For the Windows events/logs that end up in the storage buckets on Splunk Enterprise servers, is Splunk copying the original Windows event log files to its own storage, or is it just ingesting events from the forwarders?
The reason I ask is because our CISO wants our secuity team to retain the original log files for fidelity in case we ever get audited or sued and I feel like we can just setup Splunk to alert us if log files have been cleared. Additionally, if an insider threat were to pull a workstation offline, then clear the logs, we wouldn't have the orignal logs, anyway...
Does anyone know if there are regulations in any industries that require the original log files?
Splunk uses Windows API and WMI (depending on use case) to access event data. If I remember correctly, there was an option to upload an evt file to a splunk instance (not UF!) and ingest it but it must be a Splunk instance running on Windows. I'm not even sure if it still works.
Anyway, even if UF read straight from the windows event log raw files it would still ingest data in rendered format and it would still not affect the original files.
The Windows event logs in Splunk are copies of Windows event logs stored elsewhere.
Yes, you can set up Splunk to alert if an event log is cleared. There's a use case for that in Splunk Security Essentials.