Getting Data In

Regarding Absence of Windows Security Command Line Events in Logs

AL3Z
Builder

hi ,

We could be the  issue regarding the absence of Windows Security Command Line " EventCode=4688 ParentProcessName="C:\\Windows\\System32\\cmd.exe"  events.
I have not blacklisted it in any of the app.

Thanks.


0 Karma

bharathkumarnec
Contributor

@AL3Z Can you may be run btool to check the full configuration?

0 Karma

AL3Z
Builder

@bharathkumarnec 

Hi, Where exactly we can run this btool to check the configurations. I dnt have back end access can we check in ui.

0 Karma

bharathkumarnec
Contributor

@AL3Z 
$SPLUNK_HOME$/bin/splunk btool inputs list --debug

 

AL3Z
Builder

@bharathkumarnec  Hi,

After investigating I came across audit process creation is this causing this issue ??
https://docs.splunk.com/Documentation/ES/7.2.0/Admin/ConfigureLogging


 

0 Karma

bharathkumarnec
Contributor

@AL3Z please check if the source is generating the data in the event viewer with the information that you are looking ?

0 Karma

AL3Z
Builder

@bharathkumarnec ,

Yes, it is generating the data in the event viewer!

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...