<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MS SQL audit logs with UF to read Windows Application Logs? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-audit-logs-with-UF-to-read-Windows-Application-Logs/m-p/631321#M11316</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hi all,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I am trying to integrate &lt;STRONG&gt;MS SQL&lt;/STRONG&gt; audit log data with a&amp;nbsp;&lt;STRONG&gt;UF&lt;/STRONG&gt; instead of DB Connect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;What is the best and recommended way to do it that maps all fields?&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;At the moment it is integrated with the UF and using the "&lt;A href="https://docs.splunk.com/Documentation/AddOns/latest/MSSQLServer" target="_blank" rel="noopener"&gt;Splunk Add-on for Microsoft SQL Server&lt;/A&gt;"&lt;/P&gt;
&lt;P&gt;With that the MS SQL events can be identified by SourceName=&lt;STRONG&gt;MSSQLSERVER&amp;nbsp;&lt;/STRONG&gt;or&amp;nbsp;SourceName=MSSQL*&lt;/P&gt;
&lt;P&gt;However it does not work properly work as most of the fields are not extracted and mapped. For example the user is also not translated&amp;nbsp;User=&amp;nbsp;&lt;SPAN&gt;NOT_TRANSLATED&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Apr 2023 15:54:11 GMT</pubDate>
    <dc:creator>ojay</dc:creator>
    <dc:date>2023-04-25T15:54:11Z</dc:date>
    <item>
      <title>MS SQL audit logs with UF to read Windows Application Logs?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-audit-logs-with-UF-to-read-Windows-Application-Logs/m-p/631321#M11316</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi all,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I am trying to integrate &lt;STRONG&gt;MS SQL&lt;/STRONG&gt; audit log data with a&amp;nbsp;&lt;STRONG&gt;UF&lt;/STRONG&gt; instead of DB Connect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;What is the best and recommended way to do it that maps all fields?&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;At the moment it is integrated with the UF and using the "&lt;A href="https://docs.splunk.com/Documentation/AddOns/latest/MSSQLServer" target="_blank" rel="noopener"&gt;Splunk Add-on for Microsoft SQL Server&lt;/A&gt;"&lt;/P&gt;
&lt;P&gt;With that the MS SQL events can be identified by SourceName=&lt;STRONG&gt;MSSQLSERVER&amp;nbsp;&lt;/STRONG&gt;or&amp;nbsp;SourceName=MSSQL*&lt;/P&gt;
&lt;P&gt;However it does not work properly work as most of the fields are not extracted and mapped. For example the user is also not translated&amp;nbsp;User=&amp;nbsp;&lt;SPAN&gt;NOT_TRANSLATED&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 15:54:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-audit-logs-with-UF-to-read-Windows-Application-Logs/m-p/631321#M11316</guid>
      <dc:creator>ojay</dc:creator>
      <dc:date>2023-04-25T15:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL audit logs with UF to read Windows Application Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-audit-logs-with-UF-to-read-Windows-Application-Logs/m-p/631327#M11317</link>
      <description>&lt;P&gt;Make sure the add-on is installed on your indexers and search heads as well as on the UF.&amp;nbsp; The UF fetches the data, but it is the indexers and SHs that do field extractions so the add-on needs to be installed there, too.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 13:44:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-audit-logs-with-UF-to-read-Windows-Application-Logs/m-p/631327#M11317</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-02-17T13:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: MS SQL audit logs with UF to read Windows Application Logs</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-audit-logs-with-UF-to-read-Windows-Application-Logs/m-p/641287#M11470</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;thank you for your feedback.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The add-on is installed on indexer, searchheads and universal forwarder. However fields like below are not beeing mapped&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;00/00/0000 00:00:00 PM
LogName=Application
EventCode=33205
EventType=0
ComputerName=
SourceName=MSSQLSERVER
Type=Information
RecordNumber=123456
Keywords=Audit Failure, Classic
TaskCategory=Logon
OpCode=None
Message=Audit event: audit_schema_version:1
event_time:2023-00-00 00:00:00.000000
sequence_number:1
action_id:LGIF
succeeded:false
is_column_permission:false
session_id:0
server_principal_id:0
database_principal_id:0
target_server_principal_id:0
target_database_principal_id:0
object_id:0
user_defined_event_id:0
transaction_id:0
class_type:LX
permission_bitmask:00000000000000000000000000000000
sequence_group_id:
session_server_principal_name:
server_principal_name:
server_principal_sid:
database_principal_name:
target_server_principal_name:
target_server_principal_sid:
target_database_principal_name:
server_instance_name:XXXXXXXXXX
database_name:
schema_name:
object_name:
statement:
additional_information:
user_defined_information:&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should all fields not be extracted, as the add-on has these field extractions. Or does it only work with dbconnect?&lt;/P&gt;&lt;P&gt;Hopefully somebody can support and advise before I start working on a customized solution which I am trying to avoid.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 14:22:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/MS-SQL-audit-logs-with-UF-to-read-Windows-Application-Logs/m-p/641287#M11470</guid>
      <dc:creator>ojay</dc:creator>
      <dc:date>2023-04-25T14:22:09Z</dc:date>
    </item>
  </channel>
</rss>

