<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: remove events from Windows security in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335253#M5002</link>
    <description>&lt;P&gt;so this wouldn't work at the HF level ? - i have no access to the splunk cloud indexers.&lt;/P&gt;</description>
    <pubDate>Sat, 03 Jun 2017 23:22:52 GMT</pubDate>
    <dc:creator>Esky73</dc:creator>
    <dc:date>2017-06-03T23:22:52Z</dc:date>
    <item>
      <title>remove events from Windows security</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335251#M5000</link>
      <description>&lt;P&gt;Receiving windows security logs from UF's&lt;/P&gt;

&lt;P&gt;I have a created an app on my HF and put transforms and props in the local folder as such:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
TRANSFORMS-setNull8 = NukeThumbs.db

[NukeThumbs.db]
REGEX = (?s).*Thumbs.db(?s).*
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However i'm still seeing windows eventlogs coming through to my splunk instance like the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;D:\SYSTEM\FFMC\Hireline\FFFG Fireline 2016\Pete Register\201705 May\Thumbs.db
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 03 Jun 2017 15:35:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335251#M5000</guid>
      <dc:creator>Esky73</dc:creator>
      <dc:date>2017-06-03T15:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: remove events from Windows security</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335252#M5001</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[NukeThumbs.db]
REGEX = \\Thumbs\.db(?:[\r\n]+|$)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Deploy this to your INDEXERS and restart all Splunk instances there.  When testing your change, only examine events that were indexed AFTER the restarts (you can use something like &lt;CODE&gt;_index_earliest=-2m&lt;/CODE&gt; or similar); older events will stay broken (not deleted).&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jun 2017 15:52:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335252#M5001</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-06-03T15:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: remove events from Windows security</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335253#M5002</link>
      <description>&lt;P&gt;so this wouldn't work at the HF level ? - i have no access to the splunk cloud indexers.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jun 2017 23:22:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335253#M5002</guid>
      <dc:creator>Esky73</dc:creator>
      <dc:date>2017-06-03T23:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: remove events from Windows security</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335254#M5003</link>
      <description>&lt;P&gt;Yes, it will work for HF; I should have written &lt;CODE&gt;your parsing servers&lt;/CODE&gt; instead of &lt;CODE&gt;Indexers&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jun 2017 23:38:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335254#M5003</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-06-03T23:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: remove events from Windows security</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335255#M5004</link>
      <description>&lt;P&gt;applied to the HF and restarted HF still events being seen.&lt;/P&gt;

&lt;P&gt;Also added:&lt;/P&gt;

&lt;P&gt;[Nukesvchost]&lt;BR /&gt;
REGEX = \[Ss]vchost.exe(?:[\r\n]+|)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;which looks right (In regex101.com)&lt;/P&gt;

&lt;P&gt;however also doesnt stop the events&lt;/P&gt;

&lt;P&gt;props and transforms are located in :&lt;/P&gt;

&lt;P&gt;C:\ProgramFiles\Splunk\etc\apps\Splunk_TA_EventNukes\local&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:22:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335255#M5004</guid>
      <dc:creator>Esky73</dc:creator>
      <dc:date>2020-09-29T14:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: remove events from Windows security</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335256#M5005</link>
      <description>&lt;P&gt;I have implemented the filtering in inputs.conf on the HF fir now - but still would like to know what could be the issue ..&lt;/P&gt;

&lt;P&gt;Could it be something to do with the fact the HF's have a 0 byte license - they just forward he data to the cloud.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2017 01:24:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335256#M5005</guid>
      <dc:creator>Esky73</dc:creator>
      <dc:date>2017-06-05T01:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: remove events from Windows security</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335257#M5006</link>
      <description>&lt;P&gt;Is it possible that your window event log is in multilines ? You could try to use (?ms) instead of (?s). &lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 03:53:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/remove-events-from-Windows-security/m-p/335257#M5006</guid>
      <dc:creator>tlam_splunk</dc:creator>
      <dc:date>2017-06-06T03:53:25Z</dc:date>
    </item>
  </channel>
</rss>

