<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows File System Auditing in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17875#M2389</link>
    <description>&lt;P&gt;I'm attempting to reports &amp;amp; alert on file changes/deletes using Windows Object Access/File System auditing.  I see the events coming through Splunk, but I'm struggling to get the events from Windows 2003 &amp;amp; Windows 2008 to show up in one saved search since the EventCode is different.  I just need to show events from user accounts that are not service/SYSTEM.&lt;/P&gt;

&lt;P&gt;I saw where I may be able to use transactions, so I built the query below.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="testindex" sourcetype="WinEventLog:Security" | transaction EventCode maxspan=1m maxpause=30 | where (CategoryString="Object Access" OR TaskCategory="File System") AND LIKE (Message, "%WriteData%") AND NOT LIKE (User, "SYSTEM") AND NOT LIKE (Message, "%Account Name:%SYSTEM%")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It seems to work somewhat.  Admittedly I don't fully understand transactions.  Any help is appreciated.  Splunk 4.1.6 on Windows Server 2008.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Dec 2010 00:12:55 GMT</pubDate>
    <dc:creator>jdoles</dc:creator>
    <dc:date>2010-12-24T00:12:55Z</dc:date>
    <item>
      <title>Windows File System Auditing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17875#M2389</link>
      <description>&lt;P&gt;I'm attempting to reports &amp;amp; alert on file changes/deletes using Windows Object Access/File System auditing.  I see the events coming through Splunk, but I'm struggling to get the events from Windows 2003 &amp;amp; Windows 2008 to show up in one saved search since the EventCode is different.  I just need to show events from user accounts that are not service/SYSTEM.&lt;/P&gt;

&lt;P&gt;I saw where I may be able to use transactions, so I built the query below.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="testindex" sourcetype="WinEventLog:Security" | transaction EventCode maxspan=1m maxpause=30 | where (CategoryString="Object Access" OR TaskCategory="File System") AND LIKE (Message, "%WriteData%") AND NOT LIKE (User, "SYSTEM") AND NOT LIKE (Message, "%Account Name:%SYSTEM%")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It seems to work somewhat.  Admittedly I don't fully understand transactions.  Any help is appreciated.  Splunk 4.1.6 on Windows Server 2008.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Dec 2010 00:12:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17875#M2389</guid>
      <dc:creator>jdoles</dc:creator>
      <dc:date>2010-12-24T00:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Windows File System Auditing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17876#M2390</link>
      <description>&lt;P&gt;In places where Win2008 event codes are different from Win2003, it's usually just by an offset of 4096. You just need to create a new field that has the equivalent codes for comparison.&lt;/P&gt;

&lt;P&gt;Also, try to filter out as much as possible in your initial search string instead of using &lt;CODE&gt;where&lt;/CODE&gt;. Doing so is almost always a good idea, but can make a particularly big difference when using &lt;CODE&gt;transaction&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="testindex" sourcetype"WinEventLog:Security"
CategoryString="Object Access" OR TaskCategory="File System"
"*WriteData*" NOT User="System" NOT "Account Name: SYSTEM"
| eval ComparisonCode=if(EventCode&amp;lt;4096, EventCode+4096, EventCode)
| transaction maxspan=1m maxpause=30 ComparisonCode
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 24 Dec 2010 02:22:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17876#M2390</guid>
      <dc:creator>southeringtonp</dc:creator>
      <dc:date>2010-12-24T02:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: Windows File System Auditing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17877#M2391</link>
      <description>&lt;P&gt;Excellent!  I never made the connection regarding the offset.  The search string was a huge help.&lt;BR /&gt;
Thanks again for the help.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Dec 2010 20:52:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17877#M2391</guid>
      <dc:creator>jdoles</dc:creator>
      <dc:date>2010-12-27T20:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Windows File System Auditing</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17878#M2392</link>
      <description>&lt;P&gt;On newer systems EventCode 560 is the key. &lt;BR /&gt;
Check out these links:&lt;BR /&gt;
&lt;A href="http://blogs.splunk.com/2013/07/08/audit-file-access-and-change-in-windows/"&gt;http://blogs.splunk.com/2013/07/08/audit-file-access-and-change-in-windows/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://www.intelliadmin.com/index.php/2008/03/use-auditing-to-track-who-deleted-your-files/"&gt;http://www.intelliadmin.com/index.php/2008/03/use-auditing-to-track-who-deleted-your-files/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=560"&gt;http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=560&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2013/07/08/audit-file-access-and-change-in-windows/+++http://www.intelliadmin.com/index.php/2008/03/use-auditing-to-track-who-deleted-your-files/++http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=560++http://social.technet.microsoft.com/forums/windowsserver/en-US/ed94f9ca-586a-44a2-a6fc-03a97a8ae8ab/start-audit-logs-on-the-server-for-deleted-files"&gt;http://social.technet.microsoft.com/forums/windowsserver/en-US/ed94f9ca-586a-44a2-a6fc-03a97a8ae8ab/start-audit-logs-on-the-server-for-deleted-files&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2014 11:21:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-File-System-Auditing/m-p/17878#M2392</guid>
      <dc:creator>mcronkrite</dc:creator>
      <dc:date>2014-09-23T11:21:26Z</dc:date>
    </item>
  </channel>
</rss>

