<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why does Security Essentials search for windows event log data with sourcetype instead of source? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444183#M54677</link>
    <description>&lt;P&gt;@David &lt;/P&gt;

&lt;P&gt;Here's the update based on the customer's feedback that @hrottenberg_splunk mentioned:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Sec Essentials use cases:&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;New Logon Type for User&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Disabled Update Service&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Monitor Unsuccessful Windows Updates&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;New RunAs Host&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Successful Login of Account for Former Employee&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;In Splunk demo env, most cases bring up events with identical source and sourcetype names, which is odd.&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jan 2019 18:09:08 GMT</pubDate>
    <dc:creator>talbinder_splun</dc:creator>
    <dc:date>2019-01-02T18:09:08Z</dc:date>
    <item>
      <title>Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444171#M54665</link>
      <description>&lt;P&gt;The 5.x version of the Windows TA logs data with source=WinEventLog:Security and source=wineventlog ... all the items related to windows event log data fail in this app.  This is really annoying.  What is the best way to fix this?  Do we need to modify the TA for windows settings or is this a compatibility issue with Security Essentials only working with the older 4.x versions of the windows TA?&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 15:43:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444171#M54665</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2018-12-21T15:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444172#M54666</link>
      <description>&lt;P&gt;We did the first major update for the Windows TA 5 breaking changes a few releases back, but it turns out there was an entire category of searches that were missed. This has been fixed now in Version 2.3.1, posted Jan 4 2019. Thank you for reporting this!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 19:46:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444172#M54666</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2018-12-21T19:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444173#M54667</link>
      <description>&lt;P&gt;I just updated to 2.3.0 this morning before posting this question and I'm still seeing security items for windows reporting no data... if I open the query in search and change it from sourcetype=*WinEventLog:Security to source= it finds the data.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 19:59:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444173#M54667</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2018-12-21T19:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444174#M54668</link>
      <description>&lt;P&gt;Do me a favor -- try doing a _bump and see if that changes the search (sometimes Splunk Enterprise caches things when it shouldn't..). Go to http(s)://your-splunk-server:8000/en-US/_bump and then click the button that pops up there. Refresh the page you're seeing the issue on, and let me know if it goes away. If not, can you confirm where in the app (e.g., what page, what example, etc.) you see the issue, so I can dive in deeper and see what my regex search is missing?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:27:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444174#M54668</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2020-09-29T22:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444175#M54669</link>
      <description>&lt;P&gt;Hi @alastor -- happy new year! I wanted to check in again and see if you were able to try this out.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 13:36:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444175#M54669</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-02T13:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444176#M54670</link>
      <description>&lt;P&gt;Hey David, I haven't.  I've been on vacation over the holidays.  I should try it out before the end of the week though!  I will let you know!  Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 13:53:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444176#M54670</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2019-01-02T13:53:27Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444177#M54671</link>
      <description>&lt;P&gt;Excellent! Sounds good on both fronts (the vacation, and being able to try it out)!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 13:54:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444177#M54671</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-02T13:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444178#M54672</link>
      <description>&lt;P&gt;I did the bump on all of my search heads... still see the no data found on windows data with live data selected on the dashboards.  the windows items all have the wrong search string for 5.x windows app:&lt;/P&gt;

&lt;P&gt;| metasearch earliest=-2h latest=now &lt;STRONG&gt;sourcetype&lt;/STRONG&gt;="&lt;EM&gt;WinEventLog:Security" index=&lt;/EM&gt; | head 100 | stats count &lt;/P&gt;

&lt;P&gt;if I change sourcetype to source it loads data.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 14:39:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444178#M54672</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2019-01-02T14:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444179#M54673</link>
      <description>&lt;P&gt;Okay interesting, I switched browsers and now reports are showing up correctly for the most part.  (many now show an Accelerated option as well as demo and live data) and those mostly work.  there are some errors still but I think it's additional configuration that needs to be done.&lt;/P&gt;

&lt;P&gt;Some pages don't load anything though:&lt;BR /&gt;
Windows Event Log Clearing Events doesn't show any messages now when switching to live data.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 15:10:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444179#M54673</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2019-01-02T15:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444180#M54674</link>
      <description>&lt;P&gt;Confirmed w/another customer. &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/137184"&gt;@talbinder_splun&lt;/a&gt;k is going to add some detail on app version, searches etc.&lt;/P&gt;

&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/761"&gt;@David&lt;/a&gt; : I'm looking at the Splunk_TA_Windows CIM tags, and it's based on the eventtype=wineventlog_security (among others). Eventtypes.conf says:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[wineventlog_security]
search = source=WinEventLog:Security OR source=WMI:WinEventLog:Security OR source=XmlWinEventLog:Security
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However, the customer sees that sec essentials is using sourcetype=WinEventLog:Security, which clearly won't match. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:33:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444180#M54674</guid>
      <dc:creator>hrottenberg_spl</dc:creator>
      <dc:date>2020-09-29T22:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444181#M54675</link>
      <description>&lt;P&gt;okay so if I go into the Data Source Checker I still find a fair number of failures in Windows Event lookups that are pointing at sourcetype instead of source.  I did a find -exec grep -i in the app looking for sourcetype=wineventlog: and only found a single xml file and a bunch of static data entries that matched... so there has to be another area where this mismatch is being picked up.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 17:38:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444181#M54675</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2019-01-02T17:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444182#M54676</link>
      <description>&lt;P&gt;Found the bug! Working on it now, and I'll get a fixed version posted shortly. Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 17:56:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444182#M54676</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-02T17:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444183#M54677</link>
      <description>&lt;P&gt;@David &lt;/P&gt;

&lt;P&gt;Here's the update based on the customer's feedback that @hrottenberg_splunk mentioned:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Sec Essentials use cases:&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;New Logon Type for User&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Disabled Update Service&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Monitor Unsuccessful Windows Updates&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;New RunAs Host&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Successful Login of Account for Former Employee&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;In Splunk demo env, most cases bring up events with identical source and sourcetype names, which is odd.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 18:09:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444183#M54677</guid>
      <dc:creator>talbinder_splun</dc:creator>
      <dc:date>2019-01-02T18:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444184#M54678</link>
      <description>&lt;P&gt;I just submitted the corrected version. It usually gets posted within a couple of days, so figure Friday / Monday. Let me know if it's urgent and I can get a fixed version to you offline!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 21:55:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444184#M54678</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-02T21:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444185#M54679</link>
      <description>&lt;P&gt;I just submitted the corrected version. It usually gets posted within a couple of days, so figure Friday / Monday. Let me know if it's urgent and I can get a fixed version to you offline!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jan 2019 22:02:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444185#M54679</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-02T22:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444186#M54680</link>
      <description>&lt;P&gt;Thank you, @David.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jan 2019 17:11:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444186#M54680</guid>
      <dc:creator>talbinder_splun</dc:creator>
      <dc:date>2019-01-03T17:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444187#M54681</link>
      <description>&lt;P&gt;Fixed in SSE 2.3.1, now live!&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 02:37:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444187#M54681</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-05T02:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444188#M54682</link>
      <description>&lt;P&gt;Fixed in SSE 2.3.1, now live!&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 02:37:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444188#M54682</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-05T02:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444189#M54683</link>
      <description>&lt;P&gt;Fixed in SSE 2.3.1, now live!&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 02:37:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444189#M54683</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2019-01-05T02:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: Why does Security Essentials search for windows event log data with sourcetype instead of source?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444190#M54684</link>
      <description>&lt;P&gt;David fixed this with an update.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 16:11:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-does-Security-Essentials-search-for-windows-event-log-data/m-p/444190#M54684</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2019-01-10T16:11:26Z</dc:date>
    </item>
  </channel>
</rss>

