<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Monitor .Exe files in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Monitor-Exe-files/m-p/445014#M77465</link>
    <description>&lt;P&gt;Hey Guys,&lt;/P&gt;

&lt;P&gt;is there a quick and easy way to monitor .exe within the Windows sys32 folder via a stanza ?&lt;/P&gt;

&lt;P&gt;I need to know if the file is ran / closed / renamed or moved &lt;/P&gt;

&lt;P&gt;I tried the [monitor] stanza but it looks like that only monitors the file contents i.e. file edits &lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Wed, 13 Jun 2018 08:55:30 GMT</pubDate>
    <dc:creator>AaronMoorcroft</dc:creator>
    <dc:date>2018-06-13T08:55:30Z</dc:date>
    <item>
      <title>Monitor .Exe files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Monitor-Exe-files/m-p/445014#M77465</link>
      <description>&lt;P&gt;Hey Guys,&lt;/P&gt;

&lt;P&gt;is there a quick and easy way to monitor .exe within the Windows sys32 folder via a stanza ?&lt;/P&gt;

&lt;P&gt;I need to know if the file is ran / closed / renamed or moved &lt;/P&gt;

&lt;P&gt;I tried the [monitor] stanza but it looks like that only monitors the file contents i.e. file edits &lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 08:55:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Monitor-Exe-files/m-p/445014#M77465</guid>
      <dc:creator>AaronMoorcroft</dc:creator>
      <dc:date>2018-06-13T08:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor .Exe files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Monitor-Exe-files/m-p/445015#M77466</link>
      <description>&lt;P&gt;Probably the security events might help you &lt;/P&gt;

&lt;P&gt;Reference : &lt;A href="http://docs.splunk.com/Documentation/Splunk/7.1.1/Data/MonitorfilesystemchangesonWindows"&gt;http://docs.splunk.com/Documentation/Splunk/7.1.1/Data/MonitorfilesystemchangesonWindows&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 09:34:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Monitor-Exe-files/m-p/445015#M77466</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-06-13T09:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Monitor .Exe files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Monitor-Exe-files/m-p/445016#M77467</link>
      <description>&lt;P&gt;Thank you i'll take a look at this option. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jun 2018 11:46:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Monitor-Exe-files/m-p/445016#M77467</guid>
      <dc:creator>AaronMoorcroft</dc:creator>
      <dc:date>2018-06-13T11:46:48Z</dc:date>
    </item>
  </channel>
</rss>

