<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk 5.x App for Microsoft Windows: What is this &amp;quot;app=win:unknown&amp;quot; being captured in 63% of Windows security logs in Splunk? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241550#M27331</link>
    <description>&lt;P&gt;Is there any way you could paste in one of those events here?&lt;/P&gt;</description>
    <pubDate>Tue, 28 Nov 2017 23:58:44 GMT</pubDate>
    <dc:creator>Richfez</dc:creator>
    <dc:date>2017-11-28T23:58:44Z</dc:date>
    <item>
      <title>Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241547#M27328</link>
      <description>&lt;P&gt;Hi Splunkers&lt;/P&gt;

&lt;P&gt;I am getting this value of field app=win:unknown being captured in 63% of Windows security logs in Splunk. What does it mean?&lt;/P&gt;

&lt;P&gt;Other values for app fields are :&lt;/P&gt;

&lt;P&gt;win:remote&lt;BR /&gt;
win:local&lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Mohammed&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2016 20:05:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241547#M27328</guid>
      <dc:creator>mohammed7860</dc:creator>
      <dc:date>2016-08-19T20:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241548#M27329</link>
      <description>&lt;P&gt;Is here any solution for decribed problem?&lt;BR /&gt;
We had the same and + action=unknown, user=unknown.&lt;BR /&gt;
Tried to solve problem by adding field aliases, but didn't found filed aliases for action and "win:unknown".&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2017 05:32:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241548#M27329</guid>
      <dc:creator>AskhatA</dc:creator>
      <dc:date>2017-11-25T05:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241549#M27330</link>
      <description>&lt;P&gt;This is how we got it working thanks to help from PS:&lt;/P&gt;

&lt;P&gt;In the Splunk_TA_Windows\lookups\windows_apps.csv, you'll have to manually add any Windows event codes and what type of app you want it to show up as. Here's a small snippet from our's:&lt;/P&gt;

&lt;P&gt;4674,,,,,win:security&lt;BR /&gt;
4957,,,,,win:firewall&lt;BR /&gt;
4768,,,,,win:kerberos&lt;BR /&gt;
4958,,,,,win:useless&lt;BR /&gt;
4793,,,,,win:security&lt;BR /&gt;
4611,,,,,win:auth&lt;BR /&gt;
4702,,,,,win:schedule&lt;BR /&gt;
4932,,,,,win:adsync&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 16:57:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241549#M27330</guid>
      <dc:creator>mwarvi</dc:creator>
      <dc:date>2020-09-29T16:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241550#M27331</link>
      <description>&lt;P&gt;Is there any way you could paste in one of those events here?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2017 23:58:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241550#M27331</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-11-28T23:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241551#M27332</link>
      <description>&lt;P&gt;Hi mwarvi,&lt;/P&gt;

&lt;P&gt;Can you please share your csv with me? I stumbled upon the same issue. Thank you so much.&lt;/P&gt;

&lt;P&gt;&lt;A href="mailto:tomas.moser@alef.com"&gt;tomas.moser@alef.com&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Best regards,&lt;BR /&gt;
Tomas&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 10:33:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241551#M27332</guid>
      <dc:creator>tomasmoser</dc:creator>
      <dc:date>2018-01-17T10:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241552#M27333</link>
      <description>&lt;P&gt;Here's another snippet with the headers in it, The app is just plain test that we decided on here so you can call it whatever you want. The file should already be there as I believe the app iitself uses it.&lt;/P&gt;

&lt;P&gt;It's a very manual process where you just have to go through each event code you want and make up an app for it.&lt;/P&gt;

&lt;P&gt;EventCode,Source_Network_Address,Target_Server_Name,Logon_Type,sourcetype,app&lt;BR /&gt;
552,,,,,win:remote&lt;BR /&gt;
4648,,,,,win:remote&lt;BR /&gt;
4663,,,,,win:fileaccess&lt;BR /&gt;
5157,,,,,win:firewall&lt;BR /&gt;
5145,,,,,win:fileaccess&lt;BR /&gt;
4656,,,,,win:fileaccess&lt;BR /&gt;
5158,,,,,win:firewall&lt;BR /&gt;
4690,,,,,win:fileaccess&lt;BR /&gt;
4776,,,,,win:auth&lt;BR /&gt;
4672,,,,,win:auth&lt;BR /&gt;
5152,,,,,win:firewall&lt;BR /&gt;
5156,,,,,win:firewall&lt;BR /&gt;
5447,,,,,win:firewall&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:44:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241552#M27333</guid>
      <dc:creator>mwarvi</dc:creator>
      <dc:date>2020-09-29T17:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241553#M27334</link>
      <description>&lt;P&gt;I believe the windows_apps.csv changes would be overwritten when you update the Splunk_TA_Windows.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:39:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241553#M27334</guid>
      <dc:creator>jbillings</dc:creator>
      <dc:date>2020-09-29T22:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows security logs in Splunk?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241554#M27335</link>
      <description>&lt;P&gt;Hi I am also having this same issue. &lt;BR /&gt;
Would it be possible to get a complete listing for this csv file?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 13:40:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/241554#M27335</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-03-21T13:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk 5.x App for Microsoft Windows: What is this "app=win:unknown" being captured in 63% of Windows secu</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/597670#M76816</link>
      <description>&lt;P&gt;Manual intervention. Need lookup the Event ID's that are showing as win:uknown and correlate them with their respective category. Once you look up the Event ID/Category you add them manually to windows_apps.csv.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 18:07:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-5-x-App-for-Microsoft-Windows-What-is-this-quot-app-win/m-p/597670#M76816</guid>
      <dc:creator>akyz</dc:creator>
      <dc:date>2022-05-12T18:07:45Z</dc:date>
    </item>
  </channel>
</rss>

