I am trying to identify the user or process responsible for stopping the Splunk UF agent. What log source do I require to be able to see this.
I have unsuccessfully tried:
Looking for ideas on how this can be achieve from Splunk.
Useful Windows Security Event Log codes to monitor for identifying the user or process responsible for stopping the Splunk UF agent:
Event ID 4688: Logs the creation of a new process. This can help identify the process responsible for stopping the Splunk UF agent.
Event ID 4648: Logs the use of explicit credentials. This can help identify the user who performed the action.
Event ID 4624: Logs successful account logons. This can help track user activity.
Event ID 4625: Logs failed account logons. This can indicate unauthorized attempts to access the system.
Event ID 1102: Logs audit log clearance. This can indicate an attempt to cover tracks.
By monitoring these event codes, you should be able to get a clearer picture of the user or process responsible for stopping the Splunk UF agent.
Please check this https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/
Event ID 7036 in the Windows System Event Log indicates that a service (like SplunkForwarder) changed state (e.g., stopped), but it doesn’t consistently log the user or process responsible for stopping it. This event is generated by the Service Control Manager (SCM) and lacks the context of the initiating action unless additional auditing is enabled.
Audit Logs: Enable auditing on the server to capture detailed information about user actions and process executions. This can provide more visibility into who performed the action