<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384302#M67965</link>
    <description>&lt;P&gt;If yall use GitHub, I can add you guys as contributors to a GitHub repo (fork of Splunk_TA_Windows) where we can all contribute towards a workable integration... &lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 19:31:23 GMT</pubDate>
    <dc:creator>dstaulcu</dc:creator>
    <dc:date>2020-09-29T19:31:23Z</dc:date>
    <item>
      <title>Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384291#M67954</link>
      <description>&lt;P&gt;Hi All,  Currently in splunk,  many of the windows log have multiple account ,domains,names etc and they all parse the same way.&lt;/P&gt;

&lt;P&gt;Example &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=windows sourcetype="WinEventLog:Security" EventCode=4728 

LogName=Security
 SourceName=Microsoft Windows security auditing.
 EventCode=4728
 EventType=0
 Type=Information
 ComputerName=VMDC01.XXXXXXs.com
 TaskCategory=Security Group Management
 OpCode=Info
 RecordNumber=666661820
 Keywords=Audit Success
 Message=A member was added to a security-enabled global group.

 Subject:
     Security ID:        XXXXX\TEST01
     Account Name:        TEST01
     Account Domain:        TEST
     Logon ID:        0xB7D860D0

 Member:
     Security ID:        XXXXXX\HXXX005
     Account Name:        CN=LXXXX\, Lucy,OU=Disabled Users,DC=XXXXXXs,DC=com

 Group:
     Security ID:        XXXXXX\OutlookCachedModeUsers
     Group Name:        OutlookCachedModeUsers
     Group Domain:        XXXXXX

 Additional Information:
     Privileges:
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The resulting logs have a "Group", "Subject" and "Member" that all have a "Security ID" field in them. These need to be parsed individually as Group_Security_ID, Subject_Security_ID, and Member_Security_ID. This should be done for each sub-field.&lt;/P&gt;

&lt;P&gt;Kindly guide me on this. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:25:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384291#M67954</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T19:25:52Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384292#M67955</link>
      <description>&lt;P&gt;Hey, if you configure the input to render the logs as XML, the fields will have proper unique names, instead of what you experienced.&lt;BR /&gt;
You could also do this manually for all of them, but it's some work and not very flexible. &lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 14:39:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384292#M67955</guid>
      <dc:creator>xpac</dc:creator>
      <dc:date>2018-05-07T14:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384293#M67956</link>
      <description>&lt;P&gt;xpac, thanks for your response, but i am not sure whether you had understood the requirement  correctly or not.  we need below details to be parsed as an individual field in splunk. &lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
      Security ID:        XXXXX\TEST01&lt;BR /&gt;
      Account Name:        TEST01&lt;BR /&gt;
      Account Domain:        TEST&lt;BR /&gt;
      Logon ID:        0xB7D860D0&lt;/P&gt;

&lt;P&gt;Subject_Security_ID, Subject_Security_Account Name, Subject_Security _Account Domain and Subject_Security_LogonID &lt;/P&gt;

&lt;P&gt;So kindly guide me on how to get this. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:25:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384293#M67956</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T19:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384294#M67957</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;Any help on this will be much appreciated !!! &lt;/P&gt;</description>
      <pubDate>Tue, 08 May 2018 11:08:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384294#M67957</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2018-05-08T11:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384295#M67958</link>
      <description>&lt;P&gt;I would not use xml rendered events unless (1) there is data you need in the EventData subsection of XML that is not also in the Message field or (2) your Splunk users are competent with t-stats based event data exploration.   XML field extraction is incredibly expensive at search time for dense data sets like the windows security logs.&lt;/P&gt;

&lt;P&gt;Here is a query I use to differentiate between the subject and member security ids.  In cases where differentiation matters I do not rely on Splunk_TA_Windows auto-extractions.  I used custom field extractions instead. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=WinEventLog:Security EventCode=4728 
| rex field=Message "(?&amp;lt;summary&amp;gt;.*)" 
| rex field=Message "Subject:\s+Security ID:\s+(?&amp;lt;Subject_Security_ID&amp;gt;.*)\s+Account Name:\s+(?&amp;lt;Subject_Account_Name&amp;gt;.*)\s+Account Domain:\s+(?&amp;lt;Subject_Account_Domain&amp;gt;.*)\s+Logon ID:\s+(?&amp;lt;Subject_Logon_ID&amp;gt;.*)"
| rex field=Message "Member:\s+Security ID:\s+(?&amp;lt;Member_Security_ID&amp;gt;.*)\s+Account Name:\s+(?&amp;lt;Member_Account_Account_Name&amp;gt;.*)"
| rex field=Message "Group:\s+Security ID:\s+(?&amp;lt;Group_Security_ID&amp;gt;.*)\s+Group Name:\s+(?&amp;lt;Group_Group_Name&amp;gt;.*)\s+Group Domain:\s+(?&amp;lt;Group_Group_Domain&amp;gt;.*)"
| table _time host sourcetype EventCode summary, Subject_Security_ID, Subject_Account_Name, Subject_Account_Domain, Subject_Logon_ID, Member_Security_ID Member_Account_Account_Name Group_Security_ID Group_Group_Name Group_Group_Domain
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:22:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384295#M67958</guid>
      <dc:creator>dstaulcu</dc:creator>
      <dc:date>2020-09-29T19:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384296#M67959</link>
      <description>&lt;P&gt;thanks dstaulcu for your effort on this.  Actually my client wants to get this filed value auto extracted instead executing the query by the end users.  So could you please guide me on how to create a props &amp;amp; transforms stanza in order to get above same results automatically, with out executing the customized query. &lt;/P&gt;

&lt;P&gt;thanks in advance. &lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 09:04:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384296#M67959</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2018-05-09T09:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384297#M67960</link>
      <description>&lt;P&gt;Thanks for pointing this out, the XML field extraction/performance issue is something I didn't have in mind, and yeah, they're pretty dense, so that would most likely be a problem. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
I'll steal your regexes, because I thought of doing those, too. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 12:42:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384297#M67960</guid>
      <dc:creator>xpac</dc:creator>
      <dc:date>2018-05-09T12:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384298#M67961</link>
      <description>&lt;P&gt;can't think of a way to do that off hand but I will challenge myself to figure it out.&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 02:39:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384298#M67961</guid>
      <dc:creator>dstaulcu</dc:creator>
      <dc:date>2018-05-10T02:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384299#M67962</link>
      <description>&lt;P&gt;You need a props entry for the sourcetype WinEventLog:Security, that includes a FEW REPORT- settings in it. Make sure these come after those already shipped with Splunk, so that the Message field actually exists. You can check for that using &lt;CODE&gt;splunk btool props list WinEventLog:Security&lt;/CODE&gt;, and see which REPORT- or EXTRACT- creates tue Message field.&lt;/P&gt;

&lt;P&gt;After that, create some transforms stanzas according to what you mentioned in props.conf, and simply put in the regex from above, SOURCE_KEY is Message, and you should be pretty good to go.&lt;/P&gt;

&lt;P&gt;There is a bunch of documentation on all of those topics available, so I think you should make it from here &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 09:12:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384299#M67962</guid>
      <dc:creator>xpac</dc:creator>
      <dc:date>2018-05-10T09:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384300#M67963</link>
      <description>&lt;P&gt;thanks xpac, for your time on this.  I could see the below stanza details in the props.conf, but not sure where  and what exactly needs to be created. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Props.conf Details: 
###### Windows Security Event Log ######
[source::*:Security]

## action
LOOKUP-action_for_windows1_security = windows_action_lookup Type OUTPUTNEW action
LOOKUP-action_for_windows2_security =  windows_action_lookup Type as Keywords OUTPUTNEW action

## privilege
REPORT-0vendor_privilege_for_windows_security = vendor_privilege_sv_for_windows_security,vendor_privilege_mv_for_windows_security
REPORT-privilege_id_for_windows_security = privilege_id_for_windows_security
LOOKUP-privilege_for_windows_security = windows_privilege_lookup privilege_id OUTPUT privilege

FIELDALIAS-src_port_for_windows_security = Source_Port as src_port
REPORT-Token_Elevation_Type_id_for_windows_security = Token_Elevation_Type_id_for_windows_security
LOOKUP-vendor_info_for_windows_security = windows_vendor_info_lookup sourcetype OUTPUT vendor,product

## Set the app field to "win:remote" or "win:local" based on EventCode, Source_Network_Address, Target_Server_Name or Logon_Type
LOOKUP-app0_for_windows_security = windows_app_lookup EventCode OUTPUTNEW app
LOOKUP-app1_for_windows_security = windows_app_lookup Source_Network_Address OUTPUTNEW app
LOOKUP-app2_for_windows_security = windows_app_lookup Target_Server_Name OUTPUTNEW app
LOOKUP-app3_for_windows_security = windows_app_lookup Logon_Type OUTPUTNEW app
LOOKUP-app4_for_windows_security = windows_app_lookup sourcetype OUTPUTNEW app

## Set the following fields based on order of operations
REPORT-dest_for_windows_security = Target_Server_Name_as_dest,ComputerName_as_dest
REPORT-dest_nt_domain_for_windows_security = Target_Domain_as_dest_nt_domain,Primary_Domain_as_dest_nt_domain,Account_Domain_as_dest_nt_domain,New_Domain_as_dest_nt_domain,Domain_as_dest_nt_domain
REPORT-dest_nt_host_for_windows_security = Target_Server_Name_as_dest_nt_host,ComputerName_as_dest_nt_host
REPORT-src_for_windows_security = Workstation_Name_as_src,Caller_Machine_Name_as_src,Client_Machine_Name_as_src,Source_Network_Address_as_src,Client_Address_as_src,ComputerName_as_src
REPORT-src_ip_for_windows_security = Source_Network_Address_as_src_ip,Client_Address_as_src_ip
REPORT-src_nt_domain_for_windows_security = Caller_Domain_as_src_nt_domain,Client_Domain_as_src_nt_domain,Account_Domain_as_src_nt_domain
REPORT-src_nt_host_for_windows_security = Workstation_Name_as_src_nt_host,Caller_Machine_Name_as_src_nt_host,Client_Machine_Name_as_src_nt_host
REPORT-src_user_for_windows_security = Caller_User_Name_as_src_user,Client_User_Name_as_src_user,Account_Name_as_src_user,User_Name_as_src_user
REPORT-user_for_windows_security = Target_User_Name_as_user,Primary_User_Name_as_user,Target_Account_Name_as_user,New_Account_Name_as_user,Account_Name_as_user,User_Name_as_user,User_as_user 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Yes, I have gone through the Props.conf document  but not sure how to start. So Could you please guide me from where I need to start the stanza and how to create the stanza based on the requirement. It will be great if you can provide me an example so that I can try myself first. &lt;/P&gt;

&lt;P&gt;thanks in advance. &lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 10:39:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384300#M67963</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2018-05-11T10:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384301#M67964</link>
      <description>&lt;P&gt;thanks dstaulcu, I am trying to seek help from xpac on this. &lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 10:40:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384301#M67964</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2018-05-11T10:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384302#M67965</link>
      <description>&lt;P&gt;If yall use GitHub, I can add you guys as contributors to a GitHub repo (fork of Splunk_TA_Windows) where we can all contribute towards a workable integration... &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:31:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384302#M67965</guid>
      <dc:creator>dstaulcu</dc:creator>
      <dc:date>2020-09-29T19:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384303#M67966</link>
      <description>&lt;P&gt;xpac, I have gone through the Props.conf document but not sure how to begin. So Could you please guide me from where I need to start the stanza and how to create the stanza based on the requirement.&lt;/P&gt;

&lt;P&gt;link: &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.1.0/Admin/Propsconf#Field_extraction_configuration" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/7.1.0/Admin/Propsconf#Field_extraction_configuration&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;thanks in advance. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:28:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384303#M67966</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T19:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384304#M67967</link>
      <description>&lt;P&gt;Challenge completed.  &lt;A href="https://github.com/dstaulcu/Splunk_SavedSearches"&gt;https://github.com/dstaulcu/Splunk_SavedSearches&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Jun 2018 03:18:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384304#M67967</guid>
      <dc:creator>dstaulcu</dc:creator>
      <dc:date>2018-06-17T03:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384305#M67968</link>
      <description>&lt;P&gt;Hi dstaulcu, thanks and sincerely  appreciate for your time and effort. great work !!!&lt;/P&gt;

&lt;P&gt;hey do I need to upload all the file which are present in the github to the Splunk_TA_windows app folder  to achieve the results.  Kindly guide me on this. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:01:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384305#M67968</guid>
      <dc:creator>Hemnaath</dc:creator>
      <dc:date>2020-09-29T20:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a feature in the splunk windows add-on to add data value called security_group_id from windows security event log as a individual splunk fields ?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384306#M67969</link>
      <description>&lt;P&gt;you could take the sections of props and transforms from GitHub and integrate them within your copy of Splunk_TA_windows or create your own app, drop the files in it's default folder, and then make sure the objects  are accessible to all and global.  I would recommend challenging yourself take it the rest of the way!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:05:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-there-a-feature-in-the-splunk-windows-add-on-to-add-data/m-p/384306#M67969</guid>
      <dc:creator>dstaulcu</dc:creator>
      <dc:date>2020-09-29T20:05:22Z</dc:date>
    </item>
  </channel>
</rss>

