<span class="pill kill-chain">_time</span>
<span class="pill kill-chain">EventID</span>
<span class="pill kill-chain">EventRecordID</span>
<span class="pill kill-chain">ProcessID</span>
<span class="pill kill-chain">ThreadID</span>
<span class="pill kill-chain">Computer</span>
<span class="pill kill-chain">ProfileChanged</span>
<span class="pill kill-chain">RuleName</span>
<span class="pill kill-chain">RuleId</span>
</div>
Data Source: Windows Event Log Security 4946
Description
Data source object for Windows Event Log Security 4946
Details
Property | Value |
---|---|
Source | XmlWinEventLog:Security |
Sourcetype | xmlwineventlog |
Separator | EventCode |
Supported Apps
- Splunk Add-on for Microsoft Windows (version 9.0.1)
Event Fields
Example Log
1<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-A5BA-3E3B0328C30D}'/><EventID>4946</EventID><Version>0</Version><Level>0</Level><Task>13571</Task><Opcode>0</Opcode><Keywords>0x8020000000000000</Keywords><TimeCreated SystemTime='2025-01-15T15:37:10.140309700Z'/><EventRecordID>893174</EventRecordID><Correlation ActivityID='{F11D9656-675C-0002-5B96-1DF15C67DB01}'/><Execution ProcessID='592' ThreadID='5816'/><Channel>Security</Channel><Computer>ar-win-dc.attackrange.local</Computer><Security/></System><EventData><Data Name='ProfileChanged'>All</Data><Data Name='RuleId'>{2B6C38C7-0EBB-4010-80E5-45BF5F2CB8DD}</Data><Data Name='RuleName'>Allow Dummy Rule</Data></EventData></Event>
Source: GitHub | Version: 1