Skip to main content
Splunk Lantern

Microsoft: Windows process launch


Windows process launch logs are a subset of security audit logs that track program activation, process exit, handle duplication, and indirect object access. You can audit successes or failures for each of these events. Furthermore, you can track how long a program was open and correlate the process data with logon events and object access events. Coupled with command line auditing, you can retrieve information regarding what commands were passed to open processes.

The most common events related to process launches are:

You can find other related events in the Microsoft documentation.


Guidance for onboarding data can be found in the Spunk Documentation: 

Refer to the documentation, and note the following:

  • Recommended index: oswinsec
  • Source type: wineventlog:security
  • Input type: WinEventLog://Security
  • Add-on or app: Splunk Add-on for Microsoft Windows
  • Sizing estimate: For Process Launch Logs (Event ID 4688), the expected volume can vary based on how many new processes spin up, but the variation is generally minor. Event ID 4688 is considered to provide excellent value in security logging. At a very high level, common ranges are:
    • Workstation: 4-6 MB/day (Including Application, System, and Security Logs)
    • Application Servers: 25-50 MB/day
    • Domain Controllers: 50-500 MB/day depending on the number of users


Usually the first thing people will see when deploying audit policies is either new systems showing up in Splunk, or at least an increase in system log messages. If you already have some logs coming in and want to validate that you’re getting the new ones, look for the delta between your old policy and your new one, and Google “Windows Event ID” – that will usually give you something specific to search for (though you may have to go take the action that gets logged, if it’s less common). An easy example is “Windows Process Creation Event ID” which quickly nets you “Event ID 4688” as the first result.


When your Splunk deployment is ingesting Windows process launch logs, you can use the data to achieve the following: