Security

Splunk & Microsoft Certificate Authority

peasead
Path Finder

Has anyone used Splunk to monitor Microsoft CA's?

Maybe not an application, but has anyone researched which Event ID's mean a certificate is expiring in x days.

I have looked at the MS documentation on the Event ID's, but I wanted to know what kind of success anyone had had.

Labels (1)
0 Karma
1 Solution

JBarkerMox
Explorer

This is how I am doing it.
index="foo" EventCode="64" Message="is about to expire or already expired"

I think the CA default is 7 days when it starts firing this event.

View solution in original post

JBarkerMox
Explorer

This is how I am doing it.
index="foo" EventCode="64" Message="is about to expire or already expired"

I think the CA default is 7 days when it starts firing this event.

thambisetty
SplunkTrust
SplunkTrust

Hi,

The events are part of windows server roles where there is not path showing up for evtx. I would like to know how did you integrate those events to Splunk.

————————————
If this helps, give a like below.
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...