Alerting

admon and alerting

tfaria
Explorer

Hi all,

I've Google'd a bit but couldn't find an answer that allowed me to understand something about the way the native AD monitor works. My Splunk instance is running on Windows, which allowed me to quickly create a monitor for AD.

What I see, however, is that I'm limited in the events that I can search for. They are either incomplete or just have fields completely missing. For example, when trying to find about event ID 4728 for group membership, I have no events related to this ID.

What I was able to figure out is that this is because I don't have SUF in the domain controllers. I would like, if possible, for this to be confirmed.

If SUF in the DCs is the recommended way to go (they would get SUF either way, but I thought I wouldn't need them for AD monitoring) is there any special inputs.conf configuration for filtering AD events for changes and security? My goal is to implement most of what is described in the "Active Directory Change and Security Event IDs" cheat sheet.

Thank you!

0 Karma
1 Solution

danielransell
Path Finder

Your text is going down two different paths I believe. AD monitoring ingests the AD infrastructure - but not Windows Security Events. With AD monitoring, you can search against your domain objects - for example, show me all useres who are members of Domain Admins.

When you want to view Event ID 4728, you need to get that from the Windows Security Log on the system that processed the action. So in your instance, you need the security log from the domain controller(s).

Generally, the best way to accomplish this is to install a Universal Forwarder on the system and send those logs to your indexer.

If your Splunk instance is not installed on your domain controller, I'm not sure that AD monitoring is pulling in any events.

View solution in original post

0 Karma

danielransell
Path Finder

Your text is going down two different paths I believe. AD monitoring ingests the AD infrastructure - but not Windows Security Events. With AD monitoring, you can search against your domain objects - for example, show me all useres who are members of Domain Admins.

When you want to view Event ID 4728, you need to get that from the Windows Security Log on the system that processed the action. So in your instance, you need the security log from the domain controller(s).

Generally, the best way to accomplish this is to install a Universal Forwarder on the system and send those logs to your indexer.

If your Splunk instance is not installed on your domain controller, I'm not sure that AD monitoring is pulling in any events.

0 Karma

tfaria
Explorer

That's great info! Thank you very much. Makes sense. Any special configurations for the SUF inputs.conf on the AD controller? Thank you!

0 Karma

danielransell
Path Finder

You won't need anything special for the inputs.conf, something simple such as the line below should get you started. In mine, I specify the index, and I've also blacklisted events that are high volume with no value.

[WinEventLog://Security]
disabled = 0

In addition to enabling the input, you should verify that the audit policy is set correctly on the domain controller so that it is logging group membership changes.

References:
http://docs.splunk.com/Documentation/Splunk/7.1.1/Data/MonitorWindowseventlogdata
https://www.ultimatewindowssecurity.com/securitylog/book/page.aspx?spid=chapter2

That second link is probably one of the better introductions I've seen to Windows Audit Policy to include covering both the traditional audit policy and the advanced audit policy. If you're new to the Windows auditing and the security log, I would take a little time looking at that second link.

tfaria
Explorer

Thank you so much for your help! Much appreciated!

0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...