<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk UF WinEventlog Security Event data missing in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743462#M22036</link>
    <description>&lt;P&gt;I think your whitelist setting should be correctly formatted; try using &lt;STRONG&gt;whitelist = 4624,4625 &lt;/STRONG&gt;to ensure proper filtering and, confirm whether &lt;STRONG&gt;renderXml=false&lt;/STRONG&gt; is appropriate, as XML-based logs may require &lt;STRONG&gt;renderXml=true&lt;/STRONG&gt; for accurate extraction.&lt;BR /&gt;&lt;BR /&gt;Next, check if Windows is generating these events by running this command in PowerShell.&lt;STRONG&gt;&lt;BR /&gt;Get-WinEvent -LogName Security | Where-Object { $_.Id -eq 4624 -or $_.Id -eq 4625 } | Select-Object -First 10&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If no events appear, ensure that Windows auditing policies are correctly configured by navigating to &lt;STRONG&gt;gpedit.msc → Advanced Audit Policy Configuration → Audit Policies → Logon/Logoff → Audit Logon&lt;/STRONG&gt;, and verifying that success and failure logging is enabled.&lt;BR /&gt;&lt;BR /&gt;You can also confirm this by running &lt;STRONG&gt;auditpol /get /subcategory:"Logon"&lt;/STRONG&gt; in PowerShell.&lt;/P&gt;&lt;P&gt;If you see errors like -&amp;nbsp;It could indicate a misconfiguration in &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ERROR ExecProcessor - message from "WinEventLog" The parameter is incorrect.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;And, perform a Splunk search to confirm if any relevant events have been indexed by running :&lt;BR /&gt;&lt;STRONG&gt;index=* sourcetype=Security:AD_Sec_entmon EventCode=4624 OR EventCode=4625&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;If no results appear, try searching with &lt;STRONG&gt;index=* EventCode=4624 OR EventCode=4625&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;OR&lt;/STRONG&gt; check index metadata with &lt;STRONG&gt;| metadata type=sourcetypes index=wineventlog&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;If data is still missing, it’s worth testing with the default Splunk sourcetype by modifying &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; to use &lt;STRONG&gt;sourcetype=WinEventLog:Security&lt;/STRONG&gt; instead.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;[WinEventLog://Security]&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;index = wineventlog&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;sourcetype=WinEventLog:Security&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;disabled = 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;start_from = oldest&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;current_only = 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;evt_resolve_ad_obj = 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;checkpointInterval = 300&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;whitelist = 4624,4625&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;After making any configuration changes, restart the Splunk Universal Forwarder using &lt;STRONG&gt;splunk restart&lt;/STRONG&gt; or &lt;STRONG&gt;Restart-Service SplunkForwarder&lt;/STRONG&gt; on Windows.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Apr 2025 09:32:58 GMT</pubDate>
    <dc:creator>iamsahilshaiks</dc:creator>
    <dc:date>2025-04-04T09:32:58Z</dc:date>
    <item>
      <title>Splunk UF WinEventlog Security Event data missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/742281#M21908</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;We are trying to configure event monitoring for Security Event ID 4624 (successful login) and Event ID 4625 (unsuccessful login) for an Account. We have created the app with the below stanza in inputs.conf file&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[WinEventLog://Security]&lt;BR /&gt;index = wineventlog&lt;BR /&gt;sourcetype=Security:AD_Sec_entmon&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 1&lt;BR /&gt;evt_resolve_ad_obj = 1&lt;BR /&gt;checkpointInterval = 300&lt;BR /&gt;whitelist = EventCode="4624|4625"&lt;BR /&gt;#renderXml=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;However, there is no data though the app has been successfully deployed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please assist me on this issue.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 03:39:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/742281#M21908</guid>
      <dc:creator>rukshar</dc:creator>
      <dc:date>2025-03-20T03:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk UF WinEventlog Security Event data missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/742283#M21910</link>
      <description>&lt;P&gt;1. Why are you using custom sourcetype? There are already well-defined knowledge objects for the standard windows eventlog sourcetypes which come with TA_windows.&lt;/P&gt;&lt;P&gt;2. You can't define two separate instances of the same input (in your case - WinEventLog://Security). So check with btool what are the effective settings for your input after layering your own app and windows built-in stuff (and possibly TA_windows).&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 08:15:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/742283#M21910</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-03-20T08:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk UF WinEventlog Security Event data missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/742290#M21911</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256482"&gt;@rukshar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have the&lt;EM&gt;Splunk_TA_windows&lt;/EM&gt; installed as well?&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you not making the changes in&amp;nbsp;&lt;EM&gt;Splunk_TA_windows/local&amp;nbsp;&lt;/EM&gt;and are using your own custom app with a default directory rather than local then you need to make sure the custom app has a higher order of precedence than the&amp;nbsp;&lt;EM&gt;Splunk_TA_windows&amp;nbsp;&lt;/EM&gt;app. e.g 100_yourOrg_wininputs (Precendence goes 0-9A-Za-z)&lt;/P&gt;&lt;P&gt;For more info on precedence check out&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/admin/Wheretofindtheconfigurationfiles" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/admin/Wheretofindtheconfigurationfiles&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Please let me know how you get on and consider adding karma to this or any other answer if it has helped.&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Will&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 08:45:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/742290#M21911</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-03-20T08:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk UF WinEventlog Security Event data missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743420#M22031</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256482"&gt;@rukshar&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;the stanza looks good, make sure it is placed in the right location:&lt;BR /&gt;either: /opt/splunkforwarder/etc/system/local&lt;/P&gt;&lt;P&gt;or : /opt/splunkforwarder/etc/apps/&amp;lt;yourapp&amp;gt;/local&lt;BR /&gt;also double check you have an outputs.conf , also a quick restart won't hurt.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 16:23:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743420#M22031</guid>
      <dc:creator>splunkmarroko</dc:creator>
      <dc:date>2025-04-03T16:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk UF WinEventlog Security Event data missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743436#M22035</link>
      <description>&lt;P&gt;In addition to the other answers, you may also want to check that your forwarder is not having permission problems in reading the Security wineventlog. If you install the unprivileged windows forwarder and do not add the SplunkForwarder virtual user to the "Event Log Readers" group, then it may fail to subscribe to the Security event log channel.&lt;/P&gt;&lt;P&gt;Search: (assuming that your forwarder IS sending internal logs, but not windows event logs)&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal host=&amp;lt;host&amp;gt; errorCode=5 "unable to subscribe to Windows Event Log"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 17:38:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743436#M22035</guid>
      <dc:creator>marnall</dc:creator>
      <dc:date>2025-04-03T17:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk UF WinEventlog Security Event data missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743462#M22036</link>
      <description>&lt;P&gt;I think your whitelist setting should be correctly formatted; try using &lt;STRONG&gt;whitelist = 4624,4625 &lt;/STRONG&gt;to ensure proper filtering and, confirm whether &lt;STRONG&gt;renderXml=false&lt;/STRONG&gt; is appropriate, as XML-based logs may require &lt;STRONG&gt;renderXml=true&lt;/STRONG&gt; for accurate extraction.&lt;BR /&gt;&lt;BR /&gt;Next, check if Windows is generating these events by running this command in PowerShell.&lt;STRONG&gt;&lt;BR /&gt;Get-WinEvent -LogName Security | Where-Object { $_.Id -eq 4624 -or $_.Id -eq 4625 } | Select-Object -First 10&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If no events appear, ensure that Windows auditing policies are correctly configured by navigating to &lt;STRONG&gt;gpedit.msc → Advanced Audit Policy Configuration → Audit Policies → Logon/Logoff → Audit Logon&lt;/STRONG&gt;, and verifying that success and failure logging is enabled.&lt;BR /&gt;&lt;BR /&gt;You can also confirm this by running &lt;STRONG&gt;auditpol /get /subcategory:"Logon"&lt;/STRONG&gt; in PowerShell.&lt;/P&gt;&lt;P&gt;If you see errors like -&amp;nbsp;It could indicate a misconfiguration in &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ERROR ExecProcessor - message from "WinEventLog" The parameter is incorrect.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;And, perform a Splunk search to confirm if any relevant events have been indexed by running :&lt;BR /&gt;&lt;STRONG&gt;index=* sourcetype=Security:AD_Sec_entmon EventCode=4624 OR EventCode=4625&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;If no results appear, try searching with &lt;STRONG&gt;index=* EventCode=4624 OR EventCode=4625&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;OR&lt;/STRONG&gt; check index metadata with &lt;STRONG&gt;| metadata type=sourcetypes index=wineventlog&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;If data is still missing, it’s worth testing with the default Splunk sourcetype by modifying &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; to use &lt;STRONG&gt;sourcetype=WinEventLog:Security&lt;/STRONG&gt; instead.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;[WinEventLog://Security]&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;index = wineventlog&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;sourcetype=WinEventLog:Security&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;disabled = 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;start_from = oldest&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;current_only = 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;evt_resolve_ad_obj = 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;checkpointInterval = 300&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;whitelist = 4624,4625&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;After making any configuration changes, restart the Splunk Universal Forwarder using &lt;STRONG&gt;splunk restart&lt;/STRONG&gt; or &lt;STRONG&gt;Restart-Service SplunkForwarder&lt;/STRONG&gt; on Windows.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2025 09:32:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743462#M22036</guid>
      <dc:creator>iamsahilshaiks</dc:creator>
      <dc:date>2025-04-04T09:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk UF WinEventlog Security Event data missing</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743485#M22038</link>
      <description>&lt;P&gt;Let me interject here, &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/309052"&gt;@iamsahilshaiks&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For regex-based whitelisting it's not as simple as just puting the regex on its own. See &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/admin/inputsconf#Event_Log_allow_list_and_deny_list_formats" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/admin/inputsconf#Event_Log_allow_list_and_deny_list_formats&lt;/A&gt; - you have to&lt;/P&gt;&lt;P&gt;1. Provide a key which will be matched against the regex&lt;/P&gt;&lt;P&gt;2. Enclose the regex in delimiters of your choice.&lt;/P&gt;&lt;P&gt;So your example of &lt;STRONG&gt;whitelist = (?m)^4624$|^4625$&lt;/STRONG&gt; is completely wrong.&lt;/P&gt;&lt;P&gt;Additionally, if you're exporting events as XML (which is currently the preferred way because traditional format tends to have some problems with parsing), you use XmlRegex key for filtering.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;splunk list monitor&lt;/STRONG&gt; only list - as the name says - monitor type inputs which read files from the disk. Windows event log sources are not of monitor type.&lt;/P&gt;&lt;P&gt;Last time I checked, &lt;STRONG&gt;grep&lt;/STRONG&gt; was neither a standard CMD-usable tool nor a standard powershell cmdlet. And Windows doesn't use the $ notation for environment variables.&lt;/P&gt;&lt;P&gt;As far as I remember, the events from Security log are not recast to another sourcetype. And actually your input stanza matches the "old way" of ingesting windows logs, which hasn't been used for several years now. Currently, the sourcetype for all windows logs should be WinEventlog or XmlWinEventlog depending on whether you're rendering them to XML or not. It's the source field which specifies the point of origin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2025 08:10:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-UF-WinEventlog-Security-Event-data-missing/m-p/743485#M22038</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-04-04T08:10:46Z</dc:date>
    </item>
  </channel>
</rss>

