<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to capture Windows Event Code 4672? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119924#M14416</link>
    <description>&lt;P&gt;I was searching and found then enabled here - Program Files/Splunk/etc/system/local/inputs.conf. I'm guessing this overrides the default inputs.conf and I do have a ton of Windows Security events, just not finding that specific event for some reason. We had a 3rd party set this up and they are out of business, so I was trying to figure it out. I may have to get a consultant to help figure this out. Thanks for all of the help.&lt;/P&gt;

&lt;P&gt;/Splunk/etc/system/local/inputs.conf&lt;BR /&gt;
[WinEventLog://Application]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://ForwardedEvents]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;[WinEventLog://HardwareEvents]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;[WinEventLog://Internet Explorer]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[WinEventLog://Setup]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;
disabled = 0&lt;/P&gt;</description>
    <pubDate>Fri, 22 May 2015 13:13:03 GMT</pubDate>
    <dc:creator>don625</dc:creator>
    <dc:date>2015-05-22T13:13:03Z</dc:date>
    <item>
      <title>How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119916#M14408</link>
      <description>&lt;P&gt;I'm not sure where to look, but I was trying to capture Event ID/Code 4672, which is in the Windows Security logs, but I cannot find it within Splunk. I am using Universal Forwaders and so far I am seeing everything I'm looking for except that Event code. Any idea where I can look to see if it's being filtered? I've looked in E:&amp;gt;Program Files&amp;gt;Splunk&amp;gt;etc&amp;gt;system&amp;gt;local at the transforms.conf file and don't see it listed. I wasn't sure if that is a filter of what to include or exclude.&lt;BR /&gt;
Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2015 14:12:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119916#M14408</guid>
      <dc:creator>don625</dc:creator>
      <dc:date>2015-05-21T14:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119917#M14409</link>
      <description>&lt;P&gt;Are you positive that this event is being logged at the source? The filtering would happen in .../Splunk/etc/apps/Splunk_TA_windows/default/&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:01:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119917#M14409</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2020-09-28T20:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119918#M14410</link>
      <description>&lt;P&gt;Thanks for the response. Yes, I can see Event ID: 4672 in the Windows Security logs for the server I am testing. Strange. I tried just searching for 4672 and get nothing. I have about 80 forwarders installed and verified that I am collecting the Security logs. I tested a few looking in the Windows Security log and searching on some Event ID's, 4624 and 4768 and can find those without issue searching Splunk.&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2015 20:21:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119918#M14410</guid>
      <dc:creator>don625</dc:creator>
      <dc:date>2015-05-21T20:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119919#M14411</link>
      <description>&lt;P&gt;/Splunk_TA_windows/default/inputs.conf should have this by default for WinEventLog://Security:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 1
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"
index = wineventlog
renderXml=false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Unless you have a transforms somewhere that applies to the source/sourcetype that applies to these events I am also confused.  Have you tried using btool to help determine what configurations are being applied to your source/sourcetype?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:01:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119919#M14411</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2020-09-28T20:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119920#M14412</link>
      <description>&lt;P&gt;The default\inputs.conf looks like this. I couldn't find that code in tranforms. I haven't use btools. I will look into that. Thanks.&lt;/P&gt;

&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;
    disabled = 1&lt;BR /&gt;
    start_from = oldest&lt;BR /&gt;
    current_only = 0&lt;BR /&gt;
    checkpointInterval = 5&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:02:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119920#M14412</guid>
      <dc:creator>don625</dc:creator>
      <dc:date>2020-09-28T20:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119921#M14413</link>
      <description>&lt;P&gt;Since these inputs are disabled by default are you enabling them somewhere?  .../Splunk_TA_windows/local/ or otherwise?  Perhaps where they are enabled they're also being blacklisted.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:02:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119921#M14413</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2020-09-28T20:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119922#M14414</link>
      <description>&lt;P&gt;first I would verify that you are indexing the Security Eventlog.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Once you are sure that you are indexing the security eventlog, just search for "4672" on that sourcetype and see if anything comes up. &lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2015 04:42:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119922#M14414</guid>
      <dc:creator>muebel</dc:creator>
      <dc:date>2015-05-22T04:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119923#M14415</link>
      <description>&lt;P&gt;To enable collection of the security log you'll want disabled=0&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
 disabled = 0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 22 May 2015 12:30:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119923#M14415</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2015-05-22T12:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119924#M14416</link>
      <description>&lt;P&gt;I was searching and found then enabled here - Program Files/Splunk/etc/system/local/inputs.conf. I'm guessing this overrides the default inputs.conf and I do have a ton of Windows Security events, just not finding that specific event for some reason. We had a 3rd party set this up and they are out of business, so I was trying to figure it out. I may have to get a consultant to help figure this out. Thanks for all of the help.&lt;/P&gt;

&lt;P&gt;/Splunk/etc/system/local/inputs.conf&lt;BR /&gt;
[WinEventLog://Application]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://ForwardedEvents]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;[WinEventLog://HardwareEvents]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;[WinEventLog://Internet Explorer]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[WinEventLog://Setup]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;
disabled = 0&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2015 13:13:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119924#M14416</guid>
      <dc:creator>don625</dc:creator>
      <dc:date>2015-05-22T13:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119925#M14417</link>
      <description>&lt;P&gt;In /Splunk/etc/system/local/inputs.conf it's set to 0 and I am getting a bunch of Windows Security events, except 4672. So far I cannot figure out why it's not being collected.&lt;/P&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://ForwardedEvents]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;[WinEventLog://HardwareEvents]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;[WinEventLog://Internet Explorer]&lt;BR /&gt;
disabled = 1&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;[WinEventLog://Setup]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;
disabled = 0&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2015 15:29:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119925#M14417</guid>
      <dc:creator>don625</dc:creator>
      <dc:date>2015-05-22T15:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119926#M14418</link>
      <description>&lt;P&gt;Check Program Files/Splunk/etc/system/local/props.conf and Program Files/Splunk/etc/system/local/transforms.conf to see if there is anything related to that event code or your Windows Security log.  This is a noisy event so they may have blacklisted it.&lt;/P&gt;

&lt;P&gt;Are you deploying any configurations to them that might have this event blacklisted ... custom TA or the Splunk_TA_windows with local settings? &lt;/P&gt;

&lt;P&gt;Are you sending these events to an indexer or is this a single instance Splunk deployment?  There might be configurations on your indexer/heavy forwarders that are filtering this event if you have them&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:02:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119926#M14418</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2020-09-28T20:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119927#M14419</link>
      <description>&lt;P&gt;I checked the files, Program Files/Splunk/etc/system/local/props.conf and Program Files/Splunk/etc/system/local/transforms.conf and cannot find the code.&lt;/P&gt;

&lt;P&gt;Yes the events are coming from servers with Universal forwarders. I don't think we are blocking with any configs to them. I checked one of the DCs and the props or transforms files in the SplunkUniversalForwarder/etc/apps/Splunk_TA_windows/default directory don't have anything with that event and those files aren't in the local directory.&lt;/P&gt;

&lt;P&gt;This is a single instance of Splunk.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:02:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119927#M14419</guid>
      <dc:creator>don625</dc:creator>
      <dc:date>2020-09-28T20:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows Event Code 4672?</title>
      <link>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119928#M14420</link>
      <description>&lt;P&gt;I have a similar interest except I want to capture Win Event code 4738.&lt;/P&gt;

&lt;P&gt;I know and collected winEventlog:security to my Splunk environment, and i would like to capture code 4738 from each UF to send to me as and alert. Maybe store it in a different index?&lt;/P&gt;

&lt;P&gt;I have hit a wall in the number of UF that I received security logs.  In my case its  16 out of 31 I collect.&lt;/P&gt;

&lt;P&gt;I still want all of the security logs but I would like to extract 1 2 or 3 Eventcode from the security logs as quickly as possible.&lt;/P&gt;

&lt;P&gt;jim&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2016 19:43:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-capture-Windows-Event-Code-4672/m-p/119928#M14420</guid>
      <dc:creator>jkeellogic</dc:creator>
      <dc:date>2016-01-21T19:43:21Z</dc:date>
    </item>
  </channel>
</rss>

