<%= _('Local Event Logs').t() %>
<%= _('Collect event logs from this machine.').t() %>
<%= _('Remote Event Logs').t() %>
<%= _('Collect event logs from remote hosts. Note: this uses WMI and requires a domain account.').t() %>
<%= _('Files & Directories').t() %>
<%= _('Upload a file, index a local file, or monitor an entire directory.').t() %>
<%= _('TCP / UDP').t() %>
<%= _('Configure Splunk to listen on a network port.').t() %>
<%= _('Local Performance Monitoring').t() %>
<%= _('Collect performance data from this mchine.').t() %>
<%= _('Remote Performance Monitoring').t() %>
<%= _('Collect performance and event information from remote hosts. Requires domain credentials.').t() %>
<%= _('Registry monitoring').t() %>
<%= _('Have Splunk index the local Windows Registry, and monitor it for changes.').t() %>
<%= _('Active Directory monitoring').t() %>
<%= _('Index and monitor Active Directory.').t() %>
<%= _('Local Windows host monitoring').t() %>
<%= _('Collect up-to-date hardware and software (Computer, Operating System, Processor, Service, Disk, Network Adapter and Application) information about this machine.').t() %>
<%= _('Local Windows network monitoring').t() %>
<%= _('This is an input for Splunk Network Monitor.').t() %>
<%= _('Local Windows print monitoring').t() %>
<%= _('Collect information about printers, printer jobs, print drivers, and print ports on this machine.').t() %>
<%= _('Scripts').t() %>
<%= _('Get data from from any API, service, or database with a script.').t() %>