Supported data sources in behavioral analytics service
This topic applies only to customers on the Splunk Cloud platform.
Behavioral analytics service uses data sources to generate anomalies.
The following table identifies the source types supported by universal forwarders:
Data source | Sourcetype for universal forwarder |
---|---|
Windows security logs | XmlWinEventLog:Security
|
Windows event IDs supported in Splunk Behavioral Analytics
The following table summarizes the Microsoft Windows event IDs used by behavioral analytics service. See Configure Windows event logging to ensure the proper events are logged for instructions to properly log Microsoft Windows events.
Event ID | Description | Supported for XmlWinEventLog |
---|---|---|
4103 | Windows license activation failed | Yes |
4104 | PowerShell script block logging | Yes |
4624 | An account was successfully logged on | Yes |
4625 | An account failed to log on | Yes |
4648 | A logon was attempted using explicit credentials | Yes |
4661 | A handle to an object was requested | Yes |
4662 | An operation was performed on an object | Yes |
4663 | An attempt was made to access an object | Yes |
4670 | Permissions on an object were changed | Yes |
4673 | A privileged service was called | Yes |
4688 | A new process has been created | Yes |
4689 | A process has exited | Yes |
4720 | A user account was created | Yes |
4723 | An attempt was made to change an account's password | Yes |
4726 | A user account was deleted | Yes |
4756 | A member was added to a security | Yes |
4757 | A member was removed from a security | Yes |
4768 | A Kerberos authentication ticket (TGT) was requested | Yes |
4769 | A Kerberos service ticket was requested | Yes |
4771 | Kerberos pre-authentication failed | Yes |
4776 | The domain controller attempted to validate the credentials for an account | Yes |
Create an identity lookup from your cloud service provider data in Splunk Enterprise Security | Configure Windows event logging to ensure the proper events are logged |
This documentation applies to the following versions of Splunk® Enterprise Security: 8.1.0
Feedback submitted, thanks!