<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Removing a file path from an alert search in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575522#M101730</link>
    <description>&lt;P&gt;so i added:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;NOT Creator_Process_Name="C:\Program Files (x86)\MySQL\MySQL Notifier 1.1\MySQLNotifier.exe" New_Process_Name="&lt;/SPAN&gt;&lt;SPAN&gt;C:\Windows\SysWOW64\schtasks.exe"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Because I want that file path exempted, but this did not work, when I do the search the file path still comes up.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Nov 2021 17:59:40 GMT</pubDate>
    <dc:creator>sigiri</dc:creator>
    <dc:date>2021-11-18T17:59:40Z</dc:date>
    <item>
      <title>Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575309#M101684</link>
      <description>&lt;P&gt;So there is a query on my splunk cloud instance. Which is below:&lt;/P&gt;&lt;P&gt;index=windows EventCode=4688&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [| inputlookup "lotl_commands.csv"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; | rename suscmd as search ]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT Account_Name=*$&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (net "use ")&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT InteractionScripter.NET.exe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (Account_Name=itreports sqlcmd.exe)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (Account_Name=SRV_EtlProd winscp.exe OR MSSQLSERVER OR SQLSERVERAGENT)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (Account_Name=SRV_EDW_SQLEngine sqlcmd.exe conhost.exe OR sqldiag.exe)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (Creator_Process_Name="C:\\Windows\\System32\\net.exe" New_Process_Name="C:\\Windows\\System32\\conhost.exe")&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (New_Process_Name=C:\\Windows\\System32\\conhost.exe)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (Creator_Process_Name="*\\MicroStrategy Services.exe" New_Process_Name=C:\\Windows\\System32\\cscript.exe)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT Account_Name="SVCBTSCAN" `comment(INC0036469)`&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT Account_Name="SVCBTFUNC" `comment(INC0036469)`&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT Account_Name="SRV_Vulscanning" `comment(INC0036582)`&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOT (Account_Name="SRV_Lansweep_4Server" csc.exe)&lt;/P&gt;&lt;P&gt;| table _time EventCode ComputerName Account_Name Creator_Process_Name New_Process_Name Process_Command_Line&lt;/P&gt;&lt;P&gt;| sort _time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whenever it runs, it triggers an alert for file path:&lt;/P&gt;&lt;P&gt;C:\Program Files (x86)\MySQL\MySQL Notifier 1.1\MySQLNotifier.exe&lt;BR /&gt;C:\Windows\SysWOW64\schtasks.exe&lt;/P&gt;&lt;P&gt;Now this file path is running legitimately and I am trying to exempt it from being searched again so another alert does not trigger so the 10th line that starts with " NOT (Creator_Process_Name=" I created another line like that under it and inserted both file paths but when I do a 24hr search it still comes up, which means it is still not exempting that file path. So please i need help being able to exempt that file path from the search. Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 19:04:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575309#M101684</guid>
      <dc:creator>sigiri</dc:creator>
      <dc:date>2021-11-17T19:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575321#M101687</link>
      <description>&lt;P&gt;Please share the modified query.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 20:06:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575321#M101687</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-11-17T20:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575322#M101688</link>
      <description>&lt;P&gt;index=windows EventCode=4688&lt;BR /&gt;[| inputlookup "lotl_commands.csv"&lt;BR /&gt;| rename suscmd as search ]&lt;BR /&gt;NOT Account_Name=*$&lt;BR /&gt;NOT (net "use ")&lt;BR /&gt;NOT InteractionScripter.NET.exe&lt;BR /&gt;NOT (Account_Name=itreports sqlcmd.exe)&lt;BR /&gt;NOT (Account_Name=SRV_EtlProd winscp.exe OR MSSQLSERVER OR SQLSERVERAGENT)&lt;BR /&gt;NOT (Account_Name=SRV_EDW_SQLEngine sqlcmd.exe conhost.exe OR sqldiag.exe)&lt;BR /&gt;NOT (Creator_Process_Name="C:\\Windows\\System32\\net.exe" New_Process_Name="C:\\Windows\\System32\\conhost.exe")&lt;BR /&gt;NOT (Creator_Process_Name="C:\Program Files (x86)\MySQL\MySQL Notifier 1.1\MySQLNotifier.exe" New_Process_Name="C:\Windows\SysWOW64\schtasks.exe")&lt;BR /&gt;NOT (New_Process_Name=C:\\Windows\\System32\\conhost.exe)&lt;BR /&gt;NOT (Creator_Process_Name="*\\MicroStrategy Services.exe" New_Process_Name=C:\\Windows\\System32\\cscript.exe)&lt;BR /&gt;NOT Account_Name="SVCBTSCAN" `comment(INC0036469)`&lt;BR /&gt;NOT Account_Name="SVCBTFUNC" `comment(INC0036469)`&lt;BR /&gt;NOT Account_Name="SRV_Vulscanning" `comment(INC0036582)`&lt;BR /&gt;NOT (Account_Name="SRV_Lansweep_4Server" csc.exe)&lt;BR /&gt;| table _time EventCode ComputerName Account_Name Creator_Process_Name New_Process_Name Process_Command_Line&lt;BR /&gt;| sort _time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i added the line that starts with "NOT (Creator_Process_Name="C:\Program Files (x86)\MySQL\MySQL Notifier 1.1", because i want the file path to be exempted when the alert runs&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 20:14:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575322#M101688</guid>
      <dc:creator>sigiri</dc:creator>
      <dc:date>2021-11-17T20:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575338#M101694</link>
      <description>&lt;P&gt;Backslashes have to be escaped.&amp;nbsp; Try this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows EventCode=4688
[| inputlookup "lotl_commands.csv"
| rename suscmd as search ]
NOT Account_Name=*$
NOT (net "use ")
NOT InteractionScripter.NET.exe
NOT (Account_Name=itreports sqlcmd.exe)
NOT (Account_Name=SRV_EtlProd winscp.exe OR MSSQLSERVER OR SQLSERVERAGENT)
NOT (Account_Name=SRV_EDW_SQLEngine sqlcmd.exe conhost.exe OR sqldiag.exe)
NOT (Creator_Process_Name="C:\\Windows\\System32\\net.exe" New_Process_Name="C:\\Windows\\System32\\conhost.exe")
NOT (Creator_Process_Name="C:\\Program Files (x86)\\MySQL\\MySQL Notifier 1.1\\MySQLNotifier.exe" New_Process_Name="C:\\Windows\\SysWOW64\\schtasks.exe")
NOT (New_Process_Name=C:\\Windows\\System32\\conhost.exe)
NOT (Creator_Process_Name="*\\MicroStrategy Services.exe" New_Process_Name=C:\\Windows\\System32\\cscript.exe)
NOT Account_Name="SVCBTSCAN" `comment(INC0036469)`
NOT Account_Name="SVCBTFUNC" `comment(INC0036469)`
NOT Account_Name="SRV_Vulscanning" `comment(INC0036582)`
NOT (Account_Name="SRV_Lansweep_4Server" csc.exe)
| table _time EventCode ComputerName Account_Name Creator_Process_Name New_Process_Name Process_Command_Line
| sort _time&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 17 Nov 2021 21:27:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575338#M101694</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-11-17T21:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575345#M101697</link>
      <description>&lt;P&gt;It does not work, i ran the query you sent me but the same file path still comes up.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sigiri_0-1637185678949.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16898iE314EA3A95BA9097/image-size/medium?v=v2&amp;amp;px=400" role="button" title="sigiri_0-1637185678949.png" alt="sigiri_0-1637185678949.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;i need it to be exempted. Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 21:48:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575345#M101697</guid>
      <dc:creator>sigiri</dc:creator>
      <dc:date>2021-11-17T21:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575520#M101729</link>
      <description>&lt;P&gt;It will be exempted only if&amp;nbsp;Creator_Process_Name is "C:\Windows\System32\net.exe"&amp;nbsp; AND New_Process_Name is "C:\Windows\System32\conhost.exe" in the same event.&amp;nbsp; Is that the case?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 17:52:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575520#M101729</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-11-18T17:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575522#M101730</link>
      <description>&lt;P&gt;so i added:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;NOT Creator_Process_Name="C:\Program Files (x86)\MySQL\MySQL Notifier 1.1\MySQLNotifier.exe" New_Process_Name="&lt;/SPAN&gt;&lt;SPAN&gt;C:\Windows\SysWOW64\schtasks.exe"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Because I want that file path exempted, but this did not work, when I do the search the file path still comes up.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 17:59:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575522#M101730</guid>
      <dc:creator>sigiri</dc:creator>
      <dc:date>2021-11-18T17:59:40Z</dc:date>
    </item>
    <item>
      <title>Re: Removing a file path from an alert search</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575547#M101741</link>
      <description>&lt;P&gt;You added the same expression again?&amp;nbsp; How was that supposed to help?&lt;/P&gt;&lt;P&gt;Have you tried&amp;nbsp;this?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;NOT Creator_Process_Name="C:\Program Files (x86)\MySQL\MySQL Notifier 1.1\MySQLNotifier.exe"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 20:53:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Removing-a-file-path-from-an-alert-search/m-p/575547#M101741</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-11-18T20:53:22Z</dc:date>
    </item>
  </channel>
</rss>

