<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WIndows Active Directory sourcetypes in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/WIndows-Active-Directory-sourcetypes/m-p/555705#M92029</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235199"&gt;@Gene&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Docs says, with renderXml=true option you would see xmlwineventlog sourcetype.&amp;nbsp; if you make it false the sourcetype would switch to classic mode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Previous versions of the Splunk Add-on for Windows collected&amp;nbsp;&lt;/SPAN&gt;WinEventLog&lt;SPAN&gt;&amp;nbsp;data collection inputs in Classic mode. By default, version 6.0.0 of the Splunk Add-on for Windows collects all&amp;nbsp;&lt;/SPAN&gt;WinEventLog&lt;SPAN&gt;&amp;nbsp;data collection inputs in XML mode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Refer -&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/8.1.2/User/Upgrade#Change_WinEventLog_collection_mode" target="_blank" rel="noopener"&gt;Upgrade the Splunk Add-on for Windows - Splunk Documentation&lt;/A&gt;&amp;nbsp;having detailed info.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;----&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;An upvote would be appreciated if it helps!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jun 2021 01:09:14 GMT</pubDate>
    <dc:creator>venkatasri</dc:creator>
    <dc:date>2021-06-15T01:09:14Z</dc:date>
    <item>
      <title>WIndows Active Directory sourcetypes</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WIndows-Active-Directory-sourcetypes/m-p/555659#M92015</link>
      <description>&lt;P&gt;Dear Splunkers, I have a question regarding AD data input. Can you please advise on what sourcetype and source of events is correct one?&lt;/P&gt;&lt;P&gt;I have installed UF and created input - data came from WinEventLog:Security source. Then I installed Addon for Microsoft and created blacklists in inputs.conf file and pushed it to UF. After that modification I receive events from XmlWinEventLog:SecurityI was trying to figure out which one is correct but had no luck to find clear answer.&lt;BR /&gt;My inputs.conf&lt;/P&gt;&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;disabled = 1&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 1&lt;BR /&gt;evt_resolve_ad_obj = 1&lt;BR /&gt;checkpointInterval = 5&lt;/P&gt;&lt;P&gt;renderXml=true&lt;BR /&gt;blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 13:57:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WIndows-Active-Directory-sourcetypes/m-p/555659#M92015</guid>
      <dc:creator>Gene</dc:creator>
      <dc:date>2021-06-14T13:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: WIndows Active Directory sourcetypes</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WIndows-Active-Directory-sourcetypes/m-p/555705#M92029</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/235199"&gt;@Gene&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Docs says, with renderXml=true option you would see xmlwineventlog sourcetype.&amp;nbsp; if you make it false the sourcetype would switch to classic mode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Previous versions of the Splunk Add-on for Windows collected&amp;nbsp;&lt;/SPAN&gt;WinEventLog&lt;SPAN&gt;&amp;nbsp;data collection inputs in Classic mode. By default, version 6.0.0 of the Splunk Add-on for Windows collects all&amp;nbsp;&lt;/SPAN&gt;WinEventLog&lt;SPAN&gt;&amp;nbsp;data collection inputs in XML mode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Refer -&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/8.1.2/User/Upgrade#Change_WinEventLog_collection_mode" target="_blank" rel="noopener"&gt;Upgrade the Splunk Add-on for Windows - Splunk Documentation&lt;/A&gt;&amp;nbsp;having detailed info.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;----&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;An upvote would be appreciated if it helps!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 01:09:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WIndows-Active-Directory-sourcetypes/m-p/555705#M92029</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2021-06-15T01:09:14Z</dc:date>
    </item>
    <item>
      <title>Re: WIndows Active Directory sourcetypes</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/WIndows-Active-Directory-sourcetypes/m-p/555733#M92040</link>
      <description>&lt;P&gt;Thanks. That's what I was looking for!&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 07:23:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/WIndows-Active-Directory-sourcetypes/m-p/555733#M92040</guid>
      <dc:creator>Gene</dc:creator>
      <dc:date>2021-06-15T07:23:44Z</dc:date>
    </item>
  </channel>
</rss>

