<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270476#M31377</link>
    <description>&lt;P&gt;The current issue has been fixed in Windows TA 4.8.4 onwards, so please download the latest version Windows TA and test or try using the following Regex.&lt;BR /&gt;
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"  &lt;/P&gt;</description>
    <pubDate>Wed, 10 May 2017 04:13:37 GMT</pubDate>
    <dc:creator>kheo_splunk</dc:creator>
    <dc:date>2017-05-10T04:13:37Z</dc:date>
    <item>
      <title>Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270469#M31370</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;I am trying to look up data related to &lt;CODE&gt;EventCode="4662"&lt;/CODE&gt;, but it does not show in Splunk. &lt;/P&gt;

&lt;P&gt;I am using Universal Forwarders and nothing is being blacklisted within the inputs.conf for Splunk_TA_windows.&lt;BR /&gt;
Additionally I checked inputs.conf on the indexer and it was not present, I copied inputs.conf from default:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"
index = wineventlog
renderXml=false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I have check within Windows Event Viewer on our Domain Controller that Event 4662 is present, but Splunk searches for EventCode=4662 produce no results.&lt;/P&gt;

&lt;P&gt;Not sure how to troubleshoot that.&lt;/P&gt;

&lt;P&gt;I am running a single Splunk server. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:40:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270469#M31370</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2020-09-29T08:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270470#M31371</link>
      <description>&lt;P&gt;Sorry but your config file shows 4662 as blacklist. Is it a typo?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2016 14:12:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270470#M31371</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2016-02-05T14:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270471#M31372</link>
      <description>&lt;P&gt;No, the regular expression &lt;CODE&gt;Message="Object Type:\s+(?!groupPolicyContainer)"&lt;/CODE&gt;  filters out the junk&lt;BR /&gt;
I am just looking to see Group Policy Changes which I know took place earlier today in the morning and I can see that events within Windows Event Viewer&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2016 14:26:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270471#M31372</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2016-02-05T14:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270472#M31373</link>
      <description>&lt;P&gt;Could you add some context, why are these specific events "4662" and "566" in your config? Do they definitely appear in your indexed data?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2016 16:19:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270472#M31373</guid>
      <dc:creator>jpanderson</dc:creator>
      <dc:date>2016-02-05T16:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270473#M31374</link>
      <description>&lt;P&gt;These is a default config.  It is supposed to filter out events 4662 that contain junk and only leave events 4662 which contain GPO changes ( see for details &lt;A href="http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/"&gt;http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/&lt;/A&gt;) &lt;BR /&gt;
GPO changes were done today and I can see these events on Windows Event Viewer on DC. &lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2016 16:35:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270473#M31374</guid>
      <dc:creator>ttchorz</dc:creator>
      <dc:date>2016-02-05T16:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270474#M31375</link>
      <description>&lt;P&gt;I'm running into the same issue. Even when I comment out the blacklisting altogether for EventCode 4662, Splunk is still not indexing any 4662 events (junk or not). I've confirmed that there are other events coming in from the Windows Security Log so I don't believe that permissions are an issue here. &lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 13:32:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270474#M31375</guid>
      <dc:creator>pkiripolsky</dc:creator>
      <dc:date>2016-08-31T13:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270475#M31376</link>
      <description>&lt;P&gt;I know this is stating the obvious, but have you confirmed that 4662 is coming into the event logs?  I know that when we removed the blacklist entirely as a means of troubleshooting, we found that 4662 was not being logged.&lt;/P&gt;

&lt;P&gt;That said, I am still having issues myself with the blacklisting portion, but I do know that events not being actually logged was one of our issues, and now events are coming in if I remove the blacklist entirely.  If anyone has any ideas outside of copying/pasting, typing things manually, using btool, reinstalling add-ons and clients, or standing on your head and spinning around three times by moonlight, I'd be happy to hear.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 14:18:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270475#M31376</guid>
      <dc:creator>edekker</dc:creator>
      <dc:date>2016-08-31T14:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Windows: How to troubleshoot why EventCode 4662 data is not being indexed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270476#M31377</link>
      <description>&lt;P&gt;The current issue has been fixed in Windows TA 4.8.4 onwards, so please download the latest version Windows TA and test or try using the following Regex.&lt;BR /&gt;
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"  &lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 04:13:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Windows-How-to-troubleshoot-why/m-p/270476#M31377</guid>
      <dc:creator>kheo_splunk</dc:creator>
      <dc:date>2017-05-10T04:13:37Z</dc:date>
    </item>
  </channel>
</rss>

