<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Get windows Local login logs using WMI in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482064#M193183</link>
    <description>&lt;P&gt;Have you reviewed this:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/Data/MonitorWMIdata"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/Data/MonitorWMIdata&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Mar 2020 10:44:54 GMT</pubDate>
    <dc:creator>anmolpatel</dc:creator>
    <dc:date>2020-03-09T10:44:54Z</dc:date>
    <item>
      <title>Get windows Local login logs using WMI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482063#M193182</link>
      <description>&lt;P&gt;Dear , &lt;BR /&gt;
I have cluster setup and we need to collect local logging logs from work station using WMI without install UF on targets so I need to know the pre-request . &lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 07:42:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482063#M193182</guid>
      <dc:creator>khalidewaidah</dc:creator>
      <dc:date>2020-03-04T07:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Get windows Local login logs using WMI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482064#M193183</link>
      <description>&lt;P&gt;Have you reviewed this:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/Data/MonitorWMIdata"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/Data/MonitorWMIdata&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 10:44:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482064#M193183</guid>
      <dc:creator>anmolpatel</dc:creator>
      <dc:date>2020-03-09T10:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: Get windows Local login logs using WMI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482065#M193184</link>
      <description>&lt;P&gt;I would also consider using Windows Event Forwarding (WEF).  WMI log collection has always been problematic for me at scale, since WMI breaks a lot.  We use WEF with all our VDIs (45k+).&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 13:16:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482065#M193184</guid>
      <dc:creator>xavierashe</dc:creator>
      <dc:date>2020-03-09T13:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Get windows Local login logs using WMI</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482066#M193185</link>
      <description>&lt;P&gt;It can be done:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWMIdata"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWMIdata&lt;/A&gt;&lt;BR /&gt;
But it is sub-optimal to using a standard UF and has downsides and complications:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/TroubleshootingWMI"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/TroubleshootingWMI&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Mar 2020 21:45:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Get-windows-Local-login-logs-using-WMI/m-p/482066#M193185</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2020-03-15T21:45:58Z</dc:date>
    </item>
  </channel>
</rss>

