We recently obtained a Splunk Enterprise license with a 6GB/day limit.
We installed approximately 20 Windows Forwarders and configured them to forward only the Windows Security logs with the exception of our 4 Active Directory servers which we also added AD information to the collection.
As of this morning (day 3), there are only 3,655 events logged total, but our daily quota is already above 25%. We exceeded the quota yesterday.
What could be eating up all the quota, with so few events?