<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to convert SID to Active Directory friendly name for an alert? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222642#M65472</link>
    <description>&lt;P&gt;Add the following to your WinEventLog Security stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;evt_resolve_ad_obj = 1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Keep in mind this is going to resolve objects  using your default DC but you can specify the server name too by using the following attributes:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;evt_dc_name
evt_dns_name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Mon, 11 Jan 2016 18:21:41 GMT</pubDate>
    <dc:creator>javiergn</dc:creator>
    <dc:date>2016-01-11T18:21:41Z</dc:date>
    <item>
      <title>How to convert SID to Active Directory friendly name for an alert?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222641#M65471</link>
      <description>&lt;P&gt;I'm new to Splunk and trying to configure an alert so when Windows Event ID 4760 occurs.  I have the basic syntax created, but when the event occurs in the the New Security Descriptor field, it shows the changes with the active directory SID, and I would like it to show in the alert with the friendly active directory account/group name for a quick glance check.  Is there a way to do this?  Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2016 17:06:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222641#M65471</guid>
      <dc:creator>dmittel</dc:creator>
      <dc:date>2016-01-11T17:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to convert SID to Active Directory friendly name for an alert?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222642#M65472</link>
      <description>&lt;P&gt;Add the following to your WinEventLog Security stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;evt_resolve_ad_obj = 1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Keep in mind this is going to resolve objects  using your default DC but you can specify the server name too by using the following attributes:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;evt_dc_name
evt_dns_name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Jan 2016 18:21:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222642#M65472</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2016-01-11T18:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to convert SID to Active Directory friendly name for an alert?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222643#M65473</link>
      <description>&lt;P&gt;Sorry, I'm an idiot and accidentally posted this as an answer, reposting as a comment:&lt;/P&gt;

&lt;P&gt;Let me ask this a different way. Below is an example of one of the events that I am talking about. What I am looking to do is send out an alert that reports back this event with who made the change (Account Name) and what the change was Original Security Descriptor and New Security Descriptor, but have it translate in the descriptor fields if there is a SID, like S-1-5-21-222222222-222222222-222222222-22222 in the example below) to the SAMAccountName.&lt;/P&gt;

&lt;P&gt;01/11/2016 10:08:36 AM&lt;BR /&gt;
 LogName=Security&lt;BR /&gt;
 SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
 EventCode=4670&lt;BR /&gt;
 EventType=0&lt;BR /&gt;
 Type=Information&lt;BR /&gt;
 ComputerName=domain.org&lt;BR /&gt;
 TaskCategory=Authorization Policy Change&lt;BR /&gt;
 OpCode=Info&lt;BR /&gt;
 RecordNumber=10759617&lt;BR /&gt;
 Keywords=Audit Success&lt;BR /&gt;
 Message=Permissions on an object were changed.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
     Security ID:        S-1-5-21-111111111-111111111-1111111111-11111&lt;BR /&gt;
     Account Name:        admin&lt;BR /&gt;
     Account Domain:        domain&lt;BR /&gt;
     Logon ID:        0x1EEDD4C&lt;/P&gt;

&lt;P&gt;Object:&lt;BR /&gt;
     Object Server:    Security&lt;BR /&gt;
     Object Type:    File&lt;BR /&gt;
     Object Name:    D:\Test&lt;BR /&gt;
     Handle ID:    0x139c&lt;/P&gt;

&lt;P&gt;Process:&lt;BR /&gt;
     Process ID:    0x998&lt;BR /&gt;
     Process Name:    C:\Windows\explorer.exe&lt;/P&gt;

&lt;P&gt;Permissions Change:&lt;BR /&gt;
     Original Security Descriptor:    D:(A;OICI;FA;;;BA)(A;OICI;FA;;;SY)(A;;FA;;;BA)(A;OICIIO;GA;;;CO)(A;OICI;0x1200a9;;;BU)(A;CI;LC;;;BU)(A;CI;DC;;;BU)&lt;BR /&gt;
     New Security Descriptor:    D:ARAI(A;;FA;;;BA)(A;OICI;0x1301bf;;;S-1-5-21-222222222-222222222-222222222-22222)(A;OICIID;FA;;;BA)(A;OICIID;FA;;;SY)(A;OICIIOID;GA;;;CO)(A;OICIID;0x1200a9;;;BU)(A;CIID;LC;;;BU)(A;CIID;DC;;;BU)&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2016 21:36:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222643#M65473</guid>
      <dc:creator>dmittel</dc:creator>
      <dc:date>2016-01-11T21:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to convert SID to Active Directory friendly name for an alert?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222644#M65474</link>
      <description>&lt;P&gt;In that case your best option is to use a lookup in order to translate SIDs into Account Names.&lt;BR /&gt;
You've got several options to do this:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Dump every day (week, hour, ...) all your AD account names and SIDs into SQL and build a DB lookup&lt;/LI&gt;
&lt;LI&gt;Dump every day (week, hour, ...) all your AD account names and SIDs into a CSV and build a file lookup&lt;/LI&gt;
&lt;LI&gt;Use the LDAP app and connect to your AD&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;I personally prefer options 1 or 2. Whatever is easier for you. DB lookup is what I'm using at work to translate SIDs into Account Names before I can generate an alert for unauthorised access to files.&lt;/P&gt;

&lt;P&gt;Let me know if that helps.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2016 10:13:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-convert-SID-to-Active-Directory-friendly-name-for-an/m-p/222644#M65474</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2016-01-12T10:13:04Z</dc:date>
    </item>
  </channel>
</rss>

