Getting Data In

How to configure inputs.conf to get PowerShell and WinRM event logs from Windows hosts?

pkeller
Contributor

I've been asked to index both Operational.evtx and Analytic.etl from both \Winevt\Logs\Microsoft-Windows-WinRM and \Winevt\Logs\Microsoft-Windows-PowerShell from a few Windows hosts.

I'm not quite sure how to configure the inputs.conf for this. I'm guessing that it's something like:

[WinEventLog:PowerShell]
disabled = 1
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
renderXml=false
or

[WinEventLog:WinRM]
..

But again, not really clear. (and not at all Windows literate) And then how do you differentiate between the Operational and Analytic objects.

Thank you

0 Karma

ddrillic
Ultra Champion

The following speaks about it - Forwarding Windows Event Logs to another host

In Step 4, it shows -

[WinEventLog://SOURCE-Security]
sourcetype = WinEventLog:Security
host = SOURCE
disabled = false
0 Karma

spayneort
Contributor
[WinEventLog://Microsoft-Windows-PowerShell/Operational]
disabled = false

[WinEventLog://Microsoft-Windows-WinRM/Operational]
disabled = false
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...