<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311953#M37320</link>
    <description>&lt;P&gt;I think the "ep" means "endpoint". The way I'm understanding it is that the "ep*" indexes are for services on the endpoint that &lt;EM&gt;could&lt;/EM&gt; be from Windows, but are not necessarily from Windows itself. So you could have multiple threat intelligence components (sysmon, Bit9, etc) on the endpoint feeding your epintel index, but these are not Windows Security logs. I believe the same can stand for "epav" -- these logs &lt;EM&gt;could&lt;/EM&gt; come from a built-in Windows Service like Defender, but you could also populate it with another source like SEP or McAfee (or all three if you hate yourself). Meaning you can have multiple sources outside of Windows reporting to these indexes, and they can be for the same overall task (av or intel). In our environment at least, these types of sources have much shorter retention periods, and I care less about the longevity of the data than I do say the OS Security Events like Login/Logoff/Membership changes, etc. So keeping the high-volume (and expensive) endpoint (ep) indexes separate from the more important events allows you to retain the security auditing events in Splunk for longer than you would normally want the endpoint logs.&lt;/P&gt;

&lt;P&gt;Then, searching becomes a little easier as you can just specify "ep*" or "os*" for those types of logs without bringing in &lt;EM&gt;all&lt;/EM&gt; OS logging in one search.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 19:25:58 GMT</pubDate>
    <dc:creator>coltwanger</dc:creator>
    <dc:date>2020-09-29T19:25:58Z</dc:date>
    <item>
      <title>What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311946#M37313</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;

&lt;P&gt;When at customers I like to use the SPL Services TAs for Windows and Linux instead of using the TAs found on Splunkbase, as the SPL Services applications offer more granularity in the inputs. The TA for Windows is named &lt;EM&gt;Splunk_TA_windows&lt;/EM&gt;, and is mainly categorizing the inputs into the following indexes; &lt;EM&gt;oswin&lt;/EM&gt;, &lt;EM&gt;oswinsec&lt;/EM&gt;, &lt;EM&gt;oswinscript&lt;/EM&gt;, &lt;EM&gt;oswinperf&lt;/EM&gt;, and &lt;EM&gt;oswinreg&lt;/EM&gt;. So far so good. However, there are some additional indexes that are used in the TA, namely &lt;EM&gt;epav&lt;/EM&gt;, &lt;EM&gt;epintel&lt;/EM&gt;, and &lt;EM&gt;appmsadmon&lt;/EM&gt;. Can someone explain to me the purpose of these three indexes?&lt;/P&gt;

&lt;P&gt;The SPL Services TA Splunk_TA_windows is found here: &lt;A href="https://bitbucket.org/SPLServices/splunk_ta_windows/downloads/" target="_blank"&gt;https://bitbucket.org/SPLServices/splunk_ta_windows/downloads/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Some more information on the inputs in the TA: &lt;A href="https://www.rfaircloth.com/wp-content/uploads/2017/03/PT005-Microsoft-Windows.pdf" target="_blank"&gt;https://www.rfaircloth.com/wp-content/uploads/2017/03/PT005-Microsoft-Windows.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:51:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311946#M37313</guid>
      <dc:creator>hettervik</dc:creator>
      <dc:date>2020-09-29T18:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311947#M37314</link>
      <description>&lt;P&gt;Utilized Indexes&lt;BR /&gt;
• oswin&lt;BR /&gt;
• oswinsec&lt;BR /&gt;
• oswinscripts&lt;BR /&gt;
• epav (SecKitBase)&lt;BR /&gt;
• epintel (SecKitBase)&lt;BR /&gt;
• netipam (SecKitBase)&lt;/P&gt;

&lt;P&gt;The additional indexes are for the collection of variuos other logs sources - read through the sec 3 ( Index Guidance) for the details.&lt;/P&gt;

&lt;P&gt;there are several TA for log collections would use the above mentioned indexes&lt;/P&gt;

&lt;P&gt;Splunk_TA_windows&lt;BR /&gt;
SA-ModularInput-PowerShell&lt;BR /&gt;
Splunk_TA_windows_SecKit_0_all_inputs&lt;BR /&gt;
Splunk_TA_windows_SecKit_1_all_inputs&lt;BR /&gt;
Splunk_TA_windows_SecKit_2_dhcp_inputs&lt;BR /&gt;
Splunk_TA_windows_SecKit_2_dcadmon_inputs&lt;BR /&gt;
Splunk_TA_windows_SecKit_2_dcadmonsync_inputs&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:51:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311947#M37314</guid>
      <dc:creator>splunker12er</dc:creator>
      <dc:date>2020-09-29T18:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311948#M37315</link>
      <description>&lt;P&gt;Thanks. I understand they are for &lt;EM&gt;other&lt;/EM&gt; log sources, but I don't quite understand &lt;EM&gt;which&lt;/EM&gt; log sources. What is the logic behind changing the naming convention from "oswin" to something completely different, and is there an explanation somewhere of the different indexes? More specifically, what kind of logs is the &lt;EM&gt;epav&lt;/EM&gt;, the &lt;EM&gt;epintel&lt;/EM&gt; and the &lt;EM&gt;appmsadmon&lt;/EM&gt; indexes made for as they are not a part of the standard "oswin" naming convention?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2018 07:31:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311948#M37315</guid>
      <dc:creator>hettervik</dc:creator>
      <dc:date>2018-04-04T07:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311949#M37316</link>
      <description>&lt;P&gt;the doc has the specifications like package name, inputs, etc&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/4697i31A2CD0A99B49ED2/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2018 07:40:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311949#M37316</guid>
      <dc:creator>splunker12er</dc:creator>
      <dc:date>2018-04-04T07:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311950#M37317</link>
      <description>&lt;P&gt;I couldn't attach image here, I posted a sample from the doc. since the log collection is from different sources its routed to different index - explanation is same since its different type of logs &lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2018 07:43:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311950#M37317</guid>
      <dc:creator>splunker12er</dc:creator>
      <dc:date>2018-04-04T07:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311951#M37318</link>
      <description>&lt;P&gt;Alright, so &lt;EM&gt;epintel&lt;/EM&gt; is among other thing used to store sysmon logs, but I still don't get the naming convention behind the indexes. Why isn't sysmon stored in any of the normal oswin-indexes?&lt;/P&gt;

&lt;P&gt;For example, the input "WinEventLog://Microsoft-Windows-Defender/Operational" stores logs in &lt;EM&gt;epav&lt;/EM&gt;, which makes me think that &lt;EM&gt;epav&lt;/EM&gt; is the index for security logs, but then again, that is what the &lt;EM&gt;oswinsec&lt;/EM&gt; index is for, so what is the purpose of the &lt;EM&gt;epav&lt;/EM&gt; index?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2018 07:54:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311951#M37318</guid>
      <dc:creator>hettervik</dc:creator>
      <dc:date>2018-04-06T07:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311952#M37319</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Got some clarifications from the author of the TA himself which I'll copy in below.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;The Windows TA from Splunk base is grandfathered. What it's doing is mashing together inputs into indexes in a way that breaks a few rules.&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Search together stay together&lt;/LI&gt;
&lt;LI&gt;Account for user communities (access control)&lt;/LI&gt;
&lt;LI&gt;Account for retention times&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;The indexes laid down in "SecKit" work out a reasonable pattern for each of these considerations that is also acceptable for most customers requirements.&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;epintel - "Could be "sysmon", could be Carbon Black, could be Bit9. In this case "intelligence" from the endpoint which can be very large and both have strict access control needs and short retention due to costs"&lt;/LI&gt;
&lt;LI&gt;epav - "Could be windows bit defender built into OS or sep or Mcafee etc."&lt;/LI&gt;
&lt;LI&gt;oswin* - OS events Windows / Windows Application and System Events&lt;/LI&gt;
&lt;LI&gt;oswinsec - "Security specific things you probably need to keep for longer periods"&lt;/LI&gt;
&lt;LI&gt;oswinscript - "Splunk scripted inputs with short retention needs"&lt;/LI&gt;
&lt;LI&gt;oswinperf - "Short retention and generally not restricted access" / Windows Performance Metrics&lt;/LI&gt;
&lt;LI&gt;appmsad - Windows Active Directory Events&lt;/LI&gt;
&lt;LI&gt;oswinreg - Windows Registry&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;I think &lt;EM&gt;ep&lt;/EM&gt; stands for "endpoint" and &lt;EM&gt;av&lt;/EM&gt; stands for "anti virus".&lt;/P&gt;

&lt;P&gt;EDIT: More information is found here: &lt;A href="https://splservices.atlassian.net/wiki/spaces/GD/pages/18911978/Splunk+Index"&gt;https://splservices.atlassian.net/wiki/spaces/GD/pages/18911978/Splunk+Index&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 21:32:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311952#M37319</guid>
      <dc:creator>hettervik</dc:creator>
      <dc:date>2018-04-23T21:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311953#M37320</link>
      <description>&lt;P&gt;I think the "ep" means "endpoint". The way I'm understanding it is that the "ep*" indexes are for services on the endpoint that &lt;EM&gt;could&lt;/EM&gt; be from Windows, but are not necessarily from Windows itself. So you could have multiple threat intelligence components (sysmon, Bit9, etc) on the endpoint feeding your epintel index, but these are not Windows Security logs. I believe the same can stand for "epav" -- these logs &lt;EM&gt;could&lt;/EM&gt; come from a built-in Windows Service like Defender, but you could also populate it with another source like SEP or McAfee (or all three if you hate yourself). Meaning you can have multiple sources outside of Windows reporting to these indexes, and they can be for the same overall task (av or intel). In our environment at least, these types of sources have much shorter retention periods, and I care less about the longevity of the data than I do say the OS Security Events like Login/Logoff/Membership changes, etc. So keeping the high-volume (and expensive) endpoint (ep) indexes separate from the more important events allows you to retain the security auditing events in Splunk for longer than you would normally want the endpoint logs.&lt;/P&gt;

&lt;P&gt;Then, searching becomes a little easier as you can just specify "ep*" or "os*" for those types of logs without bringing in &lt;EM&gt;all&lt;/EM&gt; OS logging in one search.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:25:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311953#M37320</guid>
      <dc:creator>coltwanger</dc:creator>
      <dc:date>2020-09-29T19:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: What are the indexes, epintel, epav, and appmsadmon for, in the Splunk Add-on for Microsoft Windows?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311954#M37321</link>
      <description>&lt;P&gt;Thanks! That was the same conclusion I got to after reading on the SPL services on Confluence. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 16:45:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/What-are-the-indexes-epintel-epav-and-appmsadmon-for-in-the/m-p/311954#M37321</guid>
      <dc:creator>hettervik</dc:creator>
      <dc:date>2018-05-07T16:45:47Z</dc:date>
    </item>
  </channel>
</rss>

