Getting Data In

Is there a best practice guide for Splunk and Windows Event Collectors?

itrimble1
Path Finder

Does anyone have a guide for load balancing among Windows Event Collectors?

We have about 8 Windows Event Collector Servers.

We want to know if there is a best practice guide to get this set up correctly in Splunk, or any other SIEM.

We appear to be experiencing latency from the time the event is transmitted from the UF -----> HF.........>IDX.

0 Karma

itrimble1
Path Finder

I thought I'd answer this post, since I've learned a lot in between the original question and now. These resources really helped me out. I hope they can do the same for you.

Monitoring What Matters - Jessica Payne (Microsoft)
Peeping Through WIndows (Logs) - Hunting With Splunk - Part 5
Integrating Splunk with native Windows Event Collection - Great Webinar from Ultimate Windows Security
To XML or Classic Format - Conclusion is that XML collection is slower than classic rendering
Windows Event Forwarding Guidance - Guide to help setting up central Windows Logging through a collector
Project Sauron - Centralized Storage of Windows Events (Microsoft)
Create and Manage Subscriptions with PowerShell
Best Practice for Configuring EventLog Forwarding - specifically Server 2012R2, Server 2016
Blacklists and Whitelist Tuning - Hurricane Labs - Great guide to save on licensing

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...