<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do I add a CIM Change Model and EventCode 4732 (A member was added to a security-enabled local group) in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-do-I-add-a-CIM-Change-Model-and-EventCode-4732-A-member-was/m-p/589771#M10681</link>
    <description>&lt;P&gt;Running CIM 5.0 and was looking to do some reporting on users/groups added to security groups (information provided by the Windows Security Log event 4732 - but when I look in the Change datamodel, I cannot see the target group of the add in any of the fields.&lt;/P&gt;
&lt;P&gt;We are using out of the box Splunk_TA_windows, and Splunk Add-on for Microsoft Windows and I would have hoped that the data model would have been automatically filled with the relevant fields. Am I missing something obvious, or is there something I need to setup myself to get this working?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Simon&lt;/P&gt;</description>
    <pubDate>Mon, 21 Mar 2022 14:38:46 GMT</pubDate>
    <dc:creator>beano501</dc:creator>
    <dc:date>2022-03-21T14:38:46Z</dc:date>
    <item>
      <title>How do I add a CIM Change Model and EventCode 4732 (A member was added to a security-enabled local group)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-do-I-add-a-CIM-Change-Model-and-EventCode-4732-A-member-was/m-p/589771#M10681</link>
      <description>&lt;P&gt;Running CIM 5.0 and was looking to do some reporting on users/groups added to security groups (information provided by the Windows Security Log event 4732 - but when I look in the Change datamodel, I cannot see the target group of the add in any of the fields.&lt;/P&gt;
&lt;P&gt;We are using out of the box Splunk_TA_windows, and Splunk Add-on for Microsoft Windows and I would have hoped that the data model would have been automatically filled with the relevant fields. Am I missing something obvious, or is there something I need to setup myself to get this working?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Simon&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 14:38:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-do-I-add-a-CIM-Change-Model-and-EventCode-4732-A-member-was/m-p/589771#M10681</guid>
      <dc:creator>beano501</dc:creator>
      <dc:date>2022-03-21T14:38:46Z</dc:date>
    </item>
  </channel>
</rss>

