Getting Data In

Microsoft-AzureADPasswordProtection-DCAgent

Dilsheer_P
Loves-to-Learn Lots

I ma trying to onboard the %SystemRoot%\System32\Winevt\Logs\Microsoft-AzureADPasswordProtection-DCAgent%4Admin.evtx logs

This logs is available on the eventviewer under Eventviwer-> Application and Services Logs -> Microsoft -> AzureADPasswordprotection ->DCAgent -> Admin

I have added the below inputs.conf stanza in Windows_TA addon

[WinEventLog://Microsoft-AzureADPasswordProtection-DCAgent/Admin]
disabled = false
index = wineventlog_itd
renderXml=false

&

[WinEventLog:Microsoft-AzureADPasswordProtection-DCAgent/Admin*]
disabled = false
index = wineventlog_itd
renderXml=false

Both are not working. Any thoughts ??

Labels (1)
0 Karma

anel
Explorer

Hey @Dilsheer_P , 

did you find a way that worked for you? 

Thanks!

0 Karma

PickleRick
SplunkTrust
SplunkTrust

You can't use wildcards. So assuming you have a single log and your name is ok (I don't use Azure stuff so can't verify the actual name of the channel but it looks reasonable) the first syntax should be ok.

You can use

splunk list inputstatus

to see how your inputs are doing. Check the spkunkd.log on the forwarder as well.

Does your UF have enough permissions to read that channel?

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...

Developer Spotlight with Guilhem Marchand

From Splunk Engineer to Founder: The Journey Behind TrackMe    After spending over 12 years working full time ...

Cisco Catalyst Center Meets Splunk ITSI: From 'Payments Are Down' to Root Cause in ...

The Problem: When Networks and Services Don't Talk Payment systems fail at a retail location. Customers are ...