Getting Data In

How to audit files in Splunk monitoring security events in windows 2012 server.

dfigurello
Communicator

Hi Splunkers,

I need a help to audit some files in Microsoft Windows 2012, files like C:\Windows\System32\drivers\etc\hosts, .dlls and so on. In this moment I want to monitor the files, for example: Who deleted this file? Who changed this file?

I am having problem to understand security logs in Windows. Is there any way to solve my problem?
Do you have any idea about that?

Cheers!

0 Karma

dfigurello
Communicator

Hi Ahal_splunk,

I followed your first link, but Windows server 2012 did not generate audit data. I searched in microsoft blogs which suggest execute that command to solve the problem:

C:\Windows\system32>auditpol /set /subcategory:"file system" /success:enable /failure:enable,

then I collected the data to extract value. 🙂

I'd like to thank you for this links.

Cheers!

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...