<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to blacklist Windows Security Events in XML format in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487947#M60049</link>
    <description>&lt;P&gt;Thanks for the help. The ' character is seen as a a delimiter so it's seeking for a new key after 'NewProcessName'&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;03-13-2020 02:53:52.326 -0700 ERROR ExecProcessor - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - Processing: 'blacklist4', failed to find key in string data '&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe'
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 13 Mar 2020 09:58:39 GMT</pubDate>
    <dc:creator>gratstein</dc:creator>
    <dc:date>2020-03-13T09:58:39Z</dc:date>
    <item>
      <title>How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487945#M60047</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I'm trying to blacklist Windows Security Events in XML format.&lt;/P&gt;

&lt;P&gt;In non XML format we have this blacklist&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist3 = EventCode="4688" Message="New Process Name: (?i)(?:[C-F]:\Program Files\Splunk(?:UniversalForwarder)?\bin\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi)).exe)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The format for XML blacklist is described here&lt;BR /&gt;
hxxps://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Use_blacklists_and_whitelists_to_filter_on_XML-based_events&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = $XmlRegex = 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This is not accepted&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = $XmlRegex = &amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;.*&amp;lt;Data Name=\'NewProcessName\'&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Character ' is seen as a delimiter.&lt;/P&gt;

&lt;P&gt;Has anyone been able to build something similar?&lt;BR /&gt;
Is it a good idea to keep the EventID in the regex?&lt;/P&gt;

&lt;P&gt;RAW Event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{12345678-1234-1234-A1B2-1A2B3456C78D}'/&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated1 SystemTime='2020-03-05T17:11:17.754003000Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;5254707&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='4' ThreadID='11888'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;COMPUTER.contoso.com&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;COMPUTER$&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt;CONTOSO&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessId'&amp;gt;0x3668&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunk-powershell.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x3c28&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='MandatoryLabel'&amp;gt;S-1-16-16384&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:30:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487945#M60047</guid>
      <dc:creator>gratstein</dc:creator>
      <dc:date>2020-09-30T04:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487946#M60048</link>
      <description>&lt;P&gt;have you tried not escaping the carat?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = $XmlRegex = &amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;.*&amp;lt;Data Name='NewProcessName'&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 12 Mar 2020 03:10:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487946#M60048</guid>
      <dc:creator>xavierashe</dc:creator>
      <dc:date>2020-03-12T03:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487947#M60049</link>
      <description>&lt;P&gt;Thanks for the help. The ' character is seen as a a delimiter so it's seeking for a new key after 'NewProcessName'&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;03-13-2020 02:53:52.326 -0700 ERROR ExecProcessor - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - Processing: 'blacklist4', failed to find key in string data '&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe'
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 13 Mar 2020 09:58:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487947#M60049</guid>
      <dc:creator>gratstein</dc:creator>
      <dc:date>2020-03-13T09:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487948#M60050</link>
      <description>&lt;P&gt;Have you tried dots instead of quotes?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = $XmlRegex = &amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;.*&amp;lt;Data Name=.NewProcessName.&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 13 Mar 2020 12:09:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487948#M60050</guid>
      <dc:creator>xavierashe</dc:creator>
      <dc:date>2020-03-13T12:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487949#M60051</link>
      <description>&lt;P&gt;Same error message&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;03-13-2020 06:37:58.315 -0700 ERROR ExecProcessor - message from ""C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe"" splunk-winevtlog - Processing: 'blacklist1', failed to find key in string data '&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe'
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 13 Mar 2020 14:41:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487949#M60051</guid>
      <dc:creator>gratstein</dc:creator>
      <dc:date>2020-03-13T14:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487950#M60052</link>
      <description>&lt;P&gt;I needed to add the double quotes, this is working now&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist3 = $XmlRegex="&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;.*&amp;lt;Data Name='NewProcessName'&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 13 Mar 2020 15:02:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487950#M60052</guid>
      <dc:creator>gratstein</dc:creator>
      <dc:date>2020-03-13T15:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487951#M60053</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;blacklist3 = $XmlRegex="&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;.*&amp;lt;Data Name='NewProcessName'&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 13 Mar 2020 15:04:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487951#M60053</guid>
      <dc:creator>xavierashe</dc:creator>
      <dc:date>2020-03-13T15:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487952#M60054</link>
      <description>&lt;P&gt;Great!  I'll toss it down in the answers for future readers.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 15:05:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/487952#M60054</guid>
      <dc:creator>xavierashe</dc:creator>
      <dc:date>2020-03-13T15:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Events in XML format</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/518489#M63345</link>
      <description>&lt;P class="lia-indent-padding-left-30px"&gt;You answered my same question from earlier with this one.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 17:52:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-to-blacklist-Windows-Security-Events-in-XML-format/m-p/518489#M63345</guid>
      <dc:creator>seanjconnell</dc:creator>
      <dc:date>2020-09-08T17:52:31Z</dc:date>
    </item>
  </channel>
</rss>

