<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create an alert if anyone makes changes in my environment? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208805#M3690</link>
    <description>&lt;P&gt;in my environment, there are four admins. now i want to create an alert if anyone did any changes on GUI or internal. HOW???  can anyone let me know? thanks. &lt;/P&gt;</description>
    <pubDate>Tue, 27 Dec 2016 05:00:25 GMT</pubDate>
    <dc:creator>Rocky31</dc:creator>
    <dc:date>2016-12-27T05:00:25Z</dc:date>
    <item>
      <title>How to create an alert if anyone makes changes in my environment?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208805#M3690</link>
      <description>&lt;P&gt;in my environment, there are four admins. now i want to create an alert if anyone did any changes on GUI or internal. HOW???  can anyone let me know? thanks. &lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 05:00:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208805#M3690</guid>
      <dc:creator>Rocky31</dc:creator>
      <dc:date>2016-12-27T05:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert if anyone makes changes in my environment?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208806#M3691</link>
      <description>&lt;P&gt;You can use Splunk's &lt;STRONG&gt;index="_audit"&lt;/STRONG&gt; and &lt;STRONG&gt;user="admin"&lt;/STRONG&gt;. Based on action field you can identify various user activities.&lt;/P&gt;

&lt;P&gt;Refer to Splunk How To video on Youtube for audit security: &lt;A href="https://www.youtube.com/watch?v=Qv-34lKnI70"&gt;https://www.youtube.com/watch?v=Qv-34lKnI70&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You can also refer to Splunk Documentation for Security: &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.1/Security/Searchforauditevents"&gt;http://docs.splunk.com/Documentation/Splunk/6.5.1/Security/Searchforauditevents&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 06:57:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208806#M3691</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2016-12-27T06:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert if anyone makes changes in my environment?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208807#M3692</link>
      <description>&lt;P&gt;i really thank you for your response. what is the term that i have to use for action who did modification.&lt;/P&gt;

&lt;P&gt;i.e is it like action=change&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 13:21:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208807#M3692</guid>
      <dc:creator>Rocky31</dc:creator>
      <dc:date>2016-12-28T13:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert if anyone makes changes in my environment?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208808#M3693</link>
      <description>&lt;P&gt;I have a similar question, if someone did any change to .conf files how to raise a alert.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 17:31:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208808#M3693</guid>
      <dc:creator>Rocky31</dc:creator>
      <dc:date>2016-12-28T17:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert if anyone makes changes in my environment?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208809#M3694</link>
      <description>&lt;P&gt;There are multiple actions that you would need to watch. In fact you might have to check your existing logs for such historical transactions.&lt;/P&gt;

&lt;P&gt;For example action=&lt;STRONG&gt;add&lt;/STRONG&gt; can be used to monitor files/configurations added. You should also use path to identify what kind of file and what location has the file been added. Like path="&lt;EM&gt;.xml&lt;/EM&gt;" OR path="&lt;EM&gt;.html&lt;/EM&gt;" will show a view added to any app.&lt;/P&gt;

&lt;P&gt;Similarly for action=&lt;STRONG&gt;update&lt;/STRONG&gt; or action=&lt;STRONG&gt;delete&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;action="&lt;STRONG&gt;change_authentication&lt;/STRONG&gt;" monitors change in user authentication&lt;/P&gt;

&lt;P&gt;There are several &lt;STRONG&gt;action="edit_&lt;/STRONG&gt;*" which monitor specific Splunk component modification. For example, action="edit_view_html" will monitor changes to HTML views created in Splunk (used along with object=&amp;lt;HTML View Name&amp;gt;)&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;action="login attempt"&lt;/STRONG&gt; along with &lt;STRONG&gt;info&lt;/STRONG&gt; field will give number of login attempts with failed or successful information.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;action="restart_splunkd"&lt;/STRONG&gt; will capture details on who/when Splunk instance was restarted&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;action="search"&lt;/STRONG&gt; and &lt;STRONG&gt;action="rtsearch"&lt;/STRONG&gt; will give information on Splunk Historical and Real Time searches. You can identify which are the long running queries.&lt;/P&gt;

&lt;P&gt;Essentially, you would need to identify and use the specific queries as per your needs.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:13:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-alert-if-anyone-makes-changes-in-my-environment/m-p/208809#M3694</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2020-09-29T12:13:48Z</dc:date>
    </item>
  </channel>
</rss>

