please read: that what i did exactly , i havent LOOKUP-ms_ad_obj_wrkaround_msad_action from the begin and i create it as the app owner told IMPORTANT - XMLWinEventLog - msad_action field extraction - Work Around There is a current issue where the msad_action field is not being extracted by the Splunk AddOn for Windows for XMLWinEventLogs. This field is heavily leveraged by this application, so below is a workaround until the TA is fixed, or a new version of this app is released. First: Add an automatic lookup for source XMLWinEventLog:Security using the AD_Audit_Change_EventCodes lookup. In the MS Windows AD Objects app, navigate to Settings - - > Lookups - - > Automatic Lookups. Click New Automatic Lookup Enter the following: Name: ms_ad_obj_wrkaround_msad_action Source: XmlWinEventLog:Security Lookup Input Fields: EventCode = EventCode obj_type = obj_type Lookup output Fields: change_action = change_action Click Save Set the permissions to the app and role permissions Second: Update the source::XmlWinEventLog:Security : EVAL-msad_action calculated field in the MS Windows AD Objects app. In the MS Windows AD Objects app, navigate to Settings - - > Fields - - > Calculated Fields In the Search box, type msad_action Click on the source::XmlWinEventLog:Security : EVAL-msad_action Replace the Eval Expression: From: if(msad_action=“change” OR msad_action=“changed” OR msad_action=“set” OR msad_action=“reset”,“modified”,if(msad_action=“add”,“added”,if(EventID=“4722",“enabled”,msad_action))) To: if(isnull(change_action),if(msad_action=“change” OR msad_action=“changed” OR msad_action=“set” OR msad_action=“reset”,“modified”,if(msad_action=“add”,“added”,if(EventID=“4722”,“enabled”,msad_action))),change_action) Click Save
... View more