Splunk is a powerful platform for searching, monitoring, and analyzing machine-generated big data. It is particularly useful for collecting and analyzing Active Directory logs to gain insights into security and operational events.
- Windows Server with Active Directory Domain Services (AD DS)
- Splunk Enterprise installed on a monitoring server
- Universal Forwarder installed on AD DS servers to collect logs
- Download Splunk Enterprise from the official Splunk website.
- Follow the installation instructions for your operating system.
- Start Splunk by running:
sudo /opt/splunk/bin/splunk start --accept-license
- Create an admin account and set the password.
- Download Splunk Universal Forwarder from the official Splunk website.
- Install the forwarder on all AD DS servers:
msiexec.exe /i splunkforwarder-<version>-x64-release.msi /quiet
- Configure the forwarder to send Windows Event Logs to the Splunk server:
& "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" set deploy-poll <Splunk_Server_IP>:8089 & "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" add monitor "C:\Windows\System32\winevt\Logs\Security.evtx" -sourcetype "WinEventLog:Security" & "C:\Program Files\SplunkUniversalForwarder\bin\splunk.exe" restart
Steps:
- Log in to Splunk.
- Navigate to "Settings" > "Data Inputs".
- Click "Add New" and select "Forwarded Data".
- Configure the input to receive logs from the Universal Forwarder.
Expected Output:
- Splunk is configured to receive and index logs from AD DS servers.
Steps:
- Go to "Dashboards" and click "Create New Dashboard".
- Add a new panel and select "Search" as the data source.
- Use a search query to filter logon events:
sourcetype="WinEventLog:Security" EventCode=4624
- Configure visualization and save the panel.
Expected Output:
- A dashboard panel displaying AD logon events is created.
Steps:
- Create a new search in Splunk.
- Use a search query to filter security events (e.g., failed logon attempts, account lockouts):
sourcetype="WinEventLog:Security" (EventCode=4625 OR EventCode=4740)
- Save the search and add it to a dashboard.
- Configure the panel to show relevant security metrics.
Expected Output:
- Panels displaying critical AD security events are added to the dashboard.
Steps:
- Create a search for an anomaly (e.g., a high number of failed logon attempts):
sourcetype="WinEventLog:Security" EventCode=4625 | stats count by User
- Save the search and select "Alert" from the options.
- Configure alert conditions and notification settings.
- Save the alert.
Expected Output:
- Alerts are set up to notify administrators of AD anomalies.
Steps:
- Create a search for the desired AD activity report (e.g., user logon activity):
sourcetype="WinEventLog:Security" EventCode=4624 | stats count by User
- Save the search and select "Report".
- Configure the report schedule and format.
- Save the report.
Expected Output:
- Scheduled reports on AD activity are configured and will be generated regularly.
By following this project, you will set up a comprehensive Active Directory monitoring system using Splunk, enabling you to collect, analyze, and visualize AD logs, and gain valuable insights into AD security and operational events.