<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is this sample Windows Event Log trying to do? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/What-is-this-sample-Windows-Event-Log-trying-to-do/m-p/370270#M67198</link>
    <description>&lt;P&gt;There should be info in the _raw about &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...Object Name: C:\some\file\location\name.ext  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That's the item that was being touched. I see 4663's on successful touches of regbacks, dlls, exes and some other kinds of files.  That may be the folder or file  D:\Program Files\Splunk\var\lib\splunk\modinputs\WinEventLog\security.&lt;/P&gt;

&lt;P&gt;You'll also see something like this...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... Access Request Information:   Accesses: WriteAttributes  ...
... Access Request Information:   Accesses: WriteData (or AddFile) ....
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;... for what the person or process was trying to do.  &lt;/P&gt;

&lt;P&gt;Somewhere before that, there should be user information about who is doing the touching.  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...Security ID:  NT AUTHORITY\SYSTEM   Account Name:  HOSTNAME1$   Account Domain:  MYDOMAIN$  ...
... Security ID:  S-1-5-18   Account Name:   HOSTNAME2$    Account Domain:  MYDOMAIN$  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That's the person or persons you have to track down.  &lt;/P&gt;

&lt;P&gt;Also...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... Process Name: C:\some\file\location\name.exe  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That's the job or executable or a name of a service that was doing the touching for the user id.  Looks like maybe that was splunk-winevtlog.exe.&lt;/P&gt;

&lt;P&gt;In essence, if I'm reading this right, splunk-winevtlog.exe is touching a file - possibly a security file-- and the windows system is generating an info-level security message about it.  Which might be ironic, if the security event logging by splunk is generating a security message.  &lt;/P&gt;</description>
    <pubDate>Wed, 22 Mar 2017 18:48:53 GMT</pubDate>
    <dc:creator>DalJeanis</dc:creator>
    <dc:date>2017-03-22T18:48:53Z</dc:date>
    <item>
      <title>What is this sample Windows Event Log trying to do?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-this-sample-Windows-Event-Log-trying-to-do/m-p/370269#M67197</link>
      <description>&lt;P&gt;I'd like confirmation that I'm reading what I believe to be a Windows event log written by Splunk correctly.&lt;/P&gt;

&lt;P&gt;These just started showing up this morning.  We're getting a LOT of these and I'm trying to determine why.&lt;/P&gt;

&lt;P&gt;Here's the log entry.  My attempted translation is below.&lt;/P&gt;

&lt;P&gt;03/22/2017 02:35:16 AM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft-Windows-Security-Auditing&lt;BR /&gt;
EventCode=4663&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=fakehost.fakedomain.com&lt;BR /&gt;
TaskCategory=Removable Storage&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=1085737169&lt;BR /&gt;
Keywords=None&lt;BR /&gt;
Message=Splunk could not get the description for this event. Either the component that raises this event is not installed on your local computer or the installation is corrupt.&lt;/P&gt;

&lt;P&gt;FormatMessage error:&lt;/P&gt;

&lt;P&gt;Got the following information from this event: &lt;/P&gt;

&lt;P&gt;fakehost$&lt;BR /&gt;
fakedomain&lt;BR /&gt;
Security&lt;BR /&gt;
File&lt;BR /&gt;
D:\Program Files\Splunk\var\lib\splunk\modinputs\WinEventLog\security&lt;BR /&gt;
%%4417&lt;BR /&gt;
                %%4418&lt;/P&gt;

&lt;P&gt;D:\Program Files\Splunk\bin\splunk-winevtlog.exe&lt;/P&gt;

&lt;P&gt;Translation:&lt;BR /&gt;
Windows -&amp;gt; "Access to an object was requested."&lt;BR /&gt;
Windows -&amp;gt; "This is concerning Windows Server 2008"&lt;BR /&gt;
Windows -&amp;gt; "On machine fakehost, which is part of domain fakedomain, something tried to write to... something.  Specifically, something tried to append data to something."&lt;BR /&gt;
Splunk -&amp;gt; "I have no idea how to translate the rest of the log.  Something's busted."&lt;/P&gt;

&lt;P&gt;My guess...&lt;BR /&gt;
splunk-winevtlog.exe is the thing trying to do the writing.  I don't know to where or what it's trying to write.&lt;BR /&gt;
-- OR --&lt;BR /&gt;
splunk-winevtlog.exe is the destination of where something is trying to write.  I don't know what's doing the writing.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 17:41:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-this-sample-Windows-Event-Log-trying-to-do/m-p/370269#M67197</guid>
      <dc:creator>pcordel</dc:creator>
      <dc:date>2017-03-22T17:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: What is this sample Windows Event Log trying to do?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-this-sample-Windows-Event-Log-trying-to-do/m-p/370270#M67198</link>
      <description>&lt;P&gt;There should be info in the _raw about &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...Object Name: C:\some\file\location\name.ext  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That's the item that was being touched. I see 4663's on successful touches of regbacks, dlls, exes and some other kinds of files.  That may be the folder or file  D:\Program Files\Splunk\var\lib\splunk\modinputs\WinEventLog\security.&lt;/P&gt;

&lt;P&gt;You'll also see something like this...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... Access Request Information:   Accesses: WriteAttributes  ...
... Access Request Information:   Accesses: WriteData (or AddFile) ....
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;... for what the person or process was trying to do.  &lt;/P&gt;

&lt;P&gt;Somewhere before that, there should be user information about who is doing the touching.  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;...Security ID:  NT AUTHORITY\SYSTEM   Account Name:  HOSTNAME1$   Account Domain:  MYDOMAIN$  ...
... Security ID:  S-1-5-18   Account Name:   HOSTNAME2$    Account Domain:  MYDOMAIN$  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That's the person or persons you have to track down.  &lt;/P&gt;

&lt;P&gt;Also...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... Process Name: C:\some\file\location\name.exe  ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That's the job or executable or a name of a service that was doing the touching for the user id.  Looks like maybe that was splunk-winevtlog.exe.&lt;/P&gt;

&lt;P&gt;In essence, if I'm reading this right, splunk-winevtlog.exe is touching a file - possibly a security file-- and the windows system is generating an info-level security message about it.  Which might be ironic, if the security event logging by splunk is generating a security message.  &lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 18:48:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-this-sample-Windows-Event-Log-trying-to-do/m-p/370270#M67198</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-03-22T18:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: What is this sample Windows Event Log trying to do?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-is-this-sample-Windows-Event-Log-trying-to-do/m-p/370271#M67199</link>
      <description>&lt;P&gt;We're seeing a lot of this after this month's Windows update. Restarting the Splunk forwarder appears to have fixed it, We also changed the service start to "delayed".&lt;/P&gt;

&lt;P&gt;See: &lt;A href="https://answers.splunk.com/answers/200924/formatmessage-error-appears-in-indexed-message-for.html"&gt;https://answers.splunk.com/answers/200924/formatmessage-error-appears-in-indexed-message-for.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 22:14:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-is-this-sample-Windows-Event-Log-trying-to-do/m-p/370271#M67199</guid>
      <dc:creator>templets</dc:creator>
      <dc:date>2017-04-07T22:14:26Z</dc:date>
    </item>
  </channel>
</rss>

