i want to log dns audit events such as the deletion/creation of dns entries.
I've installed Splunk app for Windows Infrastructure and Splunk supporting addon for Active Directory.
Everything is working fine so far.
The events for which i'm looking for are:
A resource record of type 1, name test.mydomain.com, TTL 3600 and RDATA 0xAC12200B was created in scope Default of zone mydomain.com.
Let me know, if you guys need further details.
So Windows Eventlog is logging this events. But how is it possible to get this data into splunk?
Any help would be appreciated! 🙂
any update on this @itinfrastructur
at first check if DNS Server is logging.
Whick Technical Addons you installed on the DNS Server?
Then, did you enabled in the Technical Add-On the stanza to ingest DNS logs?
I suggest to follow the documentation at https://docs.splunk.com/Documentation/MSApp/1.5.2/MSInfra/AbouttheSplunkAppforMSInfrastructure