<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to capture Windows evtx files in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451426#M78276</link>
    <description>&lt;P&gt;A customer has asked me to pick up the following logs:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;%SystemRoot%\System32\Winevt\Logs\Application.evtx
%SystemRoot%\System32\Winevt\Logs\Security.evtx
%SystemRoot%\System32\Winevt\Logs\System.evtx
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am trying to figure out how to obtain those and have looked at a number of posts, but I'm not seeing what I'd like to do.  Is the following possible?  I want to create an inputs file as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Application]
index = Winevt
sourceType = Winevt:Application
disabled = 0 
[WinEventLog://Security]
index = Winevt
sourceType = Winevt:Security
disabled = 0 
[WinEventLog://System]
index = Winevt
sourceType = Winevt:System
disabled = 0 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But how does it know where to go for the actual files I want picked up?&lt;BR /&gt;&lt;BR /&gt;
Do I need to put in a full path to the logs (for instance d:/windows/events..../application.evtx)?&lt;/P&gt;

&lt;P&gt;Any assist would be very helpful.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Jun 2019 19:09:22 GMT</pubDate>
    <dc:creator>nls7010</dc:creator>
    <dc:date>2019-06-27T19:09:22Z</dc:date>
    <item>
      <title>How to capture Windows evtx files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451426#M78276</link>
      <description>&lt;P&gt;A customer has asked me to pick up the following logs:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;%SystemRoot%\System32\Winevt\Logs\Application.evtx
%SystemRoot%\System32\Winevt\Logs\Security.evtx
%SystemRoot%\System32\Winevt\Logs\System.evtx
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I am trying to figure out how to obtain those and have looked at a number of posts, but I'm not seeing what I'd like to do.  Is the following possible?  I want to create an inputs file as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Application]
index = Winevt
sourceType = Winevt:Application
disabled = 0 
[WinEventLog://Security]
index = Winevt
sourceType = Winevt:Security
disabled = 0 
[WinEventLog://System]
index = Winevt
sourceType = Winevt:System
disabled = 0 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But how does it know where to go for the actual files I want picked up?&lt;BR /&gt;&lt;BR /&gt;
Do I need to put in a full path to the logs (for instance d:/windows/events..../application.evtx)?&lt;/P&gt;

&lt;P&gt;Any assist would be very helpful.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 19:09:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451426#M78276</guid>
      <dc:creator>nls7010</dc:creator>
      <dc:date>2019-06-27T19:09:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows evtx files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451427#M78277</link>
      <description>&lt;P&gt;So Splunk doesn't monitor the files but the event log channels itself. You don't want the full path but use the built monitors like you have listed. Documentation on these are available here: &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.0/Admin/Inputsconf#Windows_Event_Log_Monitor" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.0/Admin/Inputsconf#Windows_Event_Log_Monitor&lt;/A&gt;. The add-on Splunk_TA_windows also has an inputs as well as other useful parsing for these logs you can use. That is available here: &lt;A href="https://splunkbase.splunk.com/app/742/" target="_blank"&gt;https://splunkbase.splunk.com/app/742/&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:04:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451427#M78277</guid>
      <dc:creator>mdsnmss</dc:creator>
      <dc:date>2020-09-30T01:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows evtx files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451428#M78278</link>
      <description>&lt;P&gt;Splunk knows where to find the event logs.  Set the stanza name to &lt;CODE&gt;WinEventLog://Application&lt;/CODE&gt;, &lt;CODE&gt;WinEventLog://Security&lt;/CODE&gt;, or &lt;CODE&gt;WinEventLog:System&lt;/CODE&gt; and Splunk will do the rest.&lt;/P&gt;

&lt;P&gt;BTW, the conventional name for the Windows event sourcetypes is &lt;CODE&gt;WinEventLog:*&lt;/CODE&gt;.  Other names are allowed, but apps that process Windows events may not work without modification.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 20:28:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451428#M78278</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-06-27T20:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to capture Windows evtx files</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451429#M78279</link>
      <description>&lt;P&gt;See link below for walkthough&lt;BR /&gt;
&lt;A href="https://www.cloud-response.com/2019/07/importing-windows-event-log-files-into.html" target="_blank"&gt;https://www.cloud-response.com/2019/07/importing-windows-event-log-files-into.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Key is to monitor evtx files using the special preprocess-event sourcetype on a windows instance of Splunk. &lt;/P&gt;

&lt;P&gt;Takeaways:&lt;BR /&gt;
1. Copy evtx to spare windows server&lt;BR /&gt;
2. Load as many services as possible for known content (IE if evtx for AD load AD etc)&lt;BR /&gt;
3. Install Splunk &lt;BR /&gt;
4. Monitor directory with evtx files&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;NOTE&lt;/STRONG&gt;&lt;BR /&gt;
I did this on a Windows EC2 instance successfully, stopped Splunk on Windows EC2 instance and then copied the following over to my test instance of Splunk on my Mac to faster / more direct access to the parsed evtx:&lt;BR /&gt;
SPLUNK_HOME/var/lib/splunk/wineventlog&lt;BR /&gt;
SPLUNK_HOME/var/lib/splunk/wineventlog.dat&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 02:33:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-capture-Windows-evtx-files/m-p/451429#M78279</guid>
      <dc:creator>tnesavich_splun</dc:creator>
      <dc:date>2020-09-30T02:33:47Z</dc:date>
    </item>
  </channel>
</rss>

