Getting Data In

Many 4663 Win Events for the same file

mgaleti
New Member

Dear Colleagues,

I am configuring Splunk to listen my File Server in the WMI Security Events.
Splunk is listening well.

I turned on Audit, for example, in one file from my TI folder.

When I open one file (inside this test folder), change it and close I can see, inside Windows Event log, not 1 or 2 or 3 events 4663 but 80 or 90 events !!!!

Do you have some idea about this ? What is happening ? Do you have this too ??

Thanks
Galeti

0 Karma

rovechkin_splun
Splunk Employee
Splunk Employee

Are you using windows explorer to do the test? The explorer does multiple calls into directory and file itself, first to show it to you and then open it (e.g. using notepad). Since audit check is done at Win32 API level it will generate multiple events. Explorer may also do periodic refresh of the directory, which also causes audit events to be logged.

You can use ProcessMonitor from sysinternals to see details of file access.

Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...