶
Latest release¶
The latest version of the Splunk Add-on for Microsoft IIS is version 2.0.0. See Release notes for the Splunk Add-on for Microsoft IIS for the release notes of this latest version.
Version 1.3.0¶
Version 1.3.0 of the Splunk Add-on for Microsoft IIS was released on January 30, 2024.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 9.0.x, 9.1.x |
CIM | 5.3.1 |
Platforms | Platform-independent |
Vendor Products | Microsoft IIS 7.0, Microsoft IIS 7.5, Microsoft IIS 8.0, Microsoft IIS 8.5, Microsoft IIS 10.0 |
Note
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
- Added support for a new input powershell://IISModules to collect a list of global modules installed in the IIS Servers. For more information, see Configure Powershell inputs.
Fixed issues¶
Version 1.3.0 of the Splunk Add-on for Microsoft IIS has the following fixed issues.
Known issues¶
Version 1.3.0 of the Splunk Add-on for Microsoft IIS has the following known issues.
Third-party software attributions¶
Version 1.3.0 of the Splunk Add-on for Microsoft IIS does not incorporate any third-party software or libraries.
Version 1.2.0¶
Version 1.2.0 of the Splunk Add-on for Microsoft IIS was released on October 1, 2020.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms.
Splunk platform versions | 7.2.x, 7.3.x, 8.0.x |
CIM | 4.17 |
Platforms | Platform-independent |
Vendor Products | Microsoft IIS 7.0, Microsoft IIS 7.5, Microsoft IIS 8.0, Microsoft IIS 8.5, Microsoft IIS 10.0 |
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New Features¶
- Supports up to version 10 of Microsoft IIS
- Additional source types for Microsoft IIS W3C-standard log files
Fixed issues¶
Version 1.2.0 of the Splunk Add-on for Microsoft IIS has the following fixed issues.
Known issues¶
Version 1.2.0 of the Splunk Add-on for Microsoft IIS has the following known issues.
Third-party software attributions¶
Version 1.2.0 of the Splunk Add-on for Microsoft IIS does not incorporate any third-party software or libraries.
Version 1.0.0¶
Version 1.0.0 of the Splunk Add-on for Microsoft IIS was released on June 8, 2016.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms.
Splunk platform versions | 6.3.X and later |
CIM | 4.4 and later |
Platforms | Platform-independent |
Vendor Products | Microsoft IIS 7.0 and later |
Features¶
Version 1.0.0 is the first release of the Splunk Add-on for Microsoft IIS, which provides inputs and CIM normalization for Microsoft IIS W3C-standard log files. This release ships with the following prebuilt panels that you can add to your dashboard:
- Microsoft IIS - Actions by Dest IP
- Microsoft IIS - Actions by Src IP
- Microsoft IIS - Actions by HTTP Method
Known issues¶
Version 1.0.0 of the Splunk Add-on for Microsoft IIS has the following known issues.
Third-party software attributions¶
Version 1.0.0 of the Splunk Add-on for Microsoft IIS does not incorporate any third-party software or libraries.
Ended: Release Notes
Overview ↵
Splunk Add-on for Microsoft IIS¶
Version | 2.0.0 |
Vendor Products | Microsoft IIS 10.0 |
Visible | No. This add-on does not contain any views. |
The Splunk Add-on for Microsoft IIS allows a Splunk software administrator to collect website activity data in the W3C log file format from Microsoft IIS servers. The Add-on only supports the W3C log file format. It can ingest W3C-compliant log files generated by standard logging as well as advanced logging in IIS. The add-on can also be used to list the global modules installed in the IIS Servers using the Get-WebGlobalModule command.
This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security and the Splunk App for PCI Compliance.
Download the Splunk Add-on for Microsoft IIS from Splunkbase.
For a summary of new features, fixed issues, and known issues, see Release Notes for the Splunk Add-on for Microsoft IIS.
For information about installing and configuring the Splunk Add-on for Microsoft IIS, see Installation and configuration overview for the Splunk Add-on for Microsoft IIS.
Search the Splunk Community page for more information about this add-on.
Hardware and software requirements for the Splunk Add-on for Microsoft IIS¶
Splunk admin requirements¶
To install and configure the Splunk Add-on for Microsoft IIS, you must
be member of the admin
or sc_admin
role.
Microsoft IIS setup requirements¶
You must enable IIS logging for the Web server from which you want to collect data and use the W3C log file format. Refer to the Microsoft IIS documentation for information about configuring logging in IIS. For more information, search for “Configure Logging in IIS” on the Microsoft documentation.
If you use the IIS Advanced Logging Module and you plan to use the the
ms:iis:auto
source type for automatic index-time field extraction, do
not include the EndRequest-UTC
and BeginRequest-UTC
fields when you
configure the logging fields in the IIS Advanced Logging module. These
fields are not W3C-compliant. For more information about configuring
fields using the Advanced Logging Module, search for “Advanced Logging
for IIS - Custom Logging” in the Microsoft documentation.
Splunk platform requirements¶
Because this add-on runs on the Splunk platform, all of the system requirements apply for the Splunk software that you use to run this add-on.
- For Splunk Enterprise system requirements, see System Requirements in the Splunk Enterprise Installation Manual.
- If you are managing on-premises forwarders to get data into Splunk Cloud, see System Requirements in the Splunk Enterprise Installation Manual, which includes information about forwarders.
For information about installation locations and environments, see Install the Splunk Add-on for Microsoft IIS.
Installation and configuration overview for the Splunk Add-on for Microsoft IIS¶
Complete the following steps to install and configure this add-on.
- Install the Splunk Add-on for Microsoft IIS.
- Determine which source type you want to use. See Source types for the Splunk Add-on for Microsoft IIS.
- Configure inputs for the Splunk Add-on for Microsoft IIS.
- (Conditional) If you are using the
ms:iis:default
source type, Configure field transformations for the Splunk Add-on for Microsoft IIS.
Ended: Overview
Installation ↵
Install the Splunk Add-on for Microsoft IIS¶
- Get the Splunk Add-on for Microsoft IIS by downloading it from the Splunkbase or browsing to it using the app browser within Splunk Web.
- Determine where and how to install this add-on in your deployment, using the tables on this page.
- Perform any prerequisite steps before installing, if required and specified in the tables below.
- Complete your installation.
If you need step-by-step instructions on how to install an add-on in your specific deployment environment, see the installation walkthroughs section at the bottom of this page for links to installation instructions specific to a single-instance deployment, distributed deployment, Splunk Cloud, or Splunk Light.
Distributed deployments¶
Use the tables below to determine where and how to install this add-on in a distributed deployment of Splunk Enterprise or any deployment for which you are using forwarders to get your data in. Depending on your environment, your preferences, and the requirements of the add-on, you may need to install the add-on in multiple places.
Where to install this add-on¶
Unless otherwise noted, all supported add-ons can be safely installed to all tiers of a distributed Splunk platform deployment. See Where to install Splunk add-ons in Splunk Add-ons for more information.
This table provides a reference for installing this specific add-on to a distributed deployment of the Splunk platform.
Splunk platform instance type | Supported | Required | Actions required / Comments |
---|---|---|---|
Search Heads | Yes | Yes | Install this add-on to all search heads where Microsoft IIS knowledge management is required. |
Indexers | Yes | Conditional | Not required if you use heavy forwarders to collect data. Required if you use universal forwarders to collect data. |
Heavy Forwarders | Yes | See comments | This add-on supports forwarders of any type for data collection. The forwarder needs to be installed directly on the Microsoft IIS server for directory monitoring. As an alternative, the Microsoft IIS log files can be copied or shared to the machine where the forwarder is installed. |
Universal Forwarders | Yes | See comments |
Distributed deployment feature compatibility¶
This table provides a quick reference for the compatibility of this add-on with Splunk distributed deployment features.
Distributed deployment feature | Supported | Actions required / Comments |
---|---|---|
Search Head Clusters | Yes | You can install this add-on on a search head cluster for all search-time functionality, but configure inputs on forwarders to avoid duplicate data collection. |
Indexer Clusters | Yes | |
Deployment Server | Yes | Supported for deploying the configured add-on to multiple nodes. |
Installation walkthroughs¶
The Splunk Add-Ons manual includes an Installing add-ons guide that helps you successfully install any Splunk-supported add-on to your Splunk platform.
For a walkthrough of the installation procedure, follow the link that matches your deployment scenario:
Ended: Installation
Configuration ↵
Configure inputs in the Splunk Add-on for Microsoft IIS¶
Configure file monitoring inputs¶
Configure directory monitoring inputs on your data collection node for Microsoft IIS logs. Your forwarders must be installed directly on your Microsoft IIS servers or have the Microsoft IIS log files copied or shared to them from the Microsoft IIS servers. You can configure inputs directly on your forwarders or you can configure inputs on a deployment server and push them to your forwarders.
Configure file monitoring inputs using Splunk Web¶
- Log in to Splunk Web.
- Click Settings > Data inputs.
- Click Files & directories.
- Click New.
- In the File or Directory field, specify the path to the
Microsoft IIS standard log directory (default:
%SystemDrive%\inetpub\logs\LogFiles
) or advanced log directory (default:%SystemDrive%\inetpub\logs\AdvancedLogs
), then click Next. - In the Sourcetype field, enter the Microsoft IIS source type
that matches the field extraction you plan to use.
ms:iis:auto
(recommended) - enables automatic index-time field extraction. Supports Splunk recommended MS IIS fields if enabled.ms:iis:default
(deprecated) - enables search-time field extraction.ms:iis:default:85
(deprecated) - enables search-time field extraction. Preferable for MS IIS version 8.5 and greater.ms:iis:splunk
(deprecated) - enables search-time field extraction for Splunk recommended fields MS IIS.
- Click Review and review the information.
- If all the information is correct, click Submit.
Next step
If you have selected the sourcetype ms:iis:default
, ms:iis:default:85
or ms:iis:splunk
, configure the log format to allow extractions using the Configure field transformations for the Splunk Add-on for Microsoft IIS.
Configure file monitoring inputs using the configuration files¶
- Create
$SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-iis/local/inputs.conf
. - Depending on the IIS source type and field extraction method you
want to use, add one of the following stanzas, replacing the default
IIS log directory path name with the actual value in your
environment and the value for index where you want to collect data
into.
Index-time field extraction (Recommended):
Search-time field extraction (Deprecated):
[monitor://C:\inetpub\logs\LogFiles] disabled = false sourcetype = ms:iis:auto index = <preferred index>
[monitor://C:\inetpub\logs\LogFiles] disabled = false sourcetype = [ ms:iis:default | ms:iis:default:85 | ms:iis:splunk ] index = <preferred index>
- Save the file.
- Restart the Splunk platform for the new inputs to take effect.
Configure PowerShell inputs¶
The Splunk Add-on for MS IIS has the following PowerShell input(s). For this, your forwarders must be installed directly on your Microsoft IIS servers. You can configure inputs directly on your forwarders or you can configure inputs on a deployment server and push them to your forwarders:
- powershell://IISModules - This input collects a list of IIS global modules installed on the IIS servers.
Configure PowerShell inputs using Splunk Web¶
- Log in to Splunk Web.
- Select Settings then Data inputs.
- Select Powershell v3 Modular Input.
- The PowerShell input for IISModules must be present.
- Select the IISModules input to update the schedule and then select the More settings checkbox to update the host and index values according to your needs.
- After updating the fields, select Save.
- Select Enable under the Status field to enable the PowerShell input.
Configure Powershell inputs using the configuration files¶
- Create
$SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-iis/local/inputs.conf
. - Copy the “powershell://IISModules” stanza from the
\$SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-iis/default/inputs.conf
to this local conf file. Update the schedule and index values
according to your needs. Example:
[powershell://IISModules] disabled = 0 script = Get-WebGlobalModule schedule = * */1 * * * sourcetype = ms:iis:webglobalmodule index = <preferred index>
- Save the file.
- Restart the Splunk platform for the new input to take effect.
Configure field transformations in the Splunk Add-on for Microsoft IIS¶
If you use the ms:iis:default
, or ms:iis:default:85
or
ms:iis:splunk
source type to enable search-time field extraction,
perform the following additional steps on your search heads.
If you use the ms:iis:auto
source type, skip this procedure. The
ms:iis:auto
source type enables automatic index-time field extraction,
so you do not need to configure these field transformations.
You can complete this configuration on Splunk Web or in the configuration files. If you use this add-on with a search head cluster, perform these configuration steps on one search head node in Splunk Web. The cluster syncs the settings to your other nodes.
Configure field extractions in Splunk Web¶
- Use a text editor to open an IIS W3C-standard log file from the directory you configured the Splunk platform to monitor.
- In the log file, locate the field head line that begins with
#Fields:
. For example:#Fields: date time s-sitename s-computername s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Cookie) cs(Referer) cs-host sc-status sc-substatus sc-win32-status sc-bytes cs-bytes time-taken https
. - Copy the field header line to your clipboard, omitting
"#Fields: "
- On your search head, click Settings > Fields.
- Click Field transformations.
- In the App drop-down, set the app context to Splunk Add-on for Microsoft IIS (Splunk_TA_microsoft-iis).
-
Click the applicable field transformation and edit for the configured sourcetype:
Field transformation Source type auto_kv_for_iis_default ms:iis:default auto_kv_for_iis_default_85 ms:iis:default:85 auto_kv_for_iis_splunk ms:iis:splunk -
In the Fields list field, delete the text that appears and paste the contents of your clipboard.
- Check to make sure the Fields list field exactly matches the field head line from your log file, with “#Fields:” omitted.
- Click Save.
Configure field extractions using configuration files¶
- Use a text editor to open a IIS W3C-standard log file from the directory you configured the Splunk platform to monitor.
- In the log file, locate the field head line that begins with
#Fields:
and copy it to your clipboard. For example:#Fields: date time s-sitename s-computername s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Cookie) cs(Referer) cs-host sc-status sc-substatus sc-win32-status sc-bytes cs-bytes time-taken https
-
Paste the head line from the clipboard at the \$SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-iis/local/transforms.conf in the following manner:
Sourcetype Stanza name in transforms.conf Example ms:iis:default auto_kv_for_iis_default [auto_kv_for_iis_default]
DELIMS = ” “
FIELDS = date time s-sitename s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs(User-Agent) sc-status sc-substatus sc-win32-status httpsms:iis:default:85 auto_kv_for_iis_default_85 [auto_kv_for_iis_default_85]
DELIMS = ” “
FIELDS = date time s-sitename s-computername s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Cookie) cs(Referer) cs-host sc-status sc-substatus sc-win32-status sc-bytes cs-bytes time-taken httpsms:iis:splunk auto_kv_for_iis_splunk [auto_kv_for_iis_splunk]
DELIMS = ” “
FIELDS = date time s-sitename s-computername s-ip cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs-version cs(User-Agent) cs(Cookie) cs(Referer) cs-host sc-status sc-substatus sc-win32-status sc-bytes cs-bytes time-taken X-Forwarded-For Content-Type https -
Save
transforms.conf
. - Restart the search head for the configuration to take effect.
Configure recommended fields in the Splunk Add-on for Microsoft IIS¶
Splunk recommends you to configure these fields for your business needs. There are different configuration instructions for different versions of Microsoft IIS.
For Microsoft IIS versions 8.5 and 10.0¶
- Open IIS Manager.
- On server, site or application level, double click on Logging.
- Click Select Fields.
- In W3C Logging Fields window, select all the fields listed under Standard Fields.
- Click “Add Field under “Custom Fields box.
-
In the Add Custom Field window, fill out the following fields and click on OK after adding each field in top-down order.
Field name Source type Source X-Forwarded-For Request Header X-Forwarded-For Content-Type Request Header Content-Type https Server Variable HTTPS -
Click OK in the W3C Logging Fields window.
- Click Apply in the actions pane.
For Microsoft IIS versions 7, 7.5 and 8.0¶
- Open IIS Manager.
- On server, site or application level, double click Advanced Logging.
- In the action pane on right side, click Enable Advanced Logging.
- In the action pane, click Edit Logging Fields.
- In the new window, click Add Field.
-
In Add Logging Field window, fill out the following fields and click on OK after adding the below fields in top-down order:
Field Name Source Type Source X-Forwarded-For Request Header X-Forwarded-For Content-Type Request Header Content-Type https Server Variable HTTPS -
In the middle pane, select the default log definition
%COMPUTERNAME%-Server
. Click Edit Log Definition. - Click Select Logging Fields.
- Select X-Forwarded-For, Content-Type and https from the list. Click OK.
- Click Apply in the actions pane.
Ended: Configuration
Troubleshooting ↵
Troubleshoot the Splunk Add-on for Microsoft IIS¶
For troubleshooting tips that you can apply to all add-ons, see Troubleshoot add-ons in Splunk Add-ons. For additional resources, see Support and resource links for add-ons in Splunk Add-ons.
When should I use different source types?¶
- Use
ms:iis:default:85
if you have multiple MS IIS versions or versions 8.5 and greater. This enables you to differentiate the data of multiple MS IIS versions. - Use
ms:iis:splunk
if you enable the Splunk recommended fields, as that will enrich your IIS log data’s CIM mapping to Web data model which you can use to build your dashboards.
The “url” field has “http://” scheme even when the requests are made via HTTPS.¶
Enable the HTTPS Server variable and update the transform corresponding to the source type for this issue. Name this custom field as “https” ONLY. You’ll receive the correct url that you input.
The “url” field mapped to Web data model isn’t extracting.¶
Make sure the fields https, cs-host, s-ip, s-port, cs-uri-stem, cs-uri-query are enabled in MS IIS. If search-time extraction is used, its expected field extraction is mentioned in \$SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-iis/local/transforms.conf. If index-time extraction is used, make sure the log file is rolled over with the new headers.
I can’t launch the add-on!¶
This add-on does not have views and is not intended to be visible in Splunk Web. If you are trying to launch or load views for this add-on and you are experiencing results you do not expect, turn off visibility for the add-on.
For more details about add-on visibility and instructions for turning visibility off, see Troubleshoot add-ons in Splunk Add-ons.
Index Time extractions are not working correctly in ms:iis:auto
sourcetype after changing log format on MS IIS side. Multiple #Fields:
headers appear within the same log file.¶
Microsoft IIS log files follow the W3C
format.
However, if multiple #Fields:
headers with different fields appear within the same log file, index-time extraction fails.
This occurs when the header fields changes on the MS IIS side, disrupting the extraction process.
Since Splunk does not support dynamic headers within the same file, the issue must be addressed at the MS IIS end.
To narrow down the impact of multiple #Fields:
headers with different fields in a single file, switch the log rotation to hourly to reduce the likelihood of this issue:
- In the
Internet Information Services (IIS) Manager
, go toLogging
tab. - In the
Log File Rollover
section, set theschedule
tohourly
.
This configuration creates a new log file every hour and the issue does not occur when monitoring the new log file.
Ended: Troubleshooting
Reference ↵
Lookups for the Splunk Add-on for Microsoft IIS¶
The Splunk Add-on for Microsoft IIS has one
lookup. The lookup file maps fields
from Microsoft IIS systems to CIM-compliant values in the Splunk
platform. The lookup file is located in
$SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-iis/lookups
.
Filename | Description |
---|---|
iis_action_lookup.csv |
Maps Microsoft iis_status to action |
Source types for the Splunk Add-on for Microsoft IIS¶
The Splunk Add-on for Microsoft IIS provides the index-time and search-time knowledge for Microsoft IIS Web site activity data in the following formats.
Determine which source type to use based on the field extraction method you plan to use. Use either search-time field extraction or index-time field extraction, but not both. Using both field extraction methods on the same data source will produce redundant indexed events.
Source type | Description | CIM data models |
---|---|---|
ms:iis:splunk |
(deprecated) - Microsoft IIS log files in W3C format. Use this source type to enable search-time field extraction. The field list contains Splunk recommended MS IIS fields to enrich CIM mapping. | Web |
ms:iis:default:85 |
(deprecated) - Microsoft IIS log files in W3C format. Use this source type to enable search-time field extraction. Recommended source type for IIS log files for MS IIS 8.5 and higher. | Web |
ms:iis:default |
(deprecated) - Microsoft IIS log files in W3C format. Use this source type to enable search-time field extraction. | Web |
ms:iis:auto |
(recommended) - Microsoft IIS log files in W3C format. Use this source type to enable automatic index-time field extraction. | Web |
ms:iis:webglobalmodule |
Use this source type to list the global modules present in all the IIS servers in the cluster, which can be used to observe any anomaly among the modules. |
The advantage of ms:iis:auto
sourcetype is that it uses index-time field extraction, relying on Splunk platform’s built-in capability to recognize and process the W3C
log format, regardless of the fields and their order logged by IIS. It does not require any additional Splunk configuration. However, the index-time field extraction requires more storage space than search-time field extraction.
Additionally, an issue might occur with index-time field extraction, when a log file contains multiple #Fields:
headers within the same file. For more information on how to resolve the issue, see Troubleshooting.
Search-time field extraction requires additional configurations in
transforms.conf
to match your log format. For configuration
instructions, see
Configure field transformations for the Splunk Add-on for Microsoft IIS.
Monitoring Dashboard reference for the Splunk Add-on for Microsoft IIS¶
View the monitoring dashboard by doing the following steps:
- Select the Search & Reporting app.
- Select Dashboards.
- Select Microsoft IIS Monitoring Dashboard.
Add the monitoring dashboard to your home view by doing the following steps:
- Select the Search & Reporting app.
- Select Dashboards.
- Select Edit in the Microsoft IIS Monitoring Dashboard section.
- Select Set as home dashboard.
Optional filters¶
Filter | Description |
---|---|
Time | Select the time range to view |
Index | Filter based on indexes |
Host | Filter based on host values |
Sourcetypes | Filter for source types of events |
Sources | Filter based on sources of events |
Visualization Panels¶
Panel | Description |
---|---|
Microsoft IIS TA Version | Displays the Microsoft IIS add-on version of environment |
Total number of events | Displays total number of events for the Windows add-on |
Event count per time span | Shows events ingestion count per time span |
Events by sourcetypes | Displays events distribution by source types |
Events by sources | Shows events distribution by sources |
Trends of events by sourcetypes | Shows trends of events by source type |
CIM Supported Events | Displays total events mapped with tags |