All Apps and Add-ons

Event Code 4732

julian0125
Explorer

Hello, i need your help, i want to know why i can not see logs from windows event code 4732 (New user) on the splunk search i ony see logs from 4624 and 4634, do i need to configure something?

0 Karma
1 Solution

whrg
Motivator

You need to enable the "Audit account management" policy.

If you are dealing with just one Windows client, then you can configure local audit policies in the Local Security Policy Editor. Check out this page: Configure Local Audit Policies.

If you are dealing with multiple Windows clients or server, then you should go through the Group Policy Management Editor.

EDIT: Check out this page from the Splunk App for Windows Infrastructure: Configure Active Directory audit policy.

View solution in original post

0 Karma

whrg
Motivator

You need to enable the "Audit account management" policy.

If you are dealing with just one Windows client, then you can configure local audit policies in the Local Security Policy Editor. Check out this page: Configure Local Audit Policies.

If you are dealing with multiple Windows clients or server, then you should go through the Group Policy Management Editor.

EDIT: Check out this page from the Splunk App for Windows Infrastructure: Configure Active Directory audit policy.

0 Karma

julian0125
Explorer

Thanks for the answer i will try and do that, i hope i see all the logs coming from the server to splunk

0 Karma
Get Updates on the Splunk Community!

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Buttercup Games: Further Dashboarding Techniques (Part 8)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...