

- #SPLUNK SEARCH FOR WINDOWS EVENT ID HOW TO#
- #SPLUNK SEARCH FOR WINDOWS EVENT ID UPDATE#
- #SPLUNK SEARCH FOR WINDOWS EVENT ID CODE#
Notice that we can clearly see the honey token path and associated host system. The output from the search is below for reference. During testing you will obviously have logs and may even need to baseline against EDR or IT related automations that scrub perform directory walks. Now that our logs are being ingested into Splunk we can build search queries that can identify if there are logs associated with our honey tokens. However, you have to decide which design makes sense to deploy. WinLogBeats can also send logs to Splunk using an HTTP Event Collector (HEC) and several other destinations such as Apache Kafka, Logstash, or Elasticsearch. If you already have Splunk deployed, then it may be appropriate to use a UF.

This solution is similar to placing an agent on each endpoint, which we discuss in this blog post’s preceding paragraphs. If you have a Windows Event Collector (WEC) configured in your environment, I would recommend installing a Splunk Universal Forwarder (UF) or WinLogBeats to ship the logs to a Security Information Event Management ( SIEM) platform. Shipping audit logs from a Windows Event Collector (WEC) If the data is not parsed correctly then you need to ensure you have the Windows Technical Addon installed on your indexer. You should see some of the events we generated from part two of this series.
#SPLUNK SEARCH FOR WINDOWS EVENT ID UPDATE#
You may need to restart the UF after you update the configuration and then you should see security events in your SIEM by selecting the wineventlog index as depicted below. The blacklist1 option prevents the UF from sending the noisy events that the UF generates. Splunk has an nf specification file that covers all the configuration option details, but for our purposes the above configuration will get the job done.

This blog post is tailored to meet the objectives of capturing honey token logs and does not reflect a comprehensive security configuration. Note: You will need to properly tune your nf to capture other event logs and scope the traffic you forward. If you only have a handful of systems, you can configure the UF without an app by placing the nf under: $SPLUNK_HOME/etc/system/localĮnsure the nf file has the following contents: īlacklist1 = EventCode="4688" Message="New Process Name:\s+.*SplunkUniversalForwarder"
#SPLUNK SEARCH FOR WINDOWS EVENT ID HOW TO#
Installing and configuring a DS and UF will not be covered in this blog post however, Splunk documentation details how to install and configure a DS and UF. A Splunk Deployment Server (DS) allows us to distribute the configuration settings using an app at scale. Windows Event ID 4663 is found in the Security Event Log, so we will need to configure the Splunk Universal Forwarder (UF) on each endpoint to send the Security Event logs to our Splunk Indexer. I wrote a blog post here, that goes over how to deploy the Splunk UF using a Group Policy Object. Deploying Splunk Universal Forwarders via GPO However, you must protect the script and limit access even to administrators since it is a map to all of your traps.
#SPLUNK SEARCH FOR WINDOWS EVENT ID CODE#
Using code to poll and parse has the added advantage of not requiring an agent on the systems. A more robust solution would be to write a PoSh script that automates reporting when there is a security event related to any of the tokens distributed in your environment.
