Ad slot: top

SPL

File Deletion Attempts In Windows

Description

Submitted by SplunkNinja

The following splunk queries will return results based on any user account who attempts to delete a file. This will return both successful and failed attempts. Ensure the Splunk App for Windows is installed grab it here: https://apps.splunk.com/app/742/ Windows 2003 and older:
1 0
sourcetype="WinEventLog:Security" EventCode=564 |eval Date=strftime(_time, "%Y/%m/%d") | stats count by Date, Image_File_Name, Type, host | sort - Date
Windows 2008 and newer:
sourcetype="WinEventLog:Security" EventCode=4660 (Security_ID!="NT AUTHORITY*") (Security_ID!="S-*")| eval Date=strftime(_time, "%Y/%m/%d") | stats count by Date, Account_Name, Process_Name, Keywords, host
 

Comments

0 total

Be the first to comment on this SPL.

Leave a comment

You must log in to post a comment.

Ad slot: bottom