<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to detect when files are deleted, modified, or read on Windows Server? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/560132#M159178</link>
    <description>&lt;P&gt;Ha! My indexer had the Security stanza disabled. Enabled the Security Stanza for Windows_TA on the Indexer (have it on forwarder and search head as well) and Access=Delete shows up now for&amp;nbsp;&lt;SPAN&gt;Event ID: 4656&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jul 2021 22:11:21 GMT</pubDate>
    <dc:creator>irievibe</dc:creator>
    <dc:date>2021-07-19T22:11:21Z</dc:date>
    <item>
      <title>How to detect when files are deleted, modified, or read on Windows Server?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/241987#M71995</link>
      <description>&lt;P&gt;Hello there, &lt;/P&gt;

&lt;P&gt;I'm trying to monitor file access on our file server (Windows 2012 R2) with Splunk Light but I can't quite figure out what to look at as there are just so many events which also seems not quite... intuitive?&lt;/P&gt;

&lt;P&gt;I have a list of things I want to achieve ordered by priority&lt;BR /&gt;
1. detect any file that has been deleted (gone from the server, not moved to a subdirectory or something)&lt;BR /&gt;
2. detect any modification made to a file &lt;BR /&gt;
3. detect any readings on files&lt;/P&gt;

&lt;P&gt;While I think these are pretty basic things on a file server, it seems to me that it is very difficult, especially to distinguish the events that are created. Here's a list of things I &lt;STRONG&gt;don't&lt;/STRONG&gt; care about (yet):&lt;BR /&gt;
1. who accessed a share&lt;BR /&gt;
2. who listed a directory&lt;BR /&gt;
3. that it was checked that a user has permission for any handle or whatever&lt;/P&gt;

&lt;P&gt;So far I've gone through the trouble of modifying the local policies and ACL to get the folowing event-codes:&lt;BR /&gt;
- 5145 (98%)&lt;BR /&gt;
- 4656 (0,6%)&lt;BR /&gt;
- 4663 (0,4%)&lt;BR /&gt;
- 4660 (0,3%)&lt;BR /&gt;
- 5140 (0,1%)&lt;BR /&gt;
- 4659 (0,004%)&lt;BR /&gt;
- 4719 (0,001%)&lt;/P&gt;

&lt;P&gt;Can anyone tell me how to achieve my goals with these events or hint me into directions?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 08:14:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/241987#M71995</guid>
      <dc:creator>elindemann</dc:creator>
      <dc:date>2016-11-18T08:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect when files are deleted, modified, or read on Windows Server?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/241988#M71996</link>
      <description>&lt;P&gt;See if this helps&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;1. detect any file that has been deleted (gone from the server, not moved to a sub-directory or something)
Event Code=4663 AND Accesses= DELETE AND Object Type=File

2. detect any modification made to a file 
Event Code=4663 AND Accesses= WriteData  AND Object Type=File

3. detect any readings on files
&lt;A href="http://blogs.splunk.com/2013/07/08/audit-file-access-and-change-in-windows/" target="test_blank"&gt;http://blogs.splunk.com/2013/07/08/audit-file-access-and-change-in-windows/&lt;/A&gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 18 Nov 2016 23:51:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/241988#M71996</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-11-18T23:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect when files are deleted, modified, or read on Windows Server?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/560132#M159178</link>
      <description>&lt;P&gt;Ha! My indexer had the Security stanza disabled. Enabled the Security Stanza for Windows_TA on the Indexer (have it on forwarder and search head as well) and Access=Delete shows up now for&amp;nbsp;&lt;SPAN&gt;Event ID: 4656&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 22:11:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/560132#M159178</guid>
      <dc:creator>irievibe</dc:creator>
      <dc:date>2021-07-19T22:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to detect when files are deleted, modified, or read on Windows Server?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/560136#M159180</link>
      <description>&lt;P&gt;arg, the appropriate search to find deleted files is:&lt;BR /&gt;EventCode=4656 Accesses=DELETE&lt;/P&gt;&lt;P&gt;Accesses field was what I was having trouble with.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 23:29:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-detect-when-files-are-deleted-modified-or-read-on-Windows/m-p/560136#M159180</guid>
      <dc:creator>irievibe</dc:creator>
      <dc:date>2021-07-19T23:29:48Z</dc:date>
    </item>
  </channel>
</rss>

