<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help whitelisting Windows Event IDs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606550#M105377</link>
    <description>&lt;P&gt;The section I'm asking about is in the default inputs.conf file.&amp;nbsp; It's on the last page of the attached pdf.&amp;nbsp; Thanks for your help.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Jul 2022 17:19:39 GMT</pubDate>
    <dc:creator>lutzmw</dc:creator>
    <dc:date>2022-07-21T17:19:39Z</dc:date>
    <item>
      <title>How to whitelist Windows Event IDs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606232#M105348</link>
      <description>&lt;P&gt;I need assistance with whitelisting as I can’t make it work.&amp;nbsp; I’m running the free trial version 9.0.0 of Splunk Enterprise. I have 1 Receiver (on a CentOS VM), and some Windows and CentOS systems (VM’s and physical devices) with the Universal Forwarder installed.&amp;nbsp; I’m getting data in from all my systems.&amp;nbsp; On the Windows systems I only need to see data from select Windows Security Log Events and would like to exclude all other log data/events.&amp;nbsp; I’ve read Splunk’s documentation about whitelisting and I guess I just don’t understand what I’m reading.&amp;nbsp; It doesn’t seem to be working as my license usage hasn’t decreased and/or I don’t know how to verify if it’s working.&lt;/P&gt;
&lt;P&gt;I created an &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; file in the following location:&amp;nbsp; &lt;STRONG&gt;/etc/system/local/&lt;/STRONG&gt; on the Universal Forwarders and its content is:&lt;/P&gt;
&lt;P&gt;[&lt;STRONG&gt;WinEventLog://Security]&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;whitelist=1100,1101,1102,4616,4624,4625,4634,4647,4648,4657,4704,4705,4719,4720,4722,4723,4724,4725,4726,4740,4767,4776,4777,4616&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Is this correct?&lt;/P&gt;
&lt;P&gt;Do I have to put the statement &lt;STRONG&gt;disabled = 0&lt;/STRONG&gt; or is it implied?&lt;/P&gt;
&lt;P&gt;I haven’t configured anything through Splunk web, do I need to do that?&lt;/P&gt;
&lt;P&gt;Where do I save the inputs.conf file?&amp;nbsp; On the Receiver only, on the Universal Forwarders only, or on both?&lt;/P&gt;
&lt;P&gt;Do I need to include all the statements from the default inputs.conf file in my new one?&lt;/P&gt;
&lt;P&gt;Besides decreased license usage, is there a way to know if my whitelist is working?&lt;/P&gt;
&lt;P&gt;Thank you for any and all help.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 15:27:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606232#M105348</guid>
      <dc:creator>lutzmw</dc:creator>
      <dc:date>2022-07-21T15:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: Help whitelisting Windows Event IDs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606292#M105350</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245143"&gt;@lutzmw&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;at first I hint to read&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/AboutWindowsdataandSplunk" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Data/AboutWindowsdataandSplunk&lt;/A&gt;&amp;nbsp;and search on the YouTube Splunk Channel some video that describes how to ingest windows data.&lt;/P&gt;&lt;P&gt;Anyway, at first, don't create any inputs.conf, but download and install both on Splunk Enterprise and Windows clients the Splunk_TA-Windows (&lt;A href="https://splunkbase.splunk.com/app/742/" target="_blank"&gt;https://splunkbase.splunk.com/app/742/&lt;/A&gt;) that was created just to input and parse windows logs.&lt;/P&gt;&lt;P&gt;You have only to enable (on the Forwarders) the Wineventlog:Security input: you can do this copying inputs.conf from default to local folder and changing (in local inputs.conf) disabled from 1 to 0 in the wineventlog:security stanza, and restart Splunk on forwarders at the end.&lt;/P&gt;&lt;P&gt;In this way, you'll have all wineventlogs correctly indexed and parsed.&lt;/P&gt;&lt;P&gt;Then, if you want to filter wineventlogs:security logs, you can use (in the Forwarder's local inputs.conf) whitelist or blacklist: you have to add a row to indicate the EventCodes to blacklist or whitelist.&lt;/P&gt;&lt;P&gt;For more infos about this see at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2022 06:48:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606292#M105350</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-07-20T06:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Help whitelisting Windows Event IDs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606512#M105371</link>
      <description>&lt;P&gt;Giuseppe,&lt;/P&gt;&lt;P&gt;Thanks for the response.&amp;nbsp; I haven't had a chance to try your solution but I should be able to try it soon.&amp;nbsp; At the bottom of the default inputs.conf file there's a section that I don't understand.&amp;nbsp; It says&amp;nbsp;&lt;STRONG&gt;# default single instance modular input restarts&lt;/STRONG&gt;.&amp;nbsp; Can you explain what this&amp;nbsp; is?&amp;nbsp; It also has a&amp;nbsp;&lt;STRONG&gt;[WinEventLog]&lt;/STRONG&gt; entry.&amp;nbsp; Is this where I make the change that's needed or do I place my whitelist further up in the file.&amp;nbsp; Thanks again&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 13:43:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606512#M105371</guid>
      <dc:creator>lutzmw</dc:creator>
      <dc:date>2022-07-21T13:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: Help whitelisting Windows Event IDs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606528#M105374</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245143"&gt;@lutzmw&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;sorry but I download the latest version of this TA and I didn't find the section you mentioned!&lt;/P&gt;&lt;P&gt;could you share it?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 14:55:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606528#M105374</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-07-21T14:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: Help whitelisting Windows Event IDs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606550#M105377</link>
      <description>&lt;P&gt;The section I'm asking about is in the default inputs.conf file.&amp;nbsp; It's on the last page of the attached pdf.&amp;nbsp; Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 17:19:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606550#M105377</guid>
      <dc:creator>lutzmw</dc:creator>
      <dc:date>2022-07-21T17:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: Help whitelisting Windows Event IDs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606624#M105381</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245143"&gt;@lutzmw&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;we're speaking of two different things:&lt;/P&gt;&lt;P&gt;I'm speaking of the last Splunk Add-On for Microsoft Windows (&lt;A href="https://splunkbase.splunk.com/app/742/" target="_blank"&gt;https://splunkbase.splunk.com/app/742/&lt;/A&gt;) and its last release is 8.5;&lt;/P&gt;&lt;P&gt;instead you're speaking of the inputs.conf in $SPLUNK_HOME/etc/system/default, in other words the default inputs.conf of Splunk.&lt;/P&gt;&lt;P&gt;This means that your file is the inputs.conf that you find by default in Splunk and the inputs you're speaking&amp;nbsp; are the modular inputs present by default in Splunk and that you can see in the GUI.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 08:40:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-whitelist-Windows-Event-IDs/m-p/606624#M105381</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-07-22T08:40:15Z</dc:date>
    </item>
  </channel>
</rss>

