I'm looking for a way to have Splunk search an ip range for Windows hosts, and import them as event log sources. All I can find is a way to put them in manually, but that could take quite some time. I've tried plain vanilla Splunk and the app for Windows. Is what I'm looking for a possibility?
Thanks!
This isn't really something that Splunk does. You may want to take a look at nmap to try to identify the Windows hosts:
http://nmap.org/
Of course, you can take the output from nmap and put it back into Splunk to find more information.
HTH,
Dave