<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Firewall log in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312033#M20062</link>
    <description>&lt;P&gt;Have you done any field extractions or are you using a Technology Addon (TA) that is giving you any field extractions? If not, that is your first problem. Once you have the field extractions, you can simply display a table of the data with:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your_base_search&amp;gt; | table *
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or you can define which of the fields you want displayed in your table with:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your_base_search&amp;gt; | table field, field2, field3
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But you do have to have fields being extracted for either of these to do anything useful. Here is a useful document to get you started in creating your own automatic field extraction:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.0/Knowledge/ExtractfieldsinteractivelywithIFX"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.0/Knowledge/ExtractfieldsinteractivelywithIFX&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Nov 2017 20:01:52 GMT</pubDate>
    <dc:creator>cpetterborg</dc:creator>
    <dc:date>2017-11-27T20:01:52Z</dc:date>
    <item>
      <title>Windows Firewall log</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312029#M20058</link>
      <description>&lt;P&gt;Hi, im newbie for splunk enterprise&lt;/P&gt;

&lt;P&gt;I had a log file for windows firewall that I already point to Splunk via universal forwarder and splunk read as per below:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;11/27/17&lt;BR /&gt;
9:56:14.000 AM  2017-11-27 09:56:14 ALLOW UDP 202.217.203.244 58.139.24.118 52785 161 0 - - - - - - - SEND&lt;BR /&gt;
 host = BITNPM01    source =    C:\Windows\System32\LogFiles\Firewall\pfirewall.log sourcetype =    pfirewall&lt;BR /&gt;&lt;BR /&gt;
11/27/17&lt;BR /&gt;
9:56:14.000 AM  2017-11-27 09:56:14 ALLOW UDP 202.217.203.244 114.133.193.1 52785 161 0 - - - - - - - SEND&lt;BR /&gt;
 host = BITNPM01    source =    C:\Windows\System32\LogFiles\Firewall\pfirewall.log sourcetype =    pfirewall&lt;/STRONG&gt;**   &lt;/P&gt;

&lt;P&gt;I just want to create a table form this log where I need to split variable like source IP, destination IP and time. I had try to used pivot function but the variable it not shown for those i need.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2017 02:19:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312029#M20058</guid>
      <dc:creator>hafizuddin</dc:creator>
      <dc:date>2017-11-27T02:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312030#M20059</link>
      <description>&lt;P&gt;What can not be displayed? &lt;BR /&gt;
Is it a field?　Is it a pivot table?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2017 03:13:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312030#M20059</guid>
      <dc:creator>HiroshiSatoh</dc:creator>
      <dc:date>2017-11-27T03:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312031#M20060</link>
      <description>&lt;P&gt;it is a Field...&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2017 04:10:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312031#M20060</guid>
      <dc:creator>hafizuddin</dc:creator>
      <dc:date>2017-11-27T04:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312032#M20061</link>
      <description>&lt;P&gt;If the field is not displayed only for a specific user, I think that it is a matter of authority. Please check the permission setting of field extraction.&lt;/P&gt;

&lt;P&gt;Fields » Field extractions&lt;BR /&gt;
OR&lt;BR /&gt;
Fields » Field transformations&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2017 07:09:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312032#M20061</guid>
      <dc:creator>HiroshiSatoh</dc:creator>
      <dc:date>2017-11-27T07:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312033#M20062</link>
      <description>&lt;P&gt;Have you done any field extractions or are you using a Technology Addon (TA) that is giving you any field extractions? If not, that is your first problem. Once you have the field extractions, you can simply display a table of the data with:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your_base_search&amp;gt; | table *
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or you can define which of the fields you want displayed in your table with:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;your_base_search&amp;gt; | table field, field2, field3
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But you do have to have fields being extracted for either of these to do anything useful. Here is a useful document to get you started in creating your own automatic field extraction:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.0/Knowledge/ExtractfieldsinteractivelywithIFX"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.0/Knowledge/ExtractfieldsinteractivelywithIFX&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2017 20:01:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Windows-Firewall-log/m-p/312033#M20062</guid>
      <dc:creator>cpetterborg</dc:creator>
      <dc:date>2017-11-27T20:01:52Z</dc:date>
    </item>
  </channel>
</rss>

