<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What's a best practice for ignoring Windows 2008 security events in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/What-s-a-best-practice-for-ignoring-Windows-2008-security-events/m-p/54135#M10465</link>
    <description>&lt;P&gt;Not surprisingly, this one had been answered before, and I just didn't find it before asking. The answer is here: &lt;A href="http://splunk-base.splunk.com/answers/2425/what-windows-event-codes-are-generally-acceptable-to-filter-out"&gt;What Windows Event Codes are generally acceptable to filter out&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Aug 2011 16:30:00 GMT</pubDate>
    <dc:creator>gpullis</dc:creator>
    <dc:date>2011-08-05T16:30:00Z</dc:date>
    <item>
      <title>What's a best practice for ignoring Windows 2008 security events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-s-a-best-practice-for-ignoring-Windows-2008-security-events/m-p/54134#M10464</link>
      <description>&lt;P&gt;Like most of us with Windows servers, I'm fighting with keeping my license usage down in the face of Windows Server 2008 Security event logs.&lt;/P&gt;

&lt;P&gt;I'm pretty sure the correct answer is, "every environment is different", but I'm wondering if any of you wanted to share your advice on what events you feel are sufficiently silly that they can be shoved into the nullQueue? &lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2011 15:19:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-s-a-best-practice-for-ignoring-Windows-2008-security-events/m-p/54134#M10464</guid>
      <dc:creator>gpullis</dc:creator>
      <dc:date>2011-08-05T15:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: What's a best practice for ignoring Windows 2008 security events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-s-a-best-practice-for-ignoring-Windows-2008-security-events/m-p/54135#M10465</link>
      <description>&lt;P&gt;Not surprisingly, this one had been answered before, and I just didn't find it before asking. The answer is here: &lt;A href="http://splunk-base.splunk.com/answers/2425/what-windows-event-codes-are-generally-acceptable-to-filter-out"&gt;What Windows Event Codes are generally acceptable to filter out&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2011 16:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-s-a-best-practice-for-ignoring-Windows-2008-security-events/m-p/54135#M10465</guid>
      <dc:creator>gpullis</dc:creator>
      <dc:date>2011-08-05T16:30:00Z</dc:date>
    </item>
  </channel>
</rss>

