Getting Data In

Many 4663 Win Events for the same file

mgaleti
New Member

Dear Colleagues,

I am configuring Splunk to listen my File Server in the WMI Security Events.
Splunk is listening well.

I turned on Audit, for example, in one file from my TI folder.

When I open one file (inside this test folder), change it and close I can see, inside Windows Event log, not 1 or 2 or 3 events 4663 but 80 or 90 events !!!!

Do you have some idea about this ? What is happening ? Do you have this too ??

Thanks
Galeti

0 Karma

rovechkin_splun
Splunk Employee
Splunk Employee

Are you using windows explorer to do the test? The explorer does multiple calls into directory and file itself, first to show it to you and then open it (e.g. using notepad). Since audit check is done at Win32 API level it will generate multiple events. Explorer may also do periodic refresh of the directory, which also causes audit events to be logged.

You can use ProcessMonitor from sysinternals to see details of file access.

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...