<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blacklist - 2 fields on same event in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Blacklist-2-fields-on-same-event/m-p/581569#M102519</link>
    <description>&lt;P&gt;Hi all, I'm trying to create a blacklist for an event after checking 2 different fields on different lines.&lt;BR /&gt;&lt;BR /&gt;I can get them filtered individually, but without an "AND" operator, like OR has "|", I'm struggling.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample Event&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;An account was successfully logged on.

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes

Impersonation Level:		Impersonation

New Logon:
	Security ID:		SYSTEM
	Account Name:		COMPUTER$
	Account Domain:		XXXX.NET
	Logon ID:		0x6C6C65F09
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{970e0bf8-ccc7-18fd-7be9-d5efe2ab8b22}

Process Information:
	Process ID:		0x0
	Process Name:		-

Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what I'm trying to do is filter on Logon Type=3 AND Account Name: xxx$&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried stuff that works on regex101, etc.&amp;nbsp; And it will work there, but Splunk doesn't seem to recognize it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(?=.*?(Logon\sType:[\s]*3))(?=.*?(Account\sName:[\s]*.*\$))&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jan 2022 23:14:20 GMT</pubDate>
    <dc:creator>icewolf69</dc:creator>
    <dc:date>2022-01-18T23:14:20Z</dc:date>
    <item>
      <title>Blacklist - 2 fields on same event</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklist-2-fields-on-same-event/m-p/581569#M102519</link>
      <description>&lt;P&gt;Hi all, I'm trying to create a blacklist for an event after checking 2 different fields on different lines.&lt;BR /&gt;&lt;BR /&gt;I can get them filtered individually, but without an "AND" operator, like OR has "|", I'm struggling.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample Event&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;An account was successfully logged on.

Subject:
	Security ID:		NULL SID
	Account Name:		-
	Account Domain:		-
	Logon ID:		0x0

Logon Information:
	Logon Type:		3
	Restricted Admin Mode:	-
	Virtual Account:		No
	Elevated Token:		Yes

Impersonation Level:		Impersonation

New Logon:
	Security ID:		SYSTEM
	Account Name:		COMPUTER$
	Account Domain:		XXXX.NET
	Logon ID:		0x6C6C65F09
	Linked Logon ID:		0x0
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{970e0bf8-ccc7-18fd-7be9-d5efe2ab8b22}

Process Information:
	Process ID:		0x0
	Process Name:		-

Network Information:
	Workstation Name:	-
	Source Network Address:	-
	Source Port:		-

Detailed Authentication Information:
	Logon Process:		Kerberos
	Authentication Package:	Kerberos
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what I'm trying to do is filter on Logon Type=3 AND Account Name: xxx$&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried stuff that works on regex101, etc.&amp;nbsp; And it will work there, but Splunk doesn't seem to recognize it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(?=.*?(Logon\sType:[\s]*3))(?=.*?(Account\sName:[\s]*.*\$))&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 23:14:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklist-2-fields-on-same-event/m-p/581569#M102519</guid>
      <dc:creator>icewolf69</dc:creator>
      <dc:date>2022-01-18T23:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklist - 2 fields on same event</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklist-2-fields-on-same-event/m-p/581585#M102520</link>
      <description>&lt;P&gt;Took me a while but figured it out, incase someone shows up here in the future!&lt;BR /&gt;&lt;BR /&gt;source="WinEventLog:Security" EventCode=4624 | regex Message="(?ms)Logon\sType:[\s]*(3).*Account\sName:[\s]*(.*\$)"&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 05:16:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklist-2-fields-on-same-event/m-p/581585#M102520</guid>
      <dc:creator>icewolf69</dc:creator>
      <dc:date>2022-01-19T05:16:39Z</dc:date>
    </item>
  </channel>
</rss>

