When Endpoint Central is integrated with Splunk, both vulnerability data and audit logs are forwarded to Splunk. This provides administrators with a consolidated view of all detected vulnerabilities and records of actions performed through the console, such as configuration changes, deployments, and administrative activities. Splunk’s analytics can then be used to monitor these events, identify patterns or anomalies, and generate reports and dashboards for auditing, compliance, and security monitoring purposes.
Click Agree and Install. Now you can access the application from the Splunk home page or the Apps menu.


Navigate to Configurations and click the Add button.

In the pop-up window, choose Endpoint Central Cloud from the Deployment Type dropdown menu.

For guidance on the Endpoint Central Instance URL and Zoho Accounts URL, refer to this document. Fill in the appropriate values based on your data center.

Select Self Client, click on Create Now, and then click Create to enable the self client with confirmation.


Copy the below scope and paste it in the Scope section.
Copy
Download the file as JSON, upload it in Splunk, and then click Add to complete the configuration.


Navigate to the Inputs tab in Splunk, click on the Create New Input, and select the log data that you need from Endpoint Central.

Then, click the Add button. If all inputs are valid, the input will be added successfully.
Valid Inputs:

Navigate to the Search tab in the app.

Click on Data Summary and navigate to the Sourcetypes tab.

Search for the required Sourcetype from below and click on it to view the data.
manageengine:ec:vulnerabilitymanageengine:ec:actionlogdata