Getting Data In

enormous amounts of EventCode=4674

saschar
New Member

Hello everybody,

i have a server that produces per minute 13000 security logs with the EventCode=4674 (An operation was attempted on a privileged object).
what is the problem and how can i fix it?

Tags (1)
0 Karma

yannK
Splunk Employee
Splunk Employee

You can filter those EventCodes out

see Additional method to filter since Splunk 6.*
http://answers.splunk.com/answers/116817/filter-wineventlog-events-based-on-the-eventcodes

sbrant_splunk
Splunk Employee
Splunk Employee

One option is to adjust your object-level auditing in Windows to a more appropriate level, if this is too verbose.

kristian_kolb
Ultra Champion

That option sure is the correct way to cure the symptom - and maybe also the disease. Even if there are a looot of events on a windows box, there might be just about nothing going on... 🙂

/k

0 Karma

sbrant_splunk
Splunk Employee
Splunk Employee

touche. I did say ONE option though 😉

0 Karma

kristian_kolb
Ultra Champion

mhmm, and perhaps figure out WHICH object, WHAT operation and WHO did (attempt) it. Just to be sure, mkay?

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...