<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What's the best practice to configure a windows system to collect data with the Splunk platform? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-s-the-best-practice-to-configure-a-windows-system-to/m-p/467533#M7011</link>
    <description>&lt;P&gt;*The Splunk Product Best Practices team provided this response. Read more about [How&lt;/P&gt;

&lt;H2&gt;Crowdsourcing is Shaping the Future of Splunk Best Practices](&lt;A href="https://www.splunk.com/blog/2019/02/25/how-crowdsourcing-is-shaping-the-future-of-splunk-best-practices.html).*"&gt;https://www.splunk.com/blog/2019/02/25/how-crowdsourcing-is-shaping-the-future-of-splunk-best-practices.html).*&lt;/A&gt;&lt;/H2&gt;

&lt;P&gt;The Windows default event log configuration may not generate log data for the events you need. Therefore, it's a best practice to review the &lt;A href="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations#recommended-audit-policies-by-operating-systema"&gt;Recommended Audit Policies by Operating System&lt;/A&gt; on the Microsoft website and make the required changes for your deployment.&lt;/P&gt;

&lt;P&gt;If you're new to collecting Windows endpoint event log data with the Splunk platform, then review &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata"&gt;Monitor Windows event log data&lt;/A&gt; in the &lt;EM&gt;Getting Data In&lt;/EM&gt; manual and &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;What are the best practices for installing Splunk on Windows endpoints?&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Configure Windows event log audit policy and event logs to capture the correct event&lt;/H1&gt;

&lt;P&gt;Changing your Windows event log audit policy impacts the event log traffic. If you need to change the audit policy, use the Group Policy feature or the configuration management tools of your choice. To see an example of using the group policy objects (GPO), see the &lt;A href="https://blogs.technet.microsoft.com/canitpro/2017/03/29/step-by-step-enabling-advanced-security-audit-policy-via-ds-access/"&gt;Step-By-Step: Enabling Advanced Security Audit Policy via DS Access&lt;/A&gt; blog post on the Microsoft | TelNet website.&lt;/P&gt;

&lt;P&gt;See &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;How do I collect basic Windows OS Event Log data from my Windows systems?&lt;/A&gt; for best practices for collecting Windows end point log data with the Splunk platform.&lt;/P&gt;

&lt;H1&gt;Go beyond the default audit policy&lt;/H1&gt;

&lt;P&gt;Change the default settings to the baseline or stronger audit policy settings to meet the needs of your deployment. Configure non-standard logging to meet your security use case requirements. For example, if&lt;BR /&gt;
your corporate policy prohibits using a USB or external devices, then  enable the &lt;STRONG&gt;Audit Removable Storage&lt;/STRONG&gt;. For example, see &lt;A href="https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices"&gt;Monitor the use of removable storage devices&lt;/A&gt; on the Microsoft website.&lt;/P&gt;

&lt;H1&gt;Verify your changes&lt;/H1&gt;

&lt;P&gt;Consider testing the changes before adding them to your production environment. To test the changes, view the event logs to ensure the required messages display or review the related Microsoft documentation to find a procedure to verify your changes.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Oct 2019 17:22:20 GMT</pubDate>
    <dc:creator>kdamak_splunk</dc:creator>
    <dc:date>2019-10-29T17:22:20Z</dc:date>
    <item>
      <title>What's the best practice to configure a windows system to collect data with the Splunk platform?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-s-the-best-practice-to-configure-a-windows-system-to/m-p/467532#M7010</link>
      <description>&lt;P&gt;Why do I need to configure the Windows event log audit policy and how do I make sure that I capture the correct events?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 17:18:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-s-the-best-practice-to-configure-a-windows-system-to/m-p/467532#M7010</guid>
      <dc:creator>kdamak_splunk</dc:creator>
      <dc:date>2019-10-29T17:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: What's the best practice to configure a windows system to collect data with the Splunk platform?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-s-the-best-practice-to-configure-a-windows-system-to/m-p/467533#M7011</link>
      <description>&lt;P&gt;*The Splunk Product Best Practices team provided this response. Read more about [How&lt;/P&gt;

&lt;H2&gt;Crowdsourcing is Shaping the Future of Splunk Best Practices](&lt;A href="https://www.splunk.com/blog/2019/02/25/how-crowdsourcing-is-shaping-the-future-of-splunk-best-practices.html).*"&gt;https://www.splunk.com/blog/2019/02/25/how-crowdsourcing-is-shaping-the-future-of-splunk-best-practices.html).*&lt;/A&gt;&lt;/H2&gt;

&lt;P&gt;The Windows default event log configuration may not generate log data for the events you need. Therefore, it's a best practice to review the &lt;A href="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations#recommended-audit-policies-by-operating-systema"&gt;Recommended Audit Policies by Operating System&lt;/A&gt; on the Microsoft website and make the required changes for your deployment.&lt;/P&gt;

&lt;P&gt;If you're new to collecting Windows endpoint event log data with the Splunk platform, then review &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata"&gt;Monitor Windows event log data&lt;/A&gt; in the &lt;EM&gt;Getting Data In&lt;/EM&gt; manual and &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;What are the best practices for installing Splunk on Windows endpoints?&lt;/A&gt;&lt;/P&gt;

&lt;H1&gt;Configure Windows event log audit policy and event logs to capture the correct event&lt;/H1&gt;

&lt;P&gt;Changing your Windows event log audit policy impacts the event log traffic. If you need to change the audit policy, use the Group Policy feature or the configuration management tools of your choice. To see an example of using the group policy objects (GPO), see the &lt;A href="https://blogs.technet.microsoft.com/canitpro/2017/03/29/step-by-step-enabling-advanced-security-audit-policy-via-ds-access/"&gt;Step-By-Step: Enabling Advanced Security Audit Policy via DS Access&lt;/A&gt; blog post on the Microsoft | TelNet website.&lt;/P&gt;

&lt;P&gt;See &lt;A href="https://answers.splunk.com/answers/743944/how-do-i-collect-basic-windows-os-event-log-data-f.html"&gt;How do I collect basic Windows OS Event Log data from my Windows systems?&lt;/A&gt; for best practices for collecting Windows end point log data with the Splunk platform.&lt;/P&gt;

&lt;H1&gt;Go beyond the default audit policy&lt;/H1&gt;

&lt;P&gt;Change the default settings to the baseline or stronger audit policy settings to meet the needs of your deployment. Configure non-standard logging to meet your security use case requirements. For example, if&lt;BR /&gt;
your corporate policy prohibits using a USB or external devices, then  enable the &lt;STRONG&gt;Audit Removable Storage&lt;/STRONG&gt;. For example, see &lt;A href="https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/monitor-the-use-of-removable-storage-devices"&gt;Monitor the use of removable storage devices&lt;/A&gt; on the Microsoft website.&lt;/P&gt;

&lt;H1&gt;Verify your changes&lt;/H1&gt;

&lt;P&gt;Consider testing the changes before adding them to your production environment. To test the changes, view the event logs to ensure the required messages display or review the related Microsoft documentation to find a procedure to verify your changes.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 17:22:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/What-s-the-best-practice-to-configure-a-windows-system-to/m-p/467533#M7011</guid>
      <dc:creator>kdamak_splunk</dc:creator>
      <dc:date>2019-10-29T17:22:20Z</dc:date>
    </item>
  </channel>
</rss>

