Getting Data In

AD Monitoring - Help?

jammcg
New Member

Hi,

I have just installed a splunk trial, that is monitoring AD events and Windows Security logs of the DC. My question is if I move a user into the domain admin group...how do I find the event to create an alert on?

Searching for the specific user ID does not seem to present an ADmon event type appropriately. Any help with monitoring active directory for this kind of activity would be great

0 Karma

treinke
Builder

Personally, I use Windows Security Operations Center.

There is a lot of built in reports for users and groups being added and deleted. One of the dashboards I speed time each day looking at is accounts that were locked at and the NTLM and RDP failures.

There are no answer without questions
0 Karma

treinke
Builder

also from the canned reports in the app, you can view the results and then see the searches they run to get those reports to help learn and then build alerts.

There are no answer without questions
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...