Getting Data In

How to monitor Active Directory changes and security events with Universal forwarder?

jared_anderson
Path Finder

We want to monitor Active Directory changes and security Events We are planning to deploy the Universal forwarder to each domain controller. I am confused by the documentation. What is needed/best practice to accomplish this? Do we need to install add-ons to the universal forwarder? Can we just monitor Windows Event security logs?

0 Karma
1 Solution

ddrillic
Ultra Champion

@jared_anderson, you need to install the Universal forwarder and configure it to monitor these sources.

The following Monitor Windows event log data

says -

Windows event log (*.evt) files are in binary format. You cannot monitor them like you do a normal text file. The splunkd service monitors these binary files by using the appropriate APIs to read and index the data within the files.

Splunk Enterprise uses the following stanzas in inputs.conf to monitor the default Windows event logs:

# Windows platform specific input processor.
[WinEventLog://Application]
disabled = 0 
[WinEventLog://Security]
disabled = 0 
[WinEventLog://System]
disabled = 0 

So,

Do we need to install add-ons to the universal forwarder?
Nope

Can we just monitor Windows Event security logs?
Yes

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi jared_anderson,
install the Splunk App for Windows Infrastructure: see installation specs at http://docs.splunk.com/Documentation/MSApp/latest/MSInfra/AbouttheSplunkAppforMSInfrastructure : you can find all the TAs to install and how to install them.
Bye.
Giuseppe

0 Karma

ddrillic
Ultra Champion

@jared_anderson, you need to install the Universal forwarder and configure it to monitor these sources.

The following Monitor Windows event log data

says -

Windows event log (*.evt) files are in binary format. You cannot monitor them like you do a normal text file. The splunkd service monitors these binary files by using the appropriate APIs to read and index the data within the files.

Splunk Enterprise uses the following stanzas in inputs.conf to monitor the default Windows event logs:

# Windows platform specific input processor.
[WinEventLog://Application]
disabled = 0 
[WinEventLog://Security]
disabled = 0 
[WinEventLog://System]
disabled = 0 

So,

Do we need to install add-ons to the universal forwarder?
Nope

Can we just monitor Windows Event security logs?
Yes

0 Karma

jared_anderson
Path Finder

For some reason I can't mark your answer as "accept"

0 Karma

jared_anderson
Path Finder

What benefit would there be to install add-ons to the universal forwarder. For example an active directory add-on?

0 Karma
Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials

Welcome to the "Splunk Classroom Chronicles" series, created to help curious, career-minded learners get ...

Access Tokens Page - New & Improved

Splunk Observability Cloud recently launched an improved design for the access tokens page for better ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

🍂 Fall into November with a fresh lineup of Community Office Hours, Tech Talks, and Webinars we’ve ...