Getting Data In

How to monitor Active Directory changes and security events with Universal forwarder?

jared_anderson
Path Finder

We want to monitor Active Directory changes and security Events We are planning to deploy the Universal forwarder to each domain controller. I am confused by the documentation. What is needed/best practice to accomplish this? Do we need to install add-ons to the universal forwarder? Can we just monitor Windows Event security logs?

0 Karma
1 Solution

ddrillic
Ultra Champion

@jared_anderson, you need to install the Universal forwarder and configure it to monitor these sources.

The following Monitor Windows event log data

says -

Windows event log (*.evt) files are in binary format. You cannot monitor them like you do a normal text file. The splunkd service monitors these binary files by using the appropriate APIs to read and index the data within the files.

Splunk Enterprise uses the following stanzas in inputs.conf to monitor the default Windows event logs:

# Windows platform specific input processor.
[WinEventLog://Application]
disabled = 0 
[WinEventLog://Security]
disabled = 0 
[WinEventLog://System]
disabled = 0 

So,

Do we need to install add-ons to the universal forwarder?
Nope

Can we just monitor Windows Event security logs?
Yes

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi jared_anderson,
install the Splunk App for Windows Infrastructure: see installation specs at http://docs.splunk.com/Documentation/MSApp/latest/MSInfra/AbouttheSplunkAppforMSInfrastructure : you can find all the TAs to install and how to install them.
Bye.
Giuseppe

0 Karma

ddrillic
Ultra Champion

@jared_anderson, you need to install the Universal forwarder and configure it to monitor these sources.

The following Monitor Windows event log data

says -

Windows event log (*.evt) files are in binary format. You cannot monitor them like you do a normal text file. The splunkd service monitors these binary files by using the appropriate APIs to read and index the data within the files.

Splunk Enterprise uses the following stanzas in inputs.conf to monitor the default Windows event logs:

# Windows platform specific input processor.
[WinEventLog://Application]
disabled = 0 
[WinEventLog://Security]
disabled = 0 
[WinEventLog://System]
disabled = 0 

So,

Do we need to install add-ons to the universal forwarder?
Nope

Can we just monitor Windows Event security logs?
Yes

0 Karma

jared_anderson
Path Finder

For some reason I can't mark your answer as "accept"

0 Karma

jared_anderson
Path Finder

What benefit would there be to install add-ons to the universal forwarder. For example an active directory add-on?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...