<span class="pill kill-chain">Caller_Domain</span>
<span class="pill kill-chain">Caller_User_Name</span>
<span class="pill kill-chain">Channel</span>
<span class="pill kill-chain">CommandLine</span>
<span class="pill kill-chain">Computer</span>
<span class="pill kill-chain">Error_Code</span>
<span class="pill kill-chain">EventCode</span>
<span class="pill kill-chain">EventID</span>
<span class="pill kill-chain">EventRecordID</span>
<span class="pill kill-chain">Guid</span>
<span class="pill kill-chain">Keywords</span>
<span class="pill kill-chain">Level</span>
<span class="pill kill-chain">Logon_ID</span>
<span class="pill kill-chain">MandatoryLabel</span>
<span class="pill kill-chain">Name</span>
<span class="pill kill-chain">NewProcessId</span>
<span class="pill kill-chain">NewProcessName</span>
<span class="pill kill-chain">Opcode</span>
<span class="pill kill-chain">ParentProcessName</span>
<span class="pill kill-chain">ProcessID</span>
<span class="pill kill-chain">Process_Command_Line</span>
<span class="pill kill-chain">RecordNumber</span>
<span class="pill kill-chain">SubjectDomainName</span>
<span class="pill kill-chain">SubjectLogonId</span>
<span class="pill kill-chain">SubjectUserName</span>
<span class="pill kill-chain">SubjectUserSid</span>
<span class="pill kill-chain">SystemTime</span>
<span class="pill kill-chain">TargetDomainName</span>
<span class="pill kill-chain">TargetLogonId</span>
<span class="pill kill-chain">TargetUserName</span>
<span class="pill kill-chain">TargetUserSid</span>
<span class="pill kill-chain">Target_Domain</span>
<span class="pill kill-chain">Target_User_Name</span>
<span class="pill kill-chain">Task</span>
<span class="pill kill-chain">ThreadID</span>
<span class="pill kill-chain">TokenElevationType</span>
<span class="pill kill-chain">Token_Elevation_Type</span>
<span class="pill kill-chain">Token_Elevation_Type_id</span>
<span class="pill kill-chain">Version</span>
<span class="pill kill-chain">action</span>
<span class="pill kill-chain">app</span>
<span class="pill kill-chain">dest</span>
<span class="pill kill-chain">dvc</span>
<span class="pill kill-chain">dvc_nt_host</span>
<span class="pill kill-chain">event_id</span>
<span class="pill kill-chain">eventtype</span>
<span class="pill kill-chain">id</span>
<span class="pill kill-chain">name</span>
<span class="pill kill-chain">new_process</span>
<span class="pill kill-chain">new_process_id</span>
<span class="pill kill-chain">new_process_name</span>
<span class="pill kill-chain">parent_process</span>
<span class="pill kill-chain">parent_process_id</span>
<span class="pill kill-chain">parent_process_name</span>
<span class="pill kill-chain">parent_process_path</span>
<span class="pill kill-chain">process</span>
<span class="pill kill-chain">process_command_line_arguments</span>
<span class="pill kill-chain">process_command_line_process</span>
<span class="pill kill-chain">process_exec</span>
<span class="pill kill-chain">process_id</span>
<span class="pill kill-chain">process_name</span>
<span class="pill kill-chain">process_path</span>
<span class="pill kill-chain">product</span>
<span class="pill kill-chain">session_id</span>
<span class="pill kill-chain">signature</span>
<span class="pill kill-chain">signature_id</span>
<span class="pill kill-chain">src_nt_domain</span>
<span class="pill kill-chain">src_user</span>
<span class="pill kill-chain">status</span>
<span class="pill kill-chain">subject</span>
<span class="pill kill-chain">ta_windows_action</span>
<span class="pill kill-chain">tag</span>
<span class="pill kill-chain">user</span>
<span class="pill kill-chain">user_group</span>
<span class="pill kill-chain">vendor</span>
<span class="pill kill-chain">vendor_product</span>
</div>
Data Source: Windows Event Log Security 4688
Description
Data source object for Windows Event Log Security 4688
Details
Property | Value |
---|---|
Source | XmlWinEventLog:Security |
Sourcetype | xmlwineventlog |
Separator | EventCode |
Supported Apps
- Splunk Add-on for Microsoft Windows (version 9.0.1)
Event Fields
Example Log
1<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-A5BA-3E3B0328C30D}'/><EventID>4688</EventID><Version>2</Version><Level>0</Level><Task>13312</Task><Opcode>0</Opcode><Keywords>0x8020000000000000</Keywords><TimeCreated SystemTime='2024-04-23T08:48:30.449376800Z'/><EventRecordID>432820</EventRecordID><Correlation/><Execution ProcessID='4' ThreadID='276'/><Channel>Security</Channel><Computer>ar-win-1</Computer><Security/></System><EventData><Data Name='SubjectUserSid'>NT AUTHORITY\SYSTEM</Data><Data Name='SubjectUserName'>AR-WIN-1$</Data><Data Name='SubjectDomainName'>WORKGROUP</Data><Data Name='SubjectLogonId'>0x3e7</Data><Data Name='NewProcessId'>0xf84</Data><Data Name='NewProcessName'>C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe</Data><Data Name='TokenElevationType'>%%1936</Data><Data Name='ProcessId'>0xb2c</Data><Data Name='CommandLine'>"C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe" --ps2</Data><Data Name='TargetUserSid'>NULL SID</Data><Data Name='TargetUserName'>-</Data><Data Name='TargetDomainName'>-</Data><Data Name='TargetLogonId'>0x0</Data><Data Name='ParentProcessName'>C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe</Data><Data Name='MandatoryLabel'>Mandatory Label\System Mandatory Level</Data></EventData></Event>
Source: GitHub | Version: 2