<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Specific Wineventlog (Security) ingestion into Splunk in Security</title>
    <link>https://community.splunk.com/t5/Security/Specific-Wineventlog-Security-ingestion-into-Splunk/m-p/463838#M15122</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;

&lt;P&gt;Currently we are ingesting all data from wineventlog Security, Application &amp;amp; System from all Windows Client machines. And due to this ingestion we are overloaded with the license usage and now we are planning only to ingest only the critical EventCode (4688,4624) and  so on and the remaining Security wineventlog are not required so kindly let me know how to pull the data for a particular EventCode from all windows machine so that we will implement the same and check it.&lt;/P&gt;

&lt;P&gt;Current Inputs:&lt;/P&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = xxx&lt;BR /&gt;
renderXml=0&lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = xxx&lt;BR /&gt;
renderXml=0&lt;/P&gt;

&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = xxx&lt;BR /&gt;
renderXml=0&lt;/P&gt;

&lt;P&gt;So  it would be really helpful if i can ingest only the particular eventcode from wineventlog:security so that we will be saving some licenses.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Oct 2019 08:07:56 GMT</pubDate>
    <dc:creator>anandhalagarasa</dc:creator>
    <dc:date>2019-10-21T08:07:56Z</dc:date>
    <item>
      <title>Specific Wineventlog (Security) ingestion into Splunk</title>
      <link>https://community.splunk.com/t5/Security/Specific-Wineventlog-Security-ingestion-into-Splunk/m-p/463838#M15122</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;

&lt;P&gt;Currently we are ingesting all data from wineventlog Security, Application &amp;amp; System from all Windows Client machines. And due to this ingestion we are overloaded with the license usage and now we are planning only to ingest only the critical EventCode (4688,4624) and  so on and the remaining Security wineventlog are not required so kindly let me know how to pull the data for a particular EventCode from all windows machine so that we will implement the same and check it.&lt;/P&gt;

&lt;P&gt;Current Inputs:&lt;/P&gt;

&lt;P&gt;[WinEventLog://Application]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = xxx&lt;BR /&gt;
renderXml=0&lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = xxx&lt;BR /&gt;
renderXml=0&lt;/P&gt;

&lt;P&gt;[WinEventLog://System]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
index = xxx&lt;BR /&gt;
renderXml=0&lt;/P&gt;

&lt;P&gt;So  it would be really helpful if i can ingest only the particular eventcode from wineventlog:security so that we will be saving some licenses.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 08:07:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Specific-Wineventlog-Security-ingestion-into-Splunk/m-p/463838#M15122</guid>
      <dc:creator>anandhalagarasa</dc:creator>
      <dc:date>2019-10-21T08:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: Specific Wineventlog (Security) ingestion into Splunk</title>
      <link>https://community.splunk.com/t5/Security/Specific-Wineventlog-Security-ingestion-into-Splunk/m-p/463839#M15123</link>
      <description>&lt;P&gt;Use whitelist/blacklist functionality in inputs.&lt;BR /&gt;
Docs - &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.2/Data/Whitelistorblacklistspecificincomingdata"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.2/Data/Whitelistorblacklistspecificincomingdata&lt;/A&gt;&lt;BR /&gt;
Similar question - &lt;A href="https://answers.splunk.com/answers/152131/filter-windows-eventcode-using-blacklist-and-whitelist.html"&gt;https://answers.splunk.com/answers/152131/filter-windows-eventcode-using-blacklist-and-whitelist.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You can also clean up events - &lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/6.0.0/User/Configuration#Configure_event_cleanup_best_practices_in_props.conf"&gt;https://docs.splunk.com/Documentation/WindowsAddOn/6.0.0/User/Configuration#Configure_event_cleanup_best_practices_in_props.conf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 08:33:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Specific-Wineventlog-Security-ingestion-into-Splunk/m-p/463839#M15123</guid>
      <dc:creator>dauren_akilbeko</dc:creator>
      <dc:date>2019-10-21T08:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Specific Wineventlog (Security) ingestion into Splunk</title>
      <link>https://community.splunk.com/t5/Security/Specific-Wineventlog-Security-ingestion-into-Splunk/m-p/463840#M15124</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I hope below link will give you an idea.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/152131/filter-windows-eventcode-using-blacklist-and-whitelist.html"&gt;https://answers.splunk.com/answers/152131/filter-windows-eventcode-using-blacklist-and-whitelist.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
Tejas&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 08:37:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Specific-Wineventlog-Security-ingestion-into-Splunk/m-p/463840#M15124</guid>
      <dc:creator>tbavarva</dc:creator>
      <dc:date>2019-10-21T08:37:55Z</dc:date>
    </item>
  </channel>
</rss>

