<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [WinEventLog://Security] logs to Splunk in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648953#M110286</link>
    <description>&lt;P&gt;Thanks for the suggestion Sri. Will try it out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Murali&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jul 2023 06:33:27 GMT</pubDate>
    <dc:creator>Murali</dc:creator>
    <dc:date>2023-07-03T06:33:27Z</dc:date>
    <item>
      <title>[WinEventLog://Security] logs to Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648949#M110284</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have&amp;nbsp;[WinEventLog://Security] inputs.conf&amp;nbsp; setup.&lt;/P&gt;&lt;P&gt;However , I would like to see the machine/server type and OS type in the index which is currently not there.&lt;/P&gt;&lt;P&gt;How can I bring this data in. I have checked the raw data and no such infomation.&lt;/P&gt;&lt;P&gt;Your thoughts?&amp;nbsp; Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 03:02:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648949#M110284</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2023-07-03T03:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: [WinEventLog://Security] logs to Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648950#M110285</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/251633"&gt;@Murali&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can't find Type/ OS in Windows Security Event logs that are ingested to Splunk, that is likely due to the source windows machines do not have such information exist in event logs.&lt;/P&gt;&lt;P&gt;You could talk to Windows Administrator to include the desired details on Windows machine that you wanted for Splunk to collect and ingest.&lt;/P&gt;&lt;P&gt;Hope this helps!&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------------------------&lt;/P&gt;&lt;P&gt;Srikanth Yarlagadda.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 04:42:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648950#M110285</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2023-07-03T04:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: [WinEventLog://Security] logs to Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648953#M110286</link>
      <description>&lt;P&gt;Thanks for the suggestion Sri. Will try it out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Murali&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 06:33:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648953#M110286</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2023-07-03T06:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: [WinEventLog://Security] logs to Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648959#M110290</link>
      <description>&lt;P&gt;As &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/163730"&gt;@venkatasri&lt;/a&gt; already pointed out - you can't just conjure data out of thin air - if the original event doesn't include the information (and typically it doesn't - why should it? You don't need the extra amount of wasted storage only to have the information which you typically should have otherwise).&lt;/P&gt;&lt;P&gt;And your windows admin will most probably _not_ be able to force windows to include such info in the logs (again - why should windows send that in the event?).&lt;/P&gt;&lt;P&gt;Typically, in all kinds of monitoring software you usually have some form of an asset database separate from the events themselves and a method of correlating the source identified from the event with the data in said database. In case of plain Splunk Enterprise you&amp;nbsp; can gather such info in a lookup table and dynamically enrich your data on search. If you have Enterprise Security, there are additional options of having such asset db created (semi-)automatically for you.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 07:32:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WinEventLog-Security-logs-to-Splunk/m-p/648959#M110290</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-07-03T07:32:19Z</dc:date>
    </item>
  </channel>
</rss>

