Day 2 doc
Day 2 doc
Then going as root user and changing the directory to var/log to get the authentication logs
For getting the authentication logs use the command as tail -f auth.log this is used in ubuntu
based linux.
Ping to check for the connectivity to the spunk host i.e 192.168.30.10
we are creating a rdp connection from our purplesynapz rdp to window client1 rdp as shown in
the below screenshot and from rdp(192.168.15.172)host windows forwarder is copied and pasted
to the rdp 192.168.30.40
Leave it empty
For deployment of logs from splunk to splunk we use forwarding and receiving
cli
ck on configure receiving as mentioned in below screenshot
the
n click on new receiving port
I have given the listening port as 9997 it will receive data on tcp port 9997
Now the our splunk instance Is listening other splunks instances logs
the
n the we have given the splunk receiving indexer the hostname and the listening port no.
Then install
Creating a input.conf file in splunk universal forwarder for the logs to the our splunk instance
Then open that input.conf by the notepad and add a stanza because we collecting the windows
event logs
As we want the logs of the security channel we have given the security as I mentioned in the
screenshot below as I want to send this logs to the windows that’s why I have given the index as
windows
Now creating the index in our splunk instance
By writing the stanza as renderXml= true we are getting the logs in xml format
INPUTS.CONF
[monitor://C:\Windows\Performance\WinSAT\winsat.log]
disabled = 0
index = windows_logs
sourcetype = Windowslogs
source = C:\Windows\Performance\WinSAT\winsat.log
[WinEventLog://Application]
disabled = 0
index = windows2
sourcetype = Windowslogs
[WinEventLog://Security]
disabled = 0
index = windows2
sourcetype = Windowslogs
[WinEventLog://System]
disabled = 0
index = windows2
sourcetype = Windowslogs
[perfmon://CPU]
disabled = 0
index = windows2
counters = % Processor Time
instances = _Total;
object = Processor
interval = 300
[perfmon://LogicalDisk]
disabled = 0
index = windows2
counters = % Free Space; Free Megabytes; Used Space; Used Megabytes
instances = *
object = LogicalDisk
interval = 300
OUTPUTS.CONF
[tcpout]
defaultGroup = default-autolb-group
[tcpout:default-autolb-group]
server = 192.168.30.10:9997
[tcpout-server://192.168.30.10:9997]
In order to update the configuration we have to restart the splunk forwarder either from cli or
services,
Note : whenever we are trying to change the configuration try to restart the services
Brute force attack on windows