Skip to content

Latest commit

 

History

History
101 lines (51 loc) · 3.36 KB

File metadata and controls

101 lines (51 loc) · 3.36 KB

Installing Splunk on Win 11

These instructions are for installing Splunk on a single system.

Summary

This walkthrough involves installing Splunk on your Windows 11 VM. As previously mentioned, there are data ingestion limitations with the free Splunk instances. To overcome those issues we will install Splunk on the Windows 11 VM only and keep data ingestion disabled until we are ready to run our testing. After we run our testing, we will disable ingestion of logs into Splunk.

Install Splunk

Signup for a free Splunk account at this link. You may need a business email (not gmail, yahoo, etc).

Free Splunk Trial | Download Splunk Enterprise Free for 60 Days | Splunk

image.png

Set Up Splunk

After you have created an account, from your Windows victim VM login, choose your download by selecting the Windows tab.

image.png

Accept the terms of agreement.

image.png

To install Splunk navigate to the directory you downloaded the file and simply double click the .msi file.

image.png

Accept license agreement.

image.png

Provide username and password.

image.png

When completed launch Splunk.

image.png

If Splunk does not open up in the browser automatically, type the URL below and login with the credentials you created.

localhost:8000

image.png

Add Splunk Apps

Select the Apps dropdown and select “Find More Apps”

image.png

Search for Sysmon and install the Splunk Add-on for Sysmon.

image.png

You will be asked to login with the creds for your Splunk account. This is the account you set up when you downloaded Splunk, not the account you set up to access your instance of Splunk.

Untitled

After successfully logging in, the installation will be automatically completed and you will be presented with the box seen below. Select “Done”.

image.png

Search and Install the Windows app..

image.png

Agree and install.

image.png

Set Up Data Inputs

Select the Settings dropdown and the select “Data inputs” from the Data section.

image.png

Then select “Remote event log collections”.

image.png

Enable the collection of the logs.

image.png

This is also the same way you will disable collection after you run the attack to ensure you do not surpass the data limitations with Splunk.

Test it by running ipconfig from the command line.

image.png

Then go to Splunk Search and Reporting App and look for it. As seen below, one event was discovered.

image.png