<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: File Deletion search query in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414827#M167108</link>
    <description>&lt;P&gt;Hi Adonio,&lt;/P&gt;

&lt;P&gt;Can you paste the complete query here&lt;/P&gt;</description>
    <pubDate>Thu, 11 Oct 2018 16:18:45 GMT</pubDate>
    <dc:creator>mailmetoramu</dc:creator>
    <dc:date>2018-10-11T16:18:45Z</dc:date>
    <item>
      <title>File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414818#M167099</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;Actually in one of my server, some files has been deleted from the file path C\Windows\Systems32\drivers\etc\hosts.&lt;/P&gt;

&lt;P&gt;Under the hosts, the file has been completely deleted by someone, need to investigate on that.&lt;/P&gt;

&lt;P&gt;Can anyone tell me exact query i need to type in search head to fetch the logs from splunk from this particular directory.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Ramu.R&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 14:40:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414818#M167099</guid>
      <dc:creator>mailmetoramu</dc:creator>
      <dc:date>2018-10-11T14:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414819#M167100</link>
      <description>&lt;P&gt;Can you please try? &lt;CODE&gt;index=* source="C:\\Windows\\Systems32\\drivers\\etc\\hosts.*"&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 14:53:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414819#M167100</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2018-10-11T14:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414820#M167101</link>
      <description>&lt;P&gt;are you pulling that data into splunk? &lt;BR /&gt;
to find deletions or file modifications, you will have to enable auditing on that particular directory / file&lt;BR /&gt;
this is being done on the windows (OS) side. also, you will have to pull and bring windows security event logs to splunk&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 15:09:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414820#M167101</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2018-10-11T15:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414821#M167102</link>
      <description>&lt;P&gt;If your windows AD data is coming into splunk indexes, then you can identify who has deleted it most probably &lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 15:25:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414821#M167102</guid>
      <dc:creator>iamarkaprabha</dc:creator>
      <dc:date>2018-10-11T15:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414822#M167103</link>
      <description>&lt;P&gt;i think it will be good to double check, without proper auditing rules enabled on the directory or file prior to deletion, imho widows will not log the file deletion.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 15:31:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414822#M167103</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2018-10-11T15:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414823#M167104</link>
      <description>&lt;P&gt;I think it will log those info. The event code for file deletion is 4656 . &lt;BR /&gt;
Please refer to the below links for more information.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.netwrix.com/how_to_detect_who_deleted_file.html"&gt;https://www.netwrix.com/how_to_detect_who_deleted_file.html&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4656"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4656&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 15:52:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414823#M167104</guid>
      <dc:creator>iamarkaprabha</dc:creator>
      <dc:date>2018-10-11T15:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414824#M167105</link>
      <description>&lt;P&gt;Hi ddrillic,&lt;/P&gt;

&lt;P&gt;Its not working actually, moreover i did not see the host name mentioned in your query.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Ramu.R&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 16:04:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414824#M167105</guid>
      <dc:creator>mailmetoramu</dc:creator>
      <dc:date>2018-10-11T16:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414825#M167106</link>
      <description>&lt;P&gt;All proper rules has been enabled perfectly. Just mention only the required query instead of posting links for articles, i have already gone through 100s of link like these, then only i came here for answer.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 16:07:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414825#M167106</guid>
      <dc:creator>mailmetoramu</dc:creator>
      <dc:date>2018-10-11T16:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414826#M167107</link>
      <description>&lt;P&gt;in that case, look for &lt;CODE&gt;... EventCode=4656 ... &amp;lt;file name&amp;gt; ...&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 16:13:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414826#M167107</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2018-10-11T16:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414827#M167108</link>
      <description>&lt;P&gt;Hi Adonio,&lt;/P&gt;

&lt;P&gt;Can you paste the complete query here&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 16:18:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414827#M167108</guid>
      <dc:creator>mailmetoramu</dc:creator>
      <dc:date>2018-10-11T16:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: File Deletion search query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414828#M167109</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;Lets make my question as below : &lt;/P&gt;

&lt;P&gt;Hostname : abc123&lt;/P&gt;

&lt;P&gt;File Path : C\Windows\System32\drivers\etc\hosts&lt;/P&gt;

&lt;P&gt;Under the hosts, the file has been completely deleted by someone. Can anyone tell me exact query for this scenario.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Ramu.R&lt;/P&gt;</description>
      <pubDate>Fri, 12 Oct 2018 14:34:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/File-Deletion-search-query/m-p/414828#M167109</guid>
      <dc:creator>mailmetoramu</dc:creator>
      <dc:date>2018-10-12T14:34:20Z</dc:date>
    </item>
  </channel>
</rss>

