<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD FS - event ID 1102 in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390794#M69895</link>
    <description>&lt;P&gt;Windows EventCode=1102 from domain controllers and windows servers/endpoints indicates 'log clear' and could indicate a malicious activity OR the logs are being cleared as part of upgrade/rebuilt etc..&lt;/P&gt;

&lt;P&gt;If you are getting 1102 from ADFS servers, which you want to exclude, could you use the host name to exclude ADFS servers in the correlation search?&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2019 12:35:47 GMT</pubDate>
    <dc:creator>lakshman239</dc:creator>
    <dc:date>2019-04-04T12:35:47Z</dc:date>
    <item>
      <title>AD FS - event ID 1102</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390793#M69894</link>
      <description>&lt;P&gt;Hello, &lt;BR /&gt;
I have encountered a problem with AD FS events that has the ID 1102. &lt;BR /&gt;
They are getting the action "cleared", and being classified as audit clearing events. &lt;BR /&gt;
This happens because there is another WinEventLog with the same ID, which is about audit clearing - &lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=1102" target="_blank"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=1102&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;The meaning of this event ID, referring to AD FS, is different, and it causing me a lot of false postive alerts about audit clearing (!!)&lt;/P&gt;

&lt;P&gt;Do any of you know how to fix it ? &lt;/P&gt;

&lt;P&gt;I am able to separate them from the event type "windows_audit_log_cleared", but it doesn't really useful as the correlation searches are using the "action" field to identify log clearing. &lt;/P&gt;

&lt;P&gt;Thanks in advance. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 23:57:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390793#M69894</guid>
      <dc:creator>astatrial</dc:creator>
      <dc:date>2020-09-29T23:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: AD FS - event ID 1102</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390794#M69895</link>
      <description>&lt;P&gt;Windows EventCode=1102 from domain controllers and windows servers/endpoints indicates 'log clear' and could indicate a malicious activity OR the logs are being cleared as part of upgrade/rebuilt etc..&lt;/P&gt;

&lt;P&gt;If you are getting 1102 from ADFS servers, which you want to exclude, could you use the host name to exclude ADFS servers in the correlation search?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 12:35:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390794#M69895</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-04-04T12:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: AD FS - event ID 1102</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390795#M69896</link>
      <description>&lt;P&gt;I can exclude those events by the SourceName at the moment. But i wondered how can i remove the action "cleared" from those events. &lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 12:41:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390795#M69896</guid>
      <dc:creator>astatrial</dc:creator>
      <dc:date>2019-04-04T12:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: AD FS - event ID 1102</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390796#M69897</link>
      <description>&lt;P&gt;The action=cleared comes from the lookup table windows_audit_changes.csv within the Splunk_TA_windows&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:01:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/AD-FS-event-ID-1102/m-p/390796#M69897</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2020-09-30T00:01:58Z</dc:date>
    </item>
  </channel>
</rss>

