Relatively new to splunk but after a few challenges I have my splunk deployment up and running. I've limited this to 7 specific window event codes, namely (4776,4720,4723,1102,4624,4726,4625). I dont have the stick with these but I had advice from Splunk that this would be a good start. However I now need to turn these into a good set of security use cases. I probably need to expand my inputs.conf file as currently its deliberately limited: [WinEventLog://Application] disabled = 1 start_from = oldest current_only = 0 checkpointInterval = 5 renderXml=true [WinEventLog://Security] disabled = 0 start_from = oldest current_only = 0 evt_resolve_ad_obj = 1 checkpointInterval = 5 whitelist = 4776,4720,4723,1102,4624,4726,4625 index=wineventlog renderXml=true [WinEventLog://System] disabled = 1 start_from = oldest current_only = 0 checkpointInterval = 5 renderXml=true So my question is to get some good security event logs from what I have configured above, do I just work with this and try to get the search terms to match what I'm trying to achieve or is there anything more fundamental I need to change first? Also, if there are any good resources for windows security searches that would be great. Thanks!
... View more