Getting Data In

How to attach a group read access to the Windows Eventlog when installing Splunk Universal Forwarder?

koshyk
Super Champion

We are trying to collect data from certain secure Windows Systems and the team have requested to install "Splunk Universal Forwarder" with minimal permissions within a domain group. (svcSplunkSecureWindows)
We are getting below Error:

splunk-winevtlog - WinEventLogChannel::subscribeToEvtChannel: Could not subscribe to Windows Event Log channel 'security' 

The real question may be is not a Splunk query, but to Windows Guru's out there:
- How to attach a group read access to particular Windows Eventlog? so that "svcSplunkSecureWindows" group can read it.

0 Karma
1 Solution

Richfez
SplunkTrust
SplunkTrust

Group Policy can be used to deploy the changes you need, but IIRC the changes themselves are not trivial. Some hints that all lead to the same non-trivial answer are here, here, here and here. Those all seem to refer to server 2003 and 2008, a cursory search for 2012 isn't clear whether it's different or not, but surely more searching will help that. I found this powershell script which does something that may help you figure out what you need, too.

A bigger note - the only things I know about your various teams structure is the tiny little bit you wrote above, but it seems to me that the security team responsible for declaring that the Splunk UF must run under a non-privileged account should be responsible for assigning permissions to the account they'd like you to use. You should only have to request that the account they install the UF under have read permission to the Security Event Log. "If you'd like me to collect the event logs as a non-privileged user, please provide a non-privileged user account that has read permission to the Security Event Log". 🙂

One other potential option that may sideskirt this issue: You could use Windows' built in Event Log Forwarding to forward all those event log entries you want to a central event server. On THAT server you could run a UF as a local admin and grab all those forwarded events. That's a bit finicky to get set up, but frankly I think it may be less finicky than trying to change permissions on the security event logs.

View solution in original post

Richfez
SplunkTrust
SplunkTrust

Group Policy can be used to deploy the changes you need, but IIRC the changes themselves are not trivial. Some hints that all lead to the same non-trivial answer are here, here, here and here. Those all seem to refer to server 2003 and 2008, a cursory search for 2012 isn't clear whether it's different or not, but surely more searching will help that. I found this powershell script which does something that may help you figure out what you need, too.

A bigger note - the only things I know about your various teams structure is the tiny little bit you wrote above, but it seems to me that the security team responsible for declaring that the Splunk UF must run under a non-privileged account should be responsible for assigning permissions to the account they'd like you to use. You should only have to request that the account they install the UF under have read permission to the Security Event Log. "If you'd like me to collect the event logs as a non-privileged user, please provide a non-privileged user account that has read permission to the Security Event Log". 🙂

One other potential option that may sideskirt this issue: You could use Windows' built in Event Log Forwarding to forward all those event log entries you want to a central event server. On THAT server you could run a UF as a local admin and grab all those forwarded events. That's a bit finicky to get set up, but frankly I think it may be less finicky than trying to change permissions on the security event logs.

koshyk
Super Champion

Thanks Rich. valuable points. I'm feeling we know more than our Windows admin team 🙂
Going through your links, it seems Windows changes are painful (as it is always be). But thanks again.

0 Karma

aaraneta_splunk
Splunk Employee
Splunk Employee

Hi @koshyk - If @rich7177 was helpful in answering your question, please don't forget to resolve this post by clicking "Accept" below the answer. Thank you! 🙂

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...