<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to use Splunk to audit Windows processes created and the users who are running them? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403904#M71730</link>
    <description>&lt;P&gt;Windows 2012R2&lt;/P&gt;</description>
    <pubDate>Thu, 21 Feb 2019 12:20:54 GMT</pubDate>
    <dc:creator>chuckcoggins</dc:creator>
    <dc:date>2019-02-21T12:20:54Z</dc:date>
    <item>
      <title>How to use Splunk to audit Windows processes created and the users who are running them?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403902#M71728</link>
      <description>&lt;P&gt;Good evening,&lt;/P&gt;

&lt;P&gt;I have been trying to figure out a way to get a list of all of the software that runs on my servers under the user Administrator.&lt;/P&gt;

&lt;P&gt;The end goal is to disable the admin account and replace it with a bunch of specific users.&lt;/P&gt;

&lt;P&gt;Ideally, I am going to have to figure out what services / software / backups etc etc that are run as Administrator.&lt;/P&gt;

&lt;P&gt;Is this something Splunk can / will do for me?&lt;/P&gt;

&lt;P&gt;I have been banging my head on this for about 2 days trying to figure out how to create scripts to do all of this with no real luck other than figuring out what services.&lt;/P&gt;

&lt;P&gt;Thank you in advance for any help you might be able to provide me.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Feb 2019 22:18:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403902#M71728</guid>
      <dc:creator>chuckcoggins</dc:creator>
      <dc:date>2019-02-20T22:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to audit Windows processes created and the users who are running them?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403903#M71729</link>
      <description>&lt;P&gt;Which operating system is running on your servers?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 04:38:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403903#M71729</guid>
      <dc:creator>whrg</dc:creator>
      <dc:date>2019-02-21T04:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to audit Windows processes created and the users who are running them?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403904#M71730</link>
      <description>&lt;P&gt;Windows 2012R2&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 12:20:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403904#M71730</guid>
      <dc:creator>chuckcoggins</dc:creator>
      <dc:date>2019-02-21T12:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to audit Windows processes created and the users who are running them?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403905#M71731</link>
      <description>&lt;P&gt;If i understand correctly, you want to monitor process creation.&lt;/P&gt;

&lt;P&gt;For Windows servers, I'm familiar with two ways of process logging.&lt;/P&gt;

&lt;P&gt;Option 1) Windows has a built-in feature for process tracking using the Windows Event Log. The particular Event Code we are interested in is &lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4688"&gt;4688: A new process has been created&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;By default, process tracking is turned off. You need to enable it in the Local Security Policy or via group policies:&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6596iC34E313952863CBF/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Next, you need to configure Splunk to &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.4/Data/MonitorWindowseventlogdata"&gt;monitor the Windows Event Log&lt;/A&gt;. Something like this via inputs.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = false
index = windows
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Now these events should be available in Splunk:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=windows source="WinEventLog:Security" EventCode=4688
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/6597i25FD7772273B7045/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;You can see that the user (Account Name), who ran this process, got logged. (I anonymized it.)&lt;/P&gt;

&lt;P&gt;Option 2: You install &lt;A href="https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon"&gt;Sysmon&lt;/A&gt; in conjunction with &lt;A href="https://splunkbase.splunk.com/app/1914/"&gt;Add-on for Microsoft Sysmon&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;Sysmon can log a wealth of information, including process creation. I find it particularly useful that Sysmon can log the hash value for each process/program. You will also see which user runs which process. However, Sysmon is slightly more complex to setup.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 14:50:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403905#M71731</guid>
      <dc:creator>whrg</dc:creator>
      <dc:date>2019-02-21T14:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to audit Windows processes created and the users who are running them?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403906#M71732</link>
      <description>&lt;P&gt;Thank you so much for your help!&lt;BR /&gt;
I should also be able to do this with EventID='4624' as well using the same steps correct?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 16:41:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403906#M71732</guid>
      <dc:creator>chuckcoggins</dc:creator>
      <dc:date>2019-02-21T16:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to audit Windows processes created and the users who are running them?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403907#M71733</link>
      <description>&lt;P&gt;Yes, basically, the steps are the same for event code 4624 (successful login).&lt;/P&gt;

&lt;P&gt;Again, it might be necessary to activate the according audit policy for this particular event code.&lt;/P&gt;

&lt;P&gt;Also, I forgot to mention that you should to install the "Splunk Add-on for Microsoft Windows" on your search head so that you will get field extractions, etc.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 18:04:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-use-Splunk-to-audit-Windows-processes-created-and-the/m-p/403907#M71733</guid>
      <dc:creator>whrg</dc:creator>
      <dc:date>2019-02-21T18:04:23Z</dc:date>
    </item>
  </channel>
</rss>

