Windows event logs provide valuable information that can be used during an investigation to facilitate answering questions about the hosts behavior, state, health, or performance. You want visibility into all Windows event logs on a host.
- Verify that you have deployed the Splunk Add-on for Microsoft Windows to your search heads, indexer, and Splunk Universal Forwarders on the monitored systems. For more information, see About installing Splunk add-ons.
- Run the following search. You can optimize it by specifying an index and adjusting the time range.
host="<name of host to check>" source=WinEventLog:* <optional keywords>
The table provides an explanation of what each part of this search achieves. You can adjust this query based on the specifics of your environment.
|host="<name of host to check>" source=WinEventLog:* <optional keywords>||
Search index(es) where Windows event log data is being collected and filter down to the desired host(s) to check.
Add optional keywords that are relevant to the investigation. For instance, adding "service stopped" to the search might help uncover instances where a service was stopped on the host. Otherwise, delete this part of the search.
This information provided by this search can help in other investigations.
You might be interested in other processes associated with the Maintaining Microsoft Windows systems use case.