<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Netwrix TA in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/572512#M101322</link>
    <description>&lt;P&gt;Has anyone ever installed the Netwrix addon in Splunk? Having a bit of trouble with how to do so.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Oct 2021 16:58:30 GMT</pubDate>
    <dc:creator>Okezie1</dc:creator>
    <dc:date>2021-10-26T16:58:30Z</dc:date>
    <item>
      <title>Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/572512#M101322</link>
      <description>&lt;P&gt;Has anyone ever installed the Netwrix addon in Splunk? Having a bit of trouble with how to do so.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 16:58:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/572512#M101322</guid>
      <dc:creator>Okezie1</dc:creator>
      <dc:date>2021-10-26T16:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575644#M101752</link>
      <description>&lt;P&gt;can you provide a link to that addon, I'm not able to find it on splunkbase.&lt;/P&gt;&lt;P&gt;or perhaps you're talking about the netwrix addon for splunk&amp;nbsp; which is a powershell script that is writing netwrix events to windows event log&amp;nbsp; so that splunk ufw can collect it ?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 14:04:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575644#M101752</guid>
      <dc:creator>acadea</dc:creator>
      <dc:date>2021-11-19T14:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575647#M101753</link>
      <description>&lt;P&gt;There is no Splunkbase TA. I'm referring to the&amp;nbsp;&lt;SPAN&gt;Netwrix addon for Splunk which is a PowerShell script.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 14:39:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575647#M101753</guid>
      <dc:creator>Okezie1</dc:creator>
      <dc:date>2021-11-19T14:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575651#M101754</link>
      <description>&lt;P&gt;yes, I've configured the netwrix powerhsll script to be executed as a scheduled task .&amp;nbsp;&lt;BR /&gt;- also enabled the API on Netwrix ( see settings, API)&lt;BR /&gt;- configured splunk UFW to collect the windows event log netwrix_integration_bla_bla&lt;/P&gt;&lt;P&gt;what is the blocking point for you?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 14:49:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575651#M101754</guid>
      <dc:creator>acadea</dc:creator>
      <dc:date>2021-11-19T14:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575653#M101756</link>
      <description>&lt;P&gt;We were able to create a deployment app on our Heavy Forwarder, created a serverclass as well,&amp;nbsp; and customized the inputs.conf to grab the Winevent logs. However, the client stated that they were only receiving general audit information that showed who logged in, etc but didn't receive the actual log information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/MonitorWindowseventlogdata#Monitor_Windows_event_log_data_with_Splunk_Cloud_Platform" target="_blank"&gt;https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/MonitorWindowseventlogdata#Monitor_Windows_event_log_data_with_Splunk_Cloud_Platform&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the link we used to assist.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 14:54:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575653#M101756</guid>
      <dc:creator>Okezie1</dc:creator>
      <dc:date>2021-11-19T14:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575656#M101758</link>
      <description>&lt;P&gt;who logged in... where ? on Netwrix ? on Windows/AD ?&lt;/P&gt;&lt;P&gt;there are 3 Netwrix generated eventlogs on Windows&lt;/P&gt;&lt;P&gt;[WinEventLog://Netwrix Auditor] - &amp;gt; this is the same EventLog that you can see in Netwrix interface regarding events related to data collection etc&lt;/P&gt;&lt;P&gt;[WinEventLog://Netwrix Auditor Security] - &amp;gt; this is containing Netwrix on Netwrix audit, that is who has started Netwrix, what changes were done in the Netwrix interface, etc. &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Netwrix&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;Auditor&lt;/SPAN&gt; &lt;SPAN class=""&gt;Self-audit&lt;/SPAN&gt; let's say. I suppose this is what you're describing as currently collected.&lt;/P&gt;&lt;P&gt;[WinEventLog://Netwrix_Auditor_Integration] - &amp;gt; this is what you're after. It should have this format:&lt;/P&gt;&lt;DIV class=""&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;08/24/2021&lt;/SPAN&gt; &lt;SPAN class=""&gt;09:56:37&lt;/SPAN&gt; &lt;SPAN class=""&gt;AM&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;LogName=Netwrix_Auditor_Integration&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;SourceName=Netwrix_Auditor_Integration_API&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;EventCode=35940&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;EventType=4&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Type=Information&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;ComputerName=srv-01&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;TaskCategory=492&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;OpCode=Info&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;RecordNumber=41188878&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Keywords=Classic&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Message=&lt;BR /&gt;DataSource&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Windows&lt;/SPAN&gt; &lt;SPAN class=""&gt;Server&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Action&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Modified&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Message:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Modified&lt;/SPAN&gt; &lt;SPAN class=""&gt;System&lt;/SPAN&gt; &lt;SPAN class=""&gt;Time&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Where&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;srv-01&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;ObjectType&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;System&lt;/SPAN&gt; &lt;SPAN class=""&gt;Time&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Who&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;NT&lt;/SPAN&gt; &lt;SPAN class=""&gt;AUTHORITY\SYSTEM&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;What&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;System&lt;/SPAN&gt; &lt;SPAN class=""&gt;Properties\System&lt;/SPAN&gt; &lt;SPAN class=""&gt;Time&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;When&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;2021-08-24T07:36:22Z&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Workstation&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;Details&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;System&lt;/SPAN&gt; &lt;SPAN class=""&gt;time&lt;/SPAN&gt; &lt;SPAN class=""&gt;changed&lt;/SPAN&gt; &lt;SPAN class=""&gt;from&lt;/SPAN&gt; "&lt;SPAN class=""&gt;2021-08-24T07:36:08.173840600Z&lt;/SPAN&gt;" &lt;SPAN class=""&gt;to&lt;/SPAN&gt; "&lt;SPAN class=""&gt;2021-08-24T07:36:22.192000000Z"&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 19 Nov 2021 15:22:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575656#M101758</guid>
      <dc:creator>acadea</dc:creator>
      <dc:date>2021-11-19T15:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575666#M101762</link>
      <description>&lt;P&gt;My apologies, it was the&amp;nbsp;&lt;SPAN&gt;Netwrix Auditor Security I was referring to.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 15:38:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575666#M101762</guid>
      <dc:creator>Okezie1</dc:creator>
      <dc:date>2021-11-19T15:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575668#M101763</link>
      <description>&lt;P&gt;well, collect the other eventlog and maybe that will solve your problem ?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 15:41:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575668#M101763</guid>
      <dc:creator>acadea</dc:creator>
      <dc:date>2021-11-19T15:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: Netwrix TA</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575675#M101765</link>
      <description>&lt;P&gt;I'll add the&amp;nbsp;&lt;SPAN&gt;[WinEventLog://Netwrix Auditor]&amp;nbsp; and&amp;nbsp;[WinEventLog://Netwrix_Auditor_Integration] stanzas as well and see what we're able to pull.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 15:59:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Netwrix-TA/m-p/575675#M101765</guid>
      <dc:creator>Okezie1</dc:creator>
      <dc:date>2021-11-19T15:59:11Z</dc:date>
    </item>
  </channel>
</rss>

