Alerting

Is there a way to have Splunk notify admins when a user has removed or installed a Windows application they are not supposed to?

skparkj
New Member

Hello,

Is there a way to have Splunk notify admins when a user has removed a windows application or installed an application that they are not supposed to? I know you can search Windows event ID's, but I believe that generates too many log files. Any apps or premium Splunk solutions?

0 Karma
1 Solution

jnussbaum_splun
Splunk Employee
Splunk Employee

The Splunk App for Windows Infrastructure (with the Splunk Add On for Microsoft Windows installed on your endpoints) will show app app installs, and can be configured to show uninstalls.

Event code 11707 is app installs, so you could either feed this search a filter to produce results where a program that's installed isn't a part of a lookup table or existing search result of programs that should be installed.

Similar logic can be applied to program uninstalls, which is Event code 11724.

Alerts can be created to schedule the search and take action when results are found.

As far as Windows generating too many log files, if needed - you could have the forwarder only forward event codes you're looking for. If you do this however, you'll be missing out on other use cases and value.

Hope this helps.

View solution in original post

jnussbaum_splun
Splunk Employee
Splunk Employee

The Splunk App for Windows Infrastructure (with the Splunk Add On for Microsoft Windows installed on your endpoints) will show app app installs, and can be configured to show uninstalls.

Event code 11707 is app installs, so you could either feed this search a filter to produce results where a program that's installed isn't a part of a lookup table or existing search result of programs that should be installed.

Similar logic can be applied to program uninstalls, which is Event code 11724.

Alerts can be created to schedule the search and take action when results are found.

As far as Windows generating too many log files, if needed - you could have the forwarder only forward event codes you're looking for. If you do this however, you'll be missing out on other use cases and value.

Hope this helps.

Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...

Observability | Use Synthetic Monitoring for Website Metadata Verification

If you are on Splunk Observability Cloud, you may already have Synthetic Monitoringin your observability ...

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...