<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reporting Windows Security Events 4732 for BUILTIN\Administrators in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/Reporting-Windows-Security-Events-4732-for-BUILTIN/m-p/512485#M8315</link>
    <description>&lt;P&gt;There is no such mechanism to identify os type with the logs. You may identify os type based on host if your organization is following some kind of naming convention to distinguish servers and endpoints.&lt;/P&gt;&lt;P&gt;or have csv file which contains hostname and os type of hosts which are sending logs. Then you can lookup os type based on host field.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Aug 2020 03:32:58 GMT</pubDate>
    <dc:creator>thambisetty</dc:creator>
    <dc:date>2020-08-05T03:32:58Z</dc:date>
    <item>
      <title>Reporting Windows Security Events 4732 for BUILTIN\Administrators</title>
      <link>https://community.splunk.com/t5/Reporting/Reporting-Windows-Security-Events-4732-for-BUILTIN/m-p/512479#M8314</link>
      <description>&lt;LI-CODE lang="markup"&gt;LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4732

Group:
Security ID: BUILTIN\Administrators
Group Name: Administrators
Group Domain: Builtin&lt;/LI-CODE&gt;
&lt;P&gt;I am interested in Reporting on the above Event for only Windows Server Systems?&amp;nbsp; Searching for the EventCode returns results for all Windows 10 systems as well. Can someone give me an example of how to cross reference those results with OS Type?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 04:43:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Reporting-Windows-Security-Events-4732-for-BUILTIN/m-p/512479#M8314</guid>
      <dc:creator>MarkSplunker02</dc:creator>
      <dc:date>2020-08-05T04:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Reporting Windows Security Events 4732 for BUILTIN\Administrators</title>
      <link>https://community.splunk.com/t5/Reporting/Reporting-Windows-Security-Events-4732-for-BUILTIN/m-p/512485#M8315</link>
      <description>&lt;P&gt;There is no such mechanism to identify os type with the logs. You may identify os type based on host if your organization is following some kind of naming convention to distinguish servers and endpoints.&lt;/P&gt;&lt;P&gt;or have csv file which contains hostname and os type of hosts which are sending logs. Then you can lookup os type based on host field.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 03:32:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Reporting-Windows-Security-Events-4732-for-BUILTIN/m-p/512485#M8315</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2020-08-05T03:32:58Z</dc:date>
    </item>
  </channel>
</rss>

