Splunk Enterprise Security

Analytic Story: Domain Account Discovery With Net App?

Araton71
Loves-to-Learn

I'm a newbe and I try to configure Security Essential to search "net user /DOMAIN"  discovery on my  AD server.

I've installed an UniversalForwarder into AD with sysmon and configured input.conf with following entries

[WinEventLog://Security]
checkpointInterval = 5
current_only = 0
disabled = 0
start_from = oldest

 

[WinEventLog://Microsoft-Windows-Sysmon/Operational]
checkpointInterval = 5
current_only = 0
disabled = 0
start_from = oldest

If I run a simple search using index=* "net.exe" AND " user*" AND "*/do*" 

I get result from source WinEventLog:Microsoft-Windows-Sysmon/Operational

while If I use Analytic Story: Domain Account Discovery With Net App  that use datamodel Endpoint, no events returned. It seems that event in data model are only from source WinEventLog:Security

What I miss ?

Labels (1)
Tags (1)
0 Karma

SinghK
Builder

I think you need to configure and accelerate the relevant datamodels in splunk for that. Settings-->datamodels.

https://docs.splunk.com/Documentation/Splunk/9.0.4/Knowledge/Aboutdatamodels  look at this as well.

0 Karma

Araton71
Loves-to-Learn

Datamodel Endpoint has data inside, but it seems that only from security logs not from sysmon. How can implement?

0 Karma
Get Updates on the Splunk Community!

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL  The Splunk AI Assistant for SPL ...

Buttercup Games: Further Dashboarding Techniques (Part 5)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Customers Increasingly Choose Splunk for Observability

For the second year in a row, Splunk was recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for ...