<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Windows Registry Monitor not showing any events in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Registry-Monitor-not-showing-any-events/m-p/52579#M85842</link>
    <description>&lt;P&gt;Here is a method to monitor registry changes on WIndows 10 Pro on a host that is remote to Splunk.&lt;BR /&gt;
In this particular case I am interested to get an event when a memory stick is inserter to the host.&lt;BR /&gt;
1) Install Universal Forwarder on the remote host and configure it to forward events to Splunk&lt;/P&gt;

&lt;P&gt;2) Download Splunk Add-on for Microsoft Windows:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/742/#/details" target="_blank"&gt;https://splunkbase.splunk.com/app/742/#/details&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;3) Unzip and untar its directory. Move Ad-On directory to the Universal Forwarder on the remote host. In my case to the directory:&lt;BR /&gt;
C:\Program Files\SplunkUniversalForwarder\etc\apps&lt;/P&gt;

&lt;P&gt;4) From: C:\Program Files\SplunkUniversalForwarder\etc\apps\Splunk_TA_windows\default&lt;BR /&gt;
copy app.conf and inputs.conf&lt;BR /&gt;
to C:\Program Files\SplunkUniversalForwarder\etc\apps\Splunk_TA_windows\local&lt;/P&gt;

&lt;P&gt;5) Clear content of \local copies on app.conf and inputs.conf &lt;/P&gt;

&lt;P&gt;6) Add in C:\Program Files\SplunkUniversalForwarder\etc\apps\Splunk_TA_windows\local\inputs.conf&lt;BR /&gt;
[WinRegMon://hklm_USB]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
hive = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\.*&lt;BR /&gt;
proc = .*&lt;BR /&gt;
type = set|create|delete|rename&lt;/P&gt;

&lt;P&gt;Restart the Universal Forwarder. Insert a USB to your Windows 10. You should get an event on your Splunk.&lt;/P&gt;

&lt;P&gt;I hope this helps.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 05:05:56 GMT</pubDate>
    <dc:creator>janlovessplunk</dc:creator>
    <dc:date>2020-09-30T05:05:56Z</dc:date>
    <item>
      <title>Splunk Windows Registry Monitor not showing any events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Registry-Monitor-not-showing-any-events/m-p/52577#M85840</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;

&lt;P&gt;I want to monitor the changes in my Windows Registry. I have did the needed procedures and steps however the index i use for my Windows Registry is always empty whenever i do the following command.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="Registry"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The steps i did was firstly, to add registry data into Splunk&lt;BR /&gt;
&lt;STRONG&gt;Home-&amp;gt;Add data-&amp;gt;Windows Registry-&amp;gt;Collect Windows Registry data on this Splunk Server&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Next, i clicked on new and filled in the following information:&lt;BR /&gt;
&lt;STRONG&gt;Collection Name: Registry&lt;BR /&gt;
Registry Hive: HKEY_LOCAL_MACHINE\?.*&lt;BR /&gt;
Baseline: Yes&lt;BR /&gt;
Index: Registry&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;This is what is in my inputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[script://$SPLUNK_HOME\bin\scripts\splunk-regmon.path]
disabled = 0
interval = 60
sourcetype = WinRegistry
source = WinRegistry
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;May i ask if i missed out any steps? And why my &lt;EM&gt;Registry&lt;/EM&gt; Index is empty?&lt;BR /&gt;
Thanks a lot! (:&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:41:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Registry-Monitor-not-showing-any-events/m-p/52577#M85840</guid>
      <dc:creator>Zyon</dc:creator>
      <dc:date>2020-09-28T14:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Windows Registry Monitor not showing any events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Registry-Monitor-not-showing-any-events/m-p/52578#M85841</link>
      <description>&lt;P&gt;Hi Zyon,&lt;/P&gt;

&lt;P&gt;Can you check that the splunk-regmon.exe process is running, if not then try restarting splunk? As per this snippet from the docs:&lt;/P&gt;

&lt;P&gt;Caution: When the Registry monitor is running, do not stop or kill the splunk-regmon.exe process manually. Doing so can result in system instability. To stop the Registry monitor, stop the splunkd server process from either the Services control panel or the CLI. &lt;/P&gt;

&lt;P&gt;Did you check the permissions as per the docs:&lt;/P&gt;

&lt;P&gt;Required permissions:&lt;BR /&gt;
Monitor the Registry    * Splunk must run on Windows&lt;BR /&gt;
AND&lt;BR /&gt;
* Splunk must run as either the local system user&lt;BR /&gt;
OR&lt;BR /&gt;
* Splunk must run as a domain user with read access to the Registry hives or keys that you want to monitor &lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2013 04:56:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Registry-Monitor-not-showing-any-events/m-p/52578#M85841</guid>
      <dc:creator>alanfinlay</dc:creator>
      <dc:date>2013-09-03T04:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Windows Registry Monitor not showing any events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Registry-Monitor-not-showing-any-events/m-p/52579#M85842</link>
      <description>&lt;P&gt;Here is a method to monitor registry changes on WIndows 10 Pro on a host that is remote to Splunk.&lt;BR /&gt;
In this particular case I am interested to get an event when a memory stick is inserter to the host.&lt;BR /&gt;
1) Install Universal Forwarder on the remote host and configure it to forward events to Splunk&lt;/P&gt;

&lt;P&gt;2) Download Splunk Add-on for Microsoft Windows:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/742/#/details" target="_blank"&gt;https://splunkbase.splunk.com/app/742/#/details&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;3) Unzip and untar its directory. Move Ad-On directory to the Universal Forwarder on the remote host. In my case to the directory:&lt;BR /&gt;
C:\Program Files\SplunkUniversalForwarder\etc\apps&lt;/P&gt;

&lt;P&gt;4) From: C:\Program Files\SplunkUniversalForwarder\etc\apps\Splunk_TA_windows\default&lt;BR /&gt;
copy app.conf and inputs.conf&lt;BR /&gt;
to C:\Program Files\SplunkUniversalForwarder\etc\apps\Splunk_TA_windows\local&lt;/P&gt;

&lt;P&gt;5) Clear content of \local copies on app.conf and inputs.conf &lt;/P&gt;

&lt;P&gt;6) Add in C:\Program Files\SplunkUniversalForwarder\etc\apps\Splunk_TA_windows\local\inputs.conf&lt;BR /&gt;
[WinRegMon://hklm_USB]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
hive = \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\.*&lt;BR /&gt;
proc = .*&lt;BR /&gt;
type = set|create|delete|rename&lt;/P&gt;

&lt;P&gt;Restart the Universal Forwarder. Insert a USB to your Windows 10. You should get an event on your Splunk.&lt;/P&gt;

&lt;P&gt;I hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 05:05:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Registry-Monitor-not-showing-any-events/m-p/52579#M85842</guid>
      <dc:creator>janlovessplunk</dc:creator>
      <dc:date>2020-09-30T05:05:56Z</dc:date>
    </item>
  </channel>
</rss>

