<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need a search to tell me who deleted an OU object in Active Directory in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13896#M1404</link>
    <description>&lt;P&gt;Okay, I see the Windows Security events when I delete group objects now that I've enabled AD auditing. However, when I delete a top most  OU object itself, I do NOT see any Windows Security event generated for that. I do see the ActiveDirectory DEL event, but it does not tell me which user made the deletion.&lt;/P&gt;</description>
    <pubDate>Tue, 25 May 2010 22:06:09 GMT</pubDate>
    <dc:creator>maverick</dc:creator>
    <dc:date>2010-05-25T22:06:09Z</dc:date>
    <item>
      <title>Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13890#M1398</link>
      <description>&lt;P&gt;I have Windows Security events that tell me when a user logged on and I have an ActiveDirectory event that tells me that an OU object was deleted, but I cannot figure out how to correlate the two events together without a common unique "id" field (value) to link them.&lt;/P&gt;

&lt;P&gt;Is there a configuration within AD or within Windows that will log some sort of common ID or GUID to both events so I can use tie them together into a "this person deleted this OU object" in a report? &lt;/P&gt;

&lt;P&gt;Or, am I out of luck and maybe there is some search that will get me close to correlating these two semi-related events in such a way that I can get an approximate report along these lines?&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2010 01:24:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13890#M1398</guid>
      <dc:creator>maverick</dc:creator>
      <dc:date>2010-05-20T01:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13891#M1399</link>
      <description>&lt;P&gt;I'll look into this and see if I can come up with something...  I'm not sure if it's possible either.&lt;/P&gt;</description>
      <pubDate>Thu, 20 May 2010 08:36:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13891#M1399</guid>
      <dc:creator>Ledio_Ago</dc:creator>
      <dc:date>2010-05-20T08:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13892#M1400</link>
      <description>&lt;P&gt;Maverick, in the deleted AD event, under the "Object details" look for the objectGUID field.  It will look like:&lt;/P&gt;

&lt;P&gt;objectGUID=4afba9d3-6d77-b140-3591-0f45dc297f66&lt;/P&gt;

&lt;P&gt;The same GUID will show up in the Security event related to the deletion of the OU.  The field name in the Seurity event is different, but the value is the same.&lt;/P&gt;

&lt;P&gt;I tried it myself, I deleted a user account in the DC.  The ActiveDirectory event showed up in Splunk together with the WinEventLog Security event with EventCode=630.  Both events had that same GUID.&lt;/P&gt;

&lt;P&gt;In the Security event the GUID looked like:&lt;/P&gt;

&lt;P&gt;Target Account ID:  John Doe&lt;BR /&gt;
DEL:4afba9d3-6d77-b140-3591-0f45dc297f66&lt;/P&gt;

&lt;P&gt;So you can run searches to look for a ActiveDirectory isDeleted=TRUE, which then shares that objectGUID field value in the Security events.&lt;/P&gt;

&lt;P&gt;Another thing you can do is to look for specific EventCodes related to object deletions:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://support.microsoft.com/kb/174074" rel="nofollow"&gt;http://support.microsoft.com/kb/174074&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Event ID: 638&lt;BR /&gt;
       Type: Success Audit&lt;BR /&gt;
Description: Local Group Deleted:  &lt;/P&gt;

&lt;P&gt;Event ID: 634&lt;BR /&gt;
       Type: Success Audit&lt;BR /&gt;
Description: Global Group Deleted:  &lt;/P&gt;

&lt;P&gt;Event ID: 630&lt;BR /&gt;
       Type: Success Audit&lt;BR /&gt;
Description: User Account Deleted:  &lt;/P&gt;

&lt;P&gt;Event ID: 564&lt;BR /&gt;
       Type: Success Audit&lt;BR /&gt;
Description: Object Deleted:  &lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2010 00:16:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13892#M1400</guid>
      <dc:creator>Ledio_Ago</dc:creator>
      <dc:date>2010-05-21T00:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13893#M1401</link>
      <description>&lt;P&gt;Thanks!, This makes sense because we can use field aliasing to map the two different fields together as one common name and user that to match on, or transaction on. or we could use rex to normalize both field values into one common field name as well.&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2010 03:32:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13893#M1401</guid>
      <dc:creator>maverick</dc:creator>
      <dc:date>2010-05-21T03:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13894#M1402</link>
      <description>&lt;P&gt;Correct!  If you have problems getting the search right, let me know, I can help with that.&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2010 03:52:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13894#M1402</guid>
      <dc:creator>Ledio_Ago</dc:creator>
      <dc:date>2010-05-21T03:52:25Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13895#M1403</link>
      <description>&lt;P&gt;I only see EventCode=630. I do not have any of the other EventCodes you mention above, although I DO see my ActiveDirectory events saying isDeleted=TRUE for when a group object was deleted. &lt;BR /&gt;
How do I turn on Win security auditing of group deletes so I can get the 638 and 634 EventCodes generated?&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2010 09:40:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13895#M1403</guid>
      <dc:creator>maverick</dc:creator>
      <dc:date>2010-05-21T09:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13896#M1404</link>
      <description>&lt;P&gt;Okay, I see the Windows Security events when I delete group objects now that I've enabled AD auditing. However, when I delete a top most  OU object itself, I do NOT see any Windows Security event generated for that. I do see the ActiveDirectory DEL event, but it does not tell me which user made the deletion.&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2010 22:06:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13896#M1404</guid>
      <dc:creator>maverick</dc:creator>
      <dc:date>2010-05-25T22:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13897#M1405</link>
      <description>&lt;P&gt;Got it to work, finally. I can NOW see the events after enabling local admin auditing as well as group auditing. (log into the domain controller -&amp;gt; administrative tools -&amp;gt; Domain Controller Security Settings and enable the auditing from there.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2010 04:47:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13897#M1405</guid>
      <dc:creator>maverick</dc:creator>
      <dc:date>2010-06-03T04:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: Need a search to tell me who deleted an OU object in Active Directory</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13898#M1406</link>
      <description>&lt;P&gt;Nice, good stuff.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2010 00:07:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-a-search-to-tell-me-who-deleted-an-OU-object-in-Active/m-p/13898#M1406</guid>
      <dc:creator>Ledio_Ago</dc:creator>
      <dc:date>2010-06-07T00:07:11Z</dc:date>
    </item>
  </channel>
</rss>

