<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to gather only the Administrators' login/logout events from Windows Universal FW? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292628#M7823</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;you can't filter by event on a Windows Universal Forwarder because a UF does not parse (Indexer or Heavy Forwarder do).&lt;/P&gt;

&lt;P&gt;BUT, you might blacklist/whitelist by event ID and some regexes...&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/"&gt;http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;HTH,&lt;/P&gt;

&lt;P&gt;Holger&lt;/P&gt;</description>
    <pubDate>Thu, 09 Feb 2017 17:59:50 GMT</pubDate>
    <dc:creator>hsesterhenn_spl</dc:creator>
    <dc:date>2017-02-09T17:59:50Z</dc:date>
    <item>
      <title>How to gather only the Administrators' login/logout events from Windows Universal FW?</title>
      <link>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292627#M7822</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have this necessity to gather exclusively the Windows Administrators login/logfail/logout from Windows Universal FW.&lt;BR /&gt;
I know how to do for the type of events (by putting EventCode IDs in the .conf files that I deploy to the universal forwarders) &lt;BR /&gt;
What I still do not do, is collecting ONLY the admin events. What I mean is provisioning this directly from the FW level and not indexing these kinds of events for all users and only then filtering through (maybe match a predefined CSV file) and building dashboards.&lt;/P&gt;

&lt;P&gt;I have read somewhere about some regex stanza (in props.conf and transforms.conf) which provide patterns to allow event gathering... &lt;BR /&gt;
I hope someone has had the same issue before.&lt;/P&gt;

&lt;P&gt;Thanks a lot in advance,&lt;BR /&gt;
Skender&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 16:31:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292627#M7822</guid>
      <dc:creator>skender27</dc:creator>
      <dc:date>2017-02-09T16:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to gather only the Administrators' login/logout events from Windows Universal FW?</title>
      <link>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292628#M7823</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;you can't filter by event on a Windows Universal Forwarder because a UF does not parse (Indexer or Heavy Forwarder do).&lt;/P&gt;

&lt;P&gt;BUT, you might blacklist/whitelist by event ID and some regexes...&lt;/P&gt;

&lt;P&gt;&lt;A href="http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/"&gt;http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;HTH,&lt;/P&gt;

&lt;P&gt;Holger&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 17:59:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292628#M7823</guid>
      <dc:creator>hsesterhenn_spl</dc:creator>
      <dc:date>2017-02-09T17:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to gather only the Administrators' login/logout events from Windows Universal FW?</title>
      <link>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292629#M7824</link>
      <description>&lt;P&gt;Hi skender27,&lt;BR /&gt;
you cannot filter events on Forwarders, but only on Indexers or Heavy Forwarders.&lt;BR /&gt;
To filter events, so you have to create in your indexer/s props.conf and transforms.conf like these:&lt;BR /&gt;
props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
TRANSFORMS-set= setnull,setparsing
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[setnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[setparsing]
REGEX = your regex
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;See &lt;A href="http://docs.splunk.com/Documentation/SplunkCloud/6.5.1612/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest"&gt;http://docs.splunk.com/Documentation/SplunkCloud/6.5.1612/Forwarding/Routeandfilterdatad#Keep_specific_events_and_discard_the_rest&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;The problem is that you have to restart Splunk every time you modify your regex to insert a new administrator's username.&lt;BR /&gt;
In addition you could need to have all users login and filter them at application level.&lt;/P&gt;

&lt;P&gt;So I usually filter my events to take only the ones related to login, logout and logfail and I inserted the Administrators usernames in a lookup filtering my searches for this lookup.&lt;BR /&gt;
In this way I can add an administrator with no Splunk restart and I can monitor all the users logins; obviously I must index more logs, but with the filter on Windows EventCodes there isn't a very larger consuption of Splunk License.&lt;/P&gt;

&lt;P&gt;the regex I used to filter windows login events is the following, useful for all Windows Systems (old and new, Win and SQL):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?m)EventCode=528|EventCode=529|EventCode=530|EventCode=531|EventCode=532|EventCode=533|EventCode=534|EventCode=535|EventCode=536|EventCode=537|EventCode=538|EventCode=539|EventCode=540|EventCode=4624|EventCode=4625|EventCode=4634|EventCode=4647|EventCode=4648|EventCode=4672|EventCode=4675|EventCode=4771|EventCode=17055|EventCode=18450|EventCode=18451|EventCode=18452|EventCode=18453|EventCode=18454|EventCode=18455|EventCode=18456|EventCode=18457|EventCode=18458|EventCode=18459|EventCode=18460|EventCode=18461|EventCode=24001|EventCode=24002|EventCode=24003
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2017 09:10:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292629#M7824</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-02-10T09:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to gather only the Administrators' login/logout events from Windows Universal FW?</title>
      <link>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292630#M7825</link>
      <description>&lt;P&gt;Hi Giuseppe,&lt;/P&gt;

&lt;P&gt;Thanks for your response in so fast time!&lt;BR /&gt;
I fully understand the explanation and you just reminded me about the chances I've got.&lt;/P&gt;

&lt;P&gt;But, what if, for legal compliance, you MUST NOT index in your indexer any log from other users who are not Administrators? &lt;BR /&gt;
I already have done the way you and hsesterhenn suggested. If with an UF you cannot do this without first, it is OK for me. I just need to be sure.&lt;/P&gt;

&lt;P&gt;Thanks a lot,&lt;BR /&gt;
Skender&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2017 13:16:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292630#M7825</guid>
      <dc:creator>skender27</dc:creator>
      <dc:date>2017-02-10T13:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to gather only the Administrators' login/logout events from Windows Universal FW?</title>
      <link>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292631#M7826</link>
      <description>&lt;P&gt;Hi  hsesterhenn,&lt;/P&gt;

&lt;P&gt;Thanks so much for your response. I appreciated this!&lt;/P&gt;

&lt;P&gt;Skender&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2017 13:18:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-gather-only-the-Administrators-login-logout-events-from/m-p/292631#M7826</guid>
      <dc:creator>skender27</dc:creator>
      <dc:date>2017-02-10T13:18:12Z</dc:date>
    </item>
  </channel>
</rss>

