<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help on AD monitoring with Splunk in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565889#M9868</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thanks for your explanation on&amp;nbsp;&lt;SPAN&gt;Active Directory add on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Just another question&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it also possible to use a DB connect and to link it with the AD forest and to export events in a KV Store lookup?&lt;/P&gt;</description>
    <pubDate>Sat, 04 Sep 2021 06:35:06 GMT</pubDate>
    <dc:creator>jip31</dc:creator>
    <dc:date>2021-09-04T06:35:06Z</dc:date>
    <item>
      <title>Help on AD monitoring with Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565732#M9859</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I try to list the different way to collect Active Directory in Splunk&lt;/P&gt;&lt;P&gt;Except if I am mistaken there is 2 main way to do that :&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="3"&gt;Using the Splunk Supporting Add-on for Active Directory:&amp;nbsp;&amp;nbsp;&lt;A title="https://splunkbase.splunk.com/app/1151/" href="https://splunkbase.splunk.com/app/1151/" target="_self"&gt;https://splunkbase.splunk.com/app/1151/&lt;/A&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;Using the splunk-admon.exe process&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;Is it true? What are the advantages and disadvantages of these solutions please?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;Is it also possible to install a connector between Splunk and AD in order to store the AD events in a KV Store?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;Thanks in advance&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 04:06:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565732#M9859</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2021-09-03T04:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Help on AD monitoring with Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565768#M9861</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/102660"&gt;@jip31&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Splunk recommends using the Active Directory add on. It's much faster, efficient and easy to debug, if you encounter issues on it.&lt;/P&gt;&lt;P&gt;It gives you a connection with the AD forest. After that, all you need to do is to configure a simple search to query the data and outputlookup into a KVStore lookup, just what you're looking for.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;S&lt;/P&gt;&lt;P&gt;***If this helped, please accept it as a solution. It helps others to find the solution for similar issues quickly.***&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 10:24:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565768#M9861</guid>
      <dc:creator>shivanshu1593</dc:creator>
      <dc:date>2021-09-03T10:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Help on AD monitoring with Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565889#M9868</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thanks for your explanation on&amp;nbsp;&lt;SPAN&gt;Active Directory add on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Just another question&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it also possible to use a DB connect and to link it with the AD forest and to export events in a KV Store lookup?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 06:35:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565889#M9868</guid>
      <dc:creator>jip31</dc:creator>
      <dc:date>2021-09-04T06:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: Help on AD monitoring with Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565903#M9871</link>
      <description>&lt;P&gt;I believe you can query AD using SQL commands, so technically it is possible. I'd consult with the server team and see if they are okay with it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To pipe the data into a KVStore using DBconnect is a big pain in the rear end. You'll have to do the following:&lt;/P&gt;&lt;P&gt;1. Create a search using dbquery command and get the desired output from AD forest.&lt;/P&gt;&lt;P&gt;2. Use outputlookup to put the data into KVStore.&lt;/P&gt;&lt;P&gt;3. Save the search as scheduled search to keep the process going.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;S&lt;/P&gt;&lt;P&gt;***If this helped, please accept it as a solution. It helps others to find the solution for similar issues quickly.***&lt;/P&gt;</description>
      <pubDate>Sat, 04 Sep 2021 12:03:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Help-on-AD-monitoring-with-Splunk/m-p/565903#M9871</guid>
      <dc:creator>shivanshu1593</dc:creator>
      <dc:date>2021-09-04T12:03:18Z</dc:date>
    </item>
  </channel>
</rss>

