Monitoring Splunk

Unable to receive Windows Event ID 4624 and 4625 data from Splunk Forwarders

sanju2408de
Explorer

Hello,

I am looking for a help here, this is a very weird issue that I am facing. I have a requirement to monitor Event ID 4624 and 4625 from a specific set (10) of servers.

I have used following inputs.conf, but instead of receiving these specific events data, i am receiving some other event codes such 4670, 4719, 4742, 4738 etc.

I have tried almost all possible ways, but unable to understand what's really happening here.

[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
# only index events with these event IDs.
whitelist = 4624, 4625
index = wineventlog
sourcetype = xyz
renderXml=false

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @sanju2408de,

I always prefer regexes:

whitelist = 4624|4625

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...