Getting Data In

Netwrix TA

Okezie1
Explorer

Has anyone ever installed the Netwrix addon in Splunk? Having a bit of trouble with how to do so. 

Labels (1)
0 Karma

acadea
Explorer

yes, I've configured the netwrix powerhsll script to be executed as a scheduled task . 
- also enabled the API on Netwrix ( see settings, API)
- configured splunk UFW to collect the windows event log netwrix_integration_bla_bla

what is the blocking point for you?

0 Karma

Okezie1
Explorer

We were able to create a deployment app on our Heavy Forwarder, created a serverclass as well,  and customized the inputs.conf to grab the Winevent logs. However, the client stated that they were only receiving general audit information that showed who logged in, etc but didn't receive the actual log information.

 

https://docs.splunk.com/Documentation/SplunkCloud/latest/Data/MonitorWindowseventlogdata#Monitor_Win...

 

This is the link we used to assist. 

0 Karma

acadea
Explorer

who logged in... where ? on Netwrix ? on Windows/AD ?

there are 3 Netwrix generated eventlogs on Windows

[WinEventLog://Netwrix Auditor] - > this is the same EventLog that you can see in Netwrix interface regarding events related to data collection etc

[WinEventLog://Netwrix Auditor Security] - > this is containing Netwrix on Netwrix audit, that is who has started Netwrix, what changes were done in the Netwrix interface, etc. Netwrix Auditor Self-audit let's say. I suppose this is what you're describing as currently collected.

[WinEventLog://Netwrix_Auditor_Integration] - > this is what you're after. It should have this format:

08/24/2021 09:56:37 AM
LogName=Netwrix_Auditor_Integration
SourceName=Netwrix_Auditor_Integration_API

EventCode=35940
EventType=4
Type=Information
ComputerName=srv-01
TaskCategory=492
OpCode=Info
RecordNumber=41188878
Keywords=Classic
Message=
DataSource
: Windows Server

Action : Modified
Message: Modified System Time
Where : srv-01
ObjectType : System Time
Who : NT AUTHORITY\SYSTEM
What : System Properties\System Time
When : 2021-08-24T07:36:22Z
Workstation :
Details : System time changed from "2021-08-24T07:36:08.173840600Z" to "2021-08-24T07:36:22.192000000Z"
0 Karma

Okezie1
Explorer

I'll add the [WinEventLog://Netwrix Auditor]  and [WinEventLog://Netwrix_Auditor_Integration] stanzas as well and see what we're able to pull. 

0 Karma

Okezie1
Explorer

My apologies, it was the Netwrix Auditor Security I was referring to. 

0 Karma

acadea
Explorer

well, collect the other eventlog and maybe that will solve your problem ?

0 Karma

acadea
Explorer

can you provide a link to that addon, I'm not able to find it on splunkbase.

or perhaps you're talking about the netwrix addon for splunk  which is a powershell script that is writing netwrix events to windows event log  so that splunk ufw can collect it ?

0 Karma

Okezie1
Explorer

There is no Splunkbase TA. I'm referring to the Netwrix addon for Splunk which is a PowerShell script.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...