<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to mask password in Windows event logs ? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554592#M12268</link>
    <description>&lt;P&gt;The transform needs a REGEX attribute that tells Splunk where to find the field to anonymize.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 05 Jun 2021 12:22:02 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2021-06-05T12:22:02Z</dc:date>
    <item>
      <title>How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554557#M12267</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am trying to mask the password in the Windows event logs at index time but somehow my config is not working. Kindly advise.&lt;/P&gt;&lt;P&gt;Configuration that I am trying :&lt;/P&gt;&lt;P&gt;1. Changes made in Props&lt;BR /&gt;Password extraction&lt;BR /&gt;[data]&lt;BR /&gt;password = (?m)^(.*)Process Command Line:.*\"\w+\".*\"(?P&amp;lt;password&amp;gt;.*)\"\s+\/active:yes\s+\/passwordchg:yes$&lt;BR /&gt;TRANSFORMS-anonymize = password-anonymizer&lt;/P&gt;&lt;P&gt;2. Changes made in Tranforms&lt;BR /&gt;[password-anonymizer]&lt;BR /&gt;FORMAT = ################&lt;BR /&gt;DEST_KEY = _raw&lt;/P&gt;&lt;P&gt;Logs:&lt;/P&gt;&lt;P&gt;Process Information:&lt;BR /&gt;New Process ID: xyzabc&lt;BR /&gt;New Process Name: C:\Windows\System32\net.exe&lt;BR /&gt;Token Elevation Type: abcdabcd&lt;BR /&gt;Mandatory Label: Mandatory Label\System Mandatory Level&lt;BR /&gt;Creator Process ID: 12345&lt;BR /&gt;Creator Process Name: C:\Program Files\BMC Software\Client Management\Client\bin\mtxproxy.exe&lt;BR /&gt;Process Command Line: net user "abcd" "&lt;FONT face="arial,helvetica,sans-serif" color="#00FF00"&gt;&lt;STRONG&gt;password12345&lt;/STRONG&gt;&lt;/FONT&gt;" /active:yes /passwordchg:yes /passwordreq:yes&lt;/P&gt;&lt;P&gt;Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.&lt;/P&gt;&lt;P&gt;Type 1 is a full token with no privileges removed or groups disabled. A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Documentation Link:&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.5/Data/Anonymizedata" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.5/Data/Anonymizedata&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advise would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 22:28:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554557#M12267</guid>
      <dc:creator>kamaljagga</dc:creator>
      <dc:date>2021-06-04T22:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554592#M12268</link>
      <description>&lt;P&gt;The transform needs a REGEX attribute that tells Splunk where to find the field to anonymize.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jun 2021 12:22:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554592#M12268</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-06-05T12:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554594#M12269</link>
      <description>&lt;P&gt;Isn't it already there. Could you provide more details.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jun 2021 20:23:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554594#M12269</guid>
      <dc:creator>kamaljagga</dc:creator>
      <dc:date>2021-06-05T20:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554597#M12270</link>
      <description>&lt;P&gt;It's not in the quoted transforms.conf stanza&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2. Changes made in Tranforms
[password-anonymizer]
FORMAT = ################
DEST_KEY = _raw&lt;/LI-CODE&gt;&lt;P&gt;It usually looks something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;2. Changes made in Tranforms
[password-anonymizer]
REGEX = %%%%%%%%%%%%
FORMAT = ################
DEST_KEY = _raw&lt;/LI-CODE&gt;&lt;P&gt;Have you tried using &lt;FONT face="courier new,courier"&gt;SEDCMD&lt;/FONT&gt; in props.conf?&amp;nbsp; That's usually the easier way to mask data.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jun 2021 00:36:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554597#M12270</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-06-06T00:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554618#M12271</link>
      <description>&lt;P&gt;I had initially put REGEX in transform but it didn't work. Giving SEDCMD a try now.&lt;/P&gt;&lt;P&gt;Updated props&lt;/P&gt;&lt;P&gt;splunk $ cat props.conf&lt;BR /&gt;[data]&lt;BR /&gt;SEDCMD-Anon = s/(?m)^(.*)Process Command Line:.*\"\w+\".*\"(?P.*)\"\s+\/active:yes\s+\/passwordchg:yes/##############/g&lt;BR /&gt;#password = (?m)^(.*)Process Command Line:.*\"\w+\".*\"(?P&amp;lt;password&amp;gt;.*)\"\s+\/active:yes\s+\/passwordchg:yes$&lt;BR /&gt;#TRANSFORMS-anonymize = password-anonymizer&lt;BR /&gt;#TRANSFORMS-anonymize = pass-anonymizer&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 01:20:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554618#M12271</guid>
      <dc:creator>kamaljagga</dc:creator>
      <dc:date>2021-06-07T01:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554754#M12272</link>
      <description>&lt;P&gt;This didn't work.&lt;/P&gt;&lt;P&gt;splunk $ cat props.conf&lt;BR /&gt;[data]&lt;BR /&gt;SEDCMD-Anon = s/(?m)^(.*)Process Command Line:.*\"\w+\".*\"(.*)\"\s+\/active:yes\s+\/passwordchg:yes/##############/g&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 18:27:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554754#M12272</guid>
      <dc:creator>kamaljagga</dc:creator>
      <dc:date>2021-06-07T18:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554763#M12274</link>
      <description>&lt;P&gt;Is this being done on a UF or HF?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 19:54:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554763#M12274</guid>
      <dc:creator>lilredcrawfish</dc:creator>
      <dc:date>2021-06-07T19:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554764#M12275</link>
      <description>&lt;P&gt;I think it has to be done on a HF -&amp;nbsp;&lt;BR /&gt;"&lt;SPAN&gt;Universal forwarders can only parse structured data"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.0/Data/Anonymizedata" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.0/Data/Anonymizedata&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 19:55:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554764#M12275</guid>
      <dc:creator>lilredcrawfish</dc:creator>
      <dc:date>2021-06-07T19:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554769#M12276</link>
      <description>&lt;P&gt;Thanks for mentioning that, Missed paying attention to HF note in docs.&lt;/P&gt;&lt;P&gt;I am trying it through UF. For Configuring it on HF, I will have to change the flow of windows logs, which won't be also easy.&lt;/P&gt;&lt;P&gt;Is there a way it can be done on UF?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 20:29:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554769#M12276</guid>
      <dc:creator>kamaljagga</dc:creator>
      <dc:date>2021-06-07T20:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554770#M12277</link>
      <description>&lt;P&gt;Dont think so.&amp;nbsp; Try putting it on the indexer/indexers.&amp;nbsp; Should work first place data is cooked..&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 20:33:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554770#M12277</guid>
      <dc:creator>lilredcrawfish</dc:creator>
      <dc:date>2021-06-07T20:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554795#M12278</link>
      <description>&lt;P&gt;Yes. Had already put there, was waiting for off hours for pushing it to the cluster. Moving it to indexers removed the whole line, so still have to work what kind of regex to put there.&lt;/P&gt;&lt;P&gt;Updated logs after the changes.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;Process&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;New&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Process&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ID:&lt;/SPAN&gt;&amp;nbsp;abcd&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;New&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Process&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Name:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;C:\Windows\System32\net1.exe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;Token&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Elevation&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Type:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;%%1234&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;Mandatory&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Label:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Mandatory&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Label\System&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Mandatory&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Level&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Creator&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;Process&lt;/SPAN&gt; &lt;SPAN class="t"&gt;ID:&lt;/SPAN&gt;&amp;nbsp;abcd&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;Creator&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Process&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Name:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;C:\Windows\System32\net.exe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#00FFFF"&gt;&lt;SPAN class="t"&gt;##############&lt;/SPAN&gt; &lt;SPAN class="t"&gt;/passwordreq:yes&lt;/SPAN&gt; &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;Token&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Elevation&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Type&lt;/SPAN&gt; &lt;SPAN class="t"&gt;indicates&lt;/SPAN&gt; &lt;SPAN class="t"&gt;the&lt;/SPAN&gt; &lt;SPAN class="t"&gt;type&lt;/SPAN&gt; &lt;SPAN class="t"&gt;of&lt;/SPAN&gt; &lt;SPAN class="t"&gt;token&lt;/SPAN&gt; &lt;SPAN class="t"&gt;that&lt;/SPAN&gt; &lt;SPAN class="t"&gt;was&lt;/SPAN&gt; &lt;SPAN class="t"&gt;assigned&lt;/SPAN&gt; &lt;SPAN class="t"&gt;to&lt;/SPAN&gt; &lt;SPAN class="t"&gt;the&lt;/SPAN&gt; &lt;SPAN class="t"&gt;new&lt;/SPAN&gt; &lt;SPAN class="t"&gt;process&lt;/SPAN&gt; &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;accordance&lt;/SPAN&gt; &lt;SPAN class="t"&gt;with&lt;/SPAN&gt; &lt;SPAN class="t"&gt;User&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Account&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Control&lt;/SPAN&gt; &lt;SPAN class="t"&gt;policy.&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Type&lt;/SPAN&gt; &lt;SPAN class="t"&gt;1&lt;/SPAN&gt; &lt;SPAN class="t"&gt;is&lt;/SPAN&gt; &lt;SPAN class="t"&gt;a&lt;/SPAN&gt; &lt;SPAN class="t"&gt;full&lt;/SPAN&gt; &lt;SPAN class="t"&gt;token&lt;/SPAN&gt; &lt;SPAN class="t"&gt;with&lt;/SPAN&gt; &lt;SPAN class="t"&gt;no&lt;/SPAN&gt; &lt;SPAN class="t"&gt;privileges&lt;/SPAN&gt; &lt;SPAN class="t"&gt;removed&lt;/SPAN&gt; &lt;SPAN class="t"&gt;or&lt;/SPAN&gt; &lt;SPAN class="t"&gt;groups&lt;/SPAN&gt; &lt;SPAN class="t"&gt;disabled.&lt;/SPAN&gt; &lt;SPAN class="t"&gt;A&lt;/SPAN&gt; &lt;SPAN class="t"&gt;full&lt;/SPAN&gt; &lt;SPAN class="t"&gt;token&lt;/SPAN&gt; &lt;SPAN class="t"&gt;is&lt;/SPAN&gt; &lt;SPAN class="t"&gt;only&lt;/SPAN&gt; &lt;SPAN class="t"&gt;used&lt;/SPAN&gt; &lt;SPAN class="t"&gt;if&lt;/SPAN&gt; &lt;SPAN class="t"&gt;User&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Account&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Control&lt;/SPAN&gt; &lt;SPAN class="t"&gt;is&lt;/SPAN&gt; &lt;SPAN class="t"&gt;disabled&lt;/SPAN&gt; &lt;SPAN class="t"&gt;or&lt;/SPAN&gt; &lt;SPAN class="t"&gt;if&lt;/SPAN&gt; &lt;SPAN class="t"&gt;the&lt;/SPAN&gt; &lt;SPAN class="t"&gt;user&lt;/SPAN&gt; &lt;SPAN class="t"&gt;is&lt;/SPAN&gt; &lt;SPAN class="t"&gt;the&lt;/SPAN&gt; &lt;SPAN class="t"&gt;built-in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Administrator&lt;/SPAN&gt; &lt;SPAN class="t"&gt;account&lt;/SPAN&gt; &lt;SPAN class="t"&gt;or&lt;/SPAN&gt; &lt;SPAN class="t"&gt;a&lt;/SPAN&gt; &lt;SPAN class="t"&gt;service&lt;/SPAN&gt; &lt;SPAN class="t"&gt;account.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 00:22:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554795#M12278</guid>
      <dc:creator>kamaljagga</dc:creator>
      <dc:date>2021-06-08T00:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask password in Windows event logs ?</title>
      <link>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554963#M12279</link>
      <description>&lt;P&gt;Thanks all for the reply. Here is the complete solution.&lt;/P&gt;&lt;P&gt;According to docs, config should be done on HF but for that the data flow has to be changed. Parsing can't be done on UF, however this can be pushed to the indexers via the Cluster Master similar to field extractions.&lt;/P&gt;&lt;P&gt;Steps:&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Write the regex to extract the password and use that regex along with the sed command (format /s/&amp;lt;password&amp;gt;/&amp;lt;replacement&amp;gt;/g) to test the masking of the password in the search.&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=main sourcetype=data source="C:\\testdata\\TestDataMasking5.txt"&lt;BR /&gt;| rex mode=sed "s/\"\w+\".*\"(.*)\"\s+/##############/g"&lt;BR /&gt;| table _raw&lt;/P&gt;&lt;P&gt;2. Create a new app in the master-apps of CM and then put the above regex in props.conf and push the bundle.&lt;/P&gt;&lt;P&gt;[data]&lt;/P&gt;&lt;P&gt;SEDCMD-masking=s/\"\w+\".*\"(.*)\"\s+/##############/g&lt;/P&gt;&lt;P&gt;The success of above solution depends a lot on the regex.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 20:12:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-mask-password-in-Windows-event-logs/m-p/554963#M12279</guid>
      <dc:creator>kamaljagga</dc:creator>
      <dc:date>2021-06-08T20:12:38Z</dc:date>
    </item>
  </channel>
</rss>

