<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regex User name from Symantec logs in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Regex-User-name-from-Symantec-logs/m-p/488566#M60134</link>
    <description>&lt;P&gt;That worked perfectly.  Thank you. &lt;/P&gt;</description>
    <pubDate>Fri, 17 Jan 2020 19:47:29 GMT</pubDate>
    <dc:creator>Vfinney</dc:creator>
    <dc:date>2020-01-17T19:47:29Z</dc:date>
    <item>
      <title>Regex User name from Symantec logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Regex-User-name-from-Symantec-logs/m-p/488564#M60132</link>
      <description>&lt;P&gt;We are having some issues with extracting fields from our symantec logs.  While our team is working through this issue, I would like some help using regex to extract user names.  &lt;/P&gt;

&lt;P&gt;2020-01-16 08:00:36,Critical,ASPRARWB1,Event Description: [SID: 30413] Web Attack: Passwd File Download Attempt attack blocked. Traffic has been blocked for this application: C:\WINDOWS\SYSTEM32\INETSRV\W3WP.EXE,Local Host IP: 127.0.0.1,Local Host MAC: 000000000000,Remote Host Name: ,Remote Host IP: 127.0.0.1,Remote Host MAC: 000000000000,Outbound,TCP,Intrusion ID: 0,Begin: 2019-11-27 14:56:07,End: 2019-11-27 14:56:07,Occurrences: 1,Application: C:/WINDOWS/SYSTEM32/INETSRV/W3WP.EXE,Location: Default,User: pxmacct,Domain: DOL,Local Port: 53937,Remote Port: 5112,CIDS Signature ID: 30413,CIDS Signature string: Web Attack: Passwd File Download Attempt,CIDS Signature SubID: 74503,Intrusion URL: &lt;A href="http://www.arppapi.dol.ks.gov/cgi-bin/ion-p.exe?page=../../../../../etc/passwd,Intrusion"&gt;www.arppapi.dol.ks.gov/cgi-bin/ion-p.exe?page=../../../../../etc/passwd,Intrusion&lt;/A&gt; Payload URL: ,SHA-256: 6CD7CC4B72DB91F168C36C500C1BE9AE391C1FF09CD65295BB24267D35373FD9,MD-5: &lt;/P&gt;

&lt;P&gt;2020-01-16 08:00:31,Critical,ASPRARWB1,Event Description: [SID: 20521] Web Attack: SGI InfoSearch fname Exec CVE-2000-0207 attack blocked. Traffic has been blocked for this application: C:\WINDOWS\SYSTEM32\INETSRV\W3WP.EXE,Local Host IP: 127.0.0.1,Local Host MAC: 000000000000,Remote Host Name: ,Remote Host IP: 127.0.0.1,Remote Host MAC: 000000000000,Outbound,TCP,Intrusion ID: 0,Begin: 2019-11-27 14:56:01,End: 2019-11-27 14:56:01,Occurrences: 1,Application: C:/WINDOWS/SYSTEM32/INETSRV/W3WP.EXE,Location: Default,User: pxmacct,Domain: DOL,Local Port: 53933,Remote Port: 5112,CIDS Signature ID: 20521,CIDS Signature string: Web Attack: SGI InfoSearch fname Exec CVE-2000-0207,CIDS Signature SubID: 75437,Intrusion URL: &lt;A href="http://www.arppapi.dol.ks.gov/cgi-bin/infosrch.cgi?cmd=getdoc&amp;amp;db=man&amp;amp;fname=%7C/bin/id,Intrusion"&gt;www.arppapi.dol.ks.gov/cgi-bin/infosrch.cgi?cmd=getdoc&amp;amp;db=man&amp;amp;fname=|/bin/id,Intrusion&lt;/A&gt; Payload URL: ,SHA-256: 6CD7CC4B72DB91F168C36C500C1BE9AE391C1FF09CD65295BB24267D35373FD9,MD-5: &lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2020 15:46:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Regex-User-name-from-Symantec-logs/m-p/488564#M60132</guid>
      <dc:creator>Vfinney</dc:creator>
      <dc:date>2020-01-17T15:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: Regex User name from Symantec logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Regex-User-name-from-Symantec-logs/m-p/488565#M60133</link>
      <description>&lt;P&gt;You can try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; | rex "User\:\s(?&amp;lt;user&amp;gt;[^\,]+)"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 Jan 2020 17:22:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Regex-User-name-from-Symantec-logs/m-p/488565#M60133</guid>
      <dc:creator>jscraig2006</dc:creator>
      <dc:date>2020-01-17T17:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Regex User name from Symantec logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Regex-User-name-from-Symantec-logs/m-p/488566#M60134</link>
      <description>&lt;P&gt;That worked perfectly.  Thank you. &lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2020 19:47:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Regex-User-name-from-Symantec-logs/m-p/488566#M60134</guid>
      <dc:creator>Vfinney</dc:creator>
      <dc:date>2020-01-17T19:47:29Z</dc:date>
    </item>
  </channel>
</rss>

