<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter out events Windows before Indexing in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/Filter-out-events-Windows-before-Indexing/m-p/433585#M7788</link>
    <description>&lt;P&gt;I notice in your example event the XML syntax is wrong:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;EventID&amp;gt;4624/EventID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It should be:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;EventID&amp;gt;4624&amp;lt;/EventID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Correcting that, the following regex seems to work:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;\&amp;lt;EventID\&amp;gt;4624\&amp;lt;\/EventID&amp;gt;.+\&amp;lt;Data\s+Name='LogonProcessName'&amp;gt;NtLmSsp|\&amp;lt;Data\s+Name='LogonProcessName'&amp;gt;NtLmSsp.+\&amp;lt;EventID\&amp;gt;4624\&amp;lt;\/EventID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This accounts for EventID occurring before or after the NtLmSsp LogonProcessName&lt;/P&gt;</description>
    <pubDate>Wed, 30 Jan 2019 21:39:02 GMT</pubDate>
    <dc:creator>jconger</dc:creator>
    <dc:date>2019-01-30T21:39:02Z</dc:date>
    <item>
      <title>Filter out events Windows before Indexing</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Filter-out-events-Windows-before-Indexing/m-p/433584#M7787</link>
      <description>&lt;P&gt;Hi Guys!&lt;/P&gt;

&lt;P&gt;How to create a filter to discard Windows logon events (EventID = 4624), but only when the LogonProcessName field is equal to 'NtLmSsp'?&lt;/P&gt;

&lt;P&gt;The logs are in XML format. &lt;/P&gt;

&lt;P&gt;I've tried several REGEX, but none worked.&lt;/P&gt;

&lt;P&gt;Please, who has an idea?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54645625-5678-4344-A5AA-E3A0356C30D}'/&amp;gt;
&amp;lt;EventID&amp;gt;4624/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;12544&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2019-01-29T16:09:38.913252400Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;602433466&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='612' ThreadID='11820'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;DC01.mydomain.com&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;NULL SID&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;MTI\user01&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;user01&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;mydomain&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x280731681&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonType'&amp;gt;3&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonProcessName'&amp;gt;NtLmSsp &amp;lt;/Data&amp;gt;&amp;lt;Data Name='AuthenticationPackageName'&amp;gt;NTLM&amp;lt;/Data&amp;gt;&amp;lt;Data Name='WorkstationName'&amp;gt;COMP01&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonGuid'&amp;gt;{00000000-0000-0000-0000-000000000000}&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TransmittedServices'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LmPackageName'&amp;gt;NTLM V2&amp;lt;/Data&amp;gt;&amp;lt;Data Name='KeyLength'&amp;gt;0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpAddress'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpPort'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ImpersonationLevel'&amp;gt;%%1833&amp;lt;/Data&amp;gt;&amp;lt;Data Name='RestrictedAdminMode'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='VirtualAccount'&amp;gt;%%1843&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLinkedLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ElevatedToken'&amp;gt;%%1842&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;EM&gt;props.conf&lt;/EM&gt;&lt;BR /&gt;
[XmlWinEventLog]&lt;BR /&gt;
TRANSFORMS-set=setnull&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;transforms.conf&lt;/EM&gt;&lt;BR /&gt;
[setnull]&lt;BR /&gt;
REGEX = (?m)(4624&amp;lt;\/EventID&amp;gt;).+(NtLmSsp\s+&amp;lt;\/Data&amp;gt;)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Other REGEX used unsuccessfully:
REGEX = (?m)EventCode\s*=\s*4624.&lt;EM&gt;?LogonProcessName\s&lt;/EM&gt;=\s*NtLmSsp\s
REGEX = (?m)LogonProcessName=(NtLmSsp)
REGEX = (?m)^EventCode=(4624).+(LogonProcessName=NtLmSsp)&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Thank you very much in advance.&lt;BR /&gt;
[]s&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:59:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Filter-out-events-Windows-before-Indexing/m-p/433584#M7787</guid>
      <dc:creator>jfeitosa_real</dc:creator>
      <dc:date>2020-09-29T22:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out events Windows before Indexing</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Filter-out-events-Windows-before-Indexing/m-p/433585#M7788</link>
      <description>&lt;P&gt;I notice in your example event the XML syntax is wrong:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;EventID&amp;gt;4624/EventID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It should be:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;EventID&amp;gt;4624&amp;lt;/EventID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Correcting that, the following regex seems to work:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;\&amp;lt;EventID\&amp;gt;4624\&amp;lt;\/EventID&amp;gt;.+\&amp;lt;Data\s+Name='LogonProcessName'&amp;gt;NtLmSsp|\&amp;lt;Data\s+Name='LogonProcessName'&amp;gt;NtLmSsp.+\&amp;lt;EventID\&amp;gt;4624\&amp;lt;\/EventID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This accounts for EventID occurring before or after the NtLmSsp LogonProcessName&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jan 2019 21:39:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Filter-out-events-Windows-before-Indexing/m-p/433585#M7788</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2019-01-30T21:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out events Windows before Indexing</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/Filter-out-events-Windows-before-Indexing/m-p/433586#M7789</link>
      <description>&lt;P&gt;Unfortunately it did not work the regex you passed.&lt;/P&gt;

&lt;P&gt;[setnull]&lt;BR /&gt;
REGEX = \4624&amp;lt;\/EventID&amp;gt;.+\NtLmSsp|\NtLmSsp.+\4624&amp;lt;\/EventID&amp;gt;&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;I tried it another way, but it did not work either.&lt;/P&gt;

&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jan 2019 22:14:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/Filter-out-events-Windows-before-Indexing/m-p/433586#M7789</guid>
      <dc:creator>jfeitosa_real</dc:creator>
      <dc:date>2019-01-31T22:14:13Z</dc:date>
    </item>
  </channel>
</rss>

