Getting Data In

Many 4663 Win Events for the same file

mgaleti
New Member

Dear Colleagues,

I am configuring Splunk to listen my File Server in the WMI Security Events.
Splunk is listening well.

I turned on Audit, for example, in one file from my TI folder.

When I open one file (inside this test folder), change it and close I can see, inside Windows Event log, not 1 or 2 or 3 events 4663 but 80 or 90 events !!!!

Do you have some idea about this ? What is happening ? Do you have this too ??

Thanks
Galeti

0 Karma

rovechkin_splun
Splunk Employee
Splunk Employee

Are you using windows explorer to do the test? The explorer does multiple calls into directory and file itself, first to show it to you and then open it (e.g. using notepad). Since audit check is done at Win32 API level it will generate multiple events. Explorer may also do periodic refresh of the directory, which also causes audit events to be logged.

You can use ProcessMonitor from sysinternals to see details of file access.

Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...