Getting Data In

How to monitor Active Directory changes and security events with Universal forwarder?

jared_anderson
Path Finder

We want to monitor Active Directory changes and security Events We are planning to deploy the Universal forwarder to each domain controller. I am confused by the documentation. What is needed/best practice to accomplish this? Do we need to install add-ons to the universal forwarder? Can we just monitor Windows Event security logs?

0 Karma
1 Solution

ddrillic
Ultra Champion

@jared_anderson, you need to install the Universal forwarder and configure it to monitor these sources.

The following Monitor Windows event log data

says -

Windows event log (*.evt) files are in binary format. You cannot monitor them like you do a normal text file. The splunkd service monitors these binary files by using the appropriate APIs to read and index the data within the files.

Splunk Enterprise uses the following stanzas in inputs.conf to monitor the default Windows event logs:

# Windows platform specific input processor.
[WinEventLog://Application]
disabled = 0 
[WinEventLog://Security]
disabled = 0 
[WinEventLog://System]
disabled = 0 

So,

Do we need to install add-ons to the universal forwarder?
Nope

Can we just monitor Windows Event security logs?
Yes

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi jared_anderson,
install the Splunk App for Windows Infrastructure: see installation specs at http://docs.splunk.com/Documentation/MSApp/latest/MSInfra/AbouttheSplunkAppforMSInfrastructure : you can find all the TAs to install and how to install them.
Bye.
Giuseppe

0 Karma

ddrillic
Ultra Champion

@jared_anderson, you need to install the Universal forwarder and configure it to monitor these sources.

The following Monitor Windows event log data

says -

Windows event log (*.evt) files are in binary format. You cannot monitor them like you do a normal text file. The splunkd service monitors these binary files by using the appropriate APIs to read and index the data within the files.

Splunk Enterprise uses the following stanzas in inputs.conf to monitor the default Windows event logs:

# Windows platform specific input processor.
[WinEventLog://Application]
disabled = 0 
[WinEventLog://Security]
disabled = 0 
[WinEventLog://System]
disabled = 0 

So,

Do we need to install add-ons to the universal forwarder?
Nope

Can we just monitor Windows Event security logs?
Yes

0 Karma

jared_anderson
Path Finder

For some reason I can't mark your answer as "accept"

0 Karma

jared_anderson
Path Finder

What benefit would there be to install add-ons to the universal forwarder. For example an active directory add-on?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...