Getting Data In

Windows events and %%something entries

PickleRick
SplunkTrust
SplunkTrust

Hi.

I'm using TA for Windows and everything is mostly working OK. But.

In some events I'm receiving values like

ReadOperation%%8100

If I understand correctly, that's _not_ what evt_resolve_ad_obj option should affect, right? That option affects only resolving (or not) SID-s to usernames/groups and this is something completely different, right?

What is it then? And can I force my UF to forward the same contents that I see in Event Log Viewer?

In this case it's

Read Operation: Enumerate Credentials

I understand that it's something that event log viewer is rendering on its own, because in detail view of the event, it does indeed show %%8100 as ReadOperation so it's apparently the program's intepretation of this data that says "Enumerate Credentials".

So I suppose there'd have to be some lookups to "humanize" the events, right?

Labels (1)
0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...