<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wineventlog blacklist not working in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/588926#M106114</link>
    <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp; i have a similar issue and i am trying to Blacklist the eventCode 4662 on universal forwarder except when AccountName!=*$ Accessmask= 0x100&lt;BR /&gt;&lt;BR /&gt;Sample Log&lt;BR /&gt;LogName=Security&lt;BR /&gt;SourceName=Microsoft Windows security auditing.&lt;BR /&gt;EventCode=4662&lt;BR /&gt;EventType=0&lt;BR /&gt;Type=Information&lt;BR /&gt;ComputerName=xxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;TaskCategory=Directory Service Access&lt;BR /&gt;OpCode=Info&lt;BR /&gt;RecordNumber=1079080612&lt;BR /&gt;Keywords=Audit Success&lt;BR /&gt;Message=An operation was performed on an object.&lt;/P&gt;&lt;P&gt;Subject :&lt;BR /&gt;Security ID: xx\Axxxxx&lt;BR /&gt;Account Name: Axxxxx&lt;BR /&gt;Account Domain: xxxx&lt;BR /&gt;Logon ID: xxxxxxxx&lt;/P&gt;&lt;P&gt;Object:&lt;BR /&gt;Object Server: DS&lt;BR /&gt;Object Type: computer&lt;BR /&gt;Object Name: CN=YDxxxx,OU=xxxxx,OU=xxxx,OU=xxxxx,DC=xxxx,DC=xxxx,DC=xxx&lt;BR /&gt;Handle ID: 0x0&lt;/P&gt;&lt;P&gt;Operation:&lt;BR /&gt;Operation Type: Object Access&lt;BR /&gt;Accesses: Control Access&lt;BR /&gt;&lt;BR /&gt;Access Mask: 0x100&lt;BR /&gt;Properties: Control Access&lt;BR /&gt;Default Property Set&lt;BR /&gt;ms-Mcs-AdmPwd&lt;BR /&gt;computer&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Additional Information:&lt;BR /&gt;Parameter 1: -&lt;BR /&gt;Parameter 2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;I tried multiple regex and didnt work in my inputs.conf&lt;BR /&gt;&lt;BR /&gt;1)&amp;nbsp;blacklist1 = EventCode="4662"&amp;nbsp; Message="(Object Type:(?=\s*groupPolicyContainer))&lt;BR /&gt;[\s\S]*((Properties:(?=[\s\S]*Default Property Set(.*)\s*ms-Mcs-AdmPwd))(Access Mask:(?=[\s\S]*0x100)))"&lt;BR /&gt;&lt;BR /&gt;2)&amp;nbsp;blacklist1 = EventCode="4662" Message="(?ms)Account\sName:[\s\S]*\$*Access\sMask:[\s\S]+0x(0$|1$|2$|20$)"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 14 Mar 2022 13:04:25 GMT</pubDate>
    <dc:creator>despoilerr</dc:creator>
    <dc:date>2022-03-14T13:04:25Z</dc:date>
    <item>
      <title>How to blacklist EventCode 5145 with Wineventlog?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/548136#M106112</link>
      <description>&lt;P&gt;I am trying to blacklist EventCode 5145 with specific message and it is not working.&lt;BR /&gt;&lt;BR /&gt;Example Event:&lt;/P&gt;
&lt;P&gt;LogName=Security&lt;BR /&gt;SourceName=Microsoft-Windows-Security-Auditing&lt;BR /&gt;EventCode=5145&lt;BR /&gt;EventType=4&lt;BR /&gt;Type=Success Audit&lt;BR /&gt;ComputerName=xxxx&lt;BR /&gt;Category=11111&lt;BR /&gt;CategoryString=none&lt;BR /&gt;RecordNumber=xxxx&lt;BR /&gt;Message=A network share object was checked to see whether client can be granted desired access.&lt;BR /&gt;&lt;BR /&gt;Subject:&lt;BR /&gt;Security ID:&amp;nbsp;&lt;BR /&gt;Account Name:&amp;nbsp;&lt;BR /&gt;Account Domain:&amp;nbsp;&lt;BR /&gt;Logon ID:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Network Information:&lt;BR /&gt;Object Type: File&lt;BR /&gt;Source Address:&amp;nbsp;&lt;BR /&gt;Source Port:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Share Information:&lt;BR /&gt;Share Name:&amp;nbsp;&lt;BR /&gt;Share Path: \&lt;BR /&gt;Relative Target Name: x.dxmdg.com\Policies\{123456789456456456454654464546464558655}\Machine\Preferences\Registry\Registry.xml&lt;/P&gt;
&lt;P&gt;Access Request Information:&lt;BR /&gt;Access Mask:&amp;nbsp;&lt;BR /&gt;Accesses:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Access Check Results:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With below blacklist and it is not working&lt;BR /&gt;blacklist4 = EventCode="5145" Message="Relative Target Name:\s.+Registry.xml"&lt;/P&gt;
&lt;P&gt;Please provide some suggestions&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 13:26:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/548136#M106112</guid>
      <dc:creator>sun1000</dc:creator>
      <dc:date>2022-03-14T13:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: Wineventlog blacklist not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/548142#M106113</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/158577"&gt;@sun1000&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;in blacklist and whitelist options, you have to use a regex not only insert your conditions.&lt;/P&gt;&lt;P&gt;So please find the correct regex and try something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "(?ms)EventCode\=5145.*Message\=Relative Target Name:\s.+Registry\.xml"&lt;/LI-CODE&gt;&lt;P&gt;You can see a similar regex at&amp;nbsp;&lt;A href="https://regex101.com/r/7HVoS2/1" target="_blank"&gt;https://regex101.com/r/7HVoS2/1&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 06:27:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/548142#M106113</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2021-04-16T06:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: Wineventlog blacklist not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/588926#M106114</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp; i have a similar issue and i am trying to Blacklist the eventCode 4662 on universal forwarder except when AccountName!=*$ Accessmask= 0x100&lt;BR /&gt;&lt;BR /&gt;Sample Log&lt;BR /&gt;LogName=Security&lt;BR /&gt;SourceName=Microsoft Windows security auditing.&lt;BR /&gt;EventCode=4662&lt;BR /&gt;EventType=0&lt;BR /&gt;Type=Information&lt;BR /&gt;ComputerName=xxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;TaskCategory=Directory Service Access&lt;BR /&gt;OpCode=Info&lt;BR /&gt;RecordNumber=1079080612&lt;BR /&gt;Keywords=Audit Success&lt;BR /&gt;Message=An operation was performed on an object.&lt;/P&gt;&lt;P&gt;Subject :&lt;BR /&gt;Security ID: xx\Axxxxx&lt;BR /&gt;Account Name: Axxxxx&lt;BR /&gt;Account Domain: xxxx&lt;BR /&gt;Logon ID: xxxxxxxx&lt;/P&gt;&lt;P&gt;Object:&lt;BR /&gt;Object Server: DS&lt;BR /&gt;Object Type: computer&lt;BR /&gt;Object Name: CN=YDxxxx,OU=xxxxx,OU=xxxx,OU=xxxxx,DC=xxxx,DC=xxxx,DC=xxx&lt;BR /&gt;Handle ID: 0x0&lt;/P&gt;&lt;P&gt;Operation:&lt;BR /&gt;Operation Type: Object Access&lt;BR /&gt;Accesses: Control Access&lt;BR /&gt;&lt;BR /&gt;Access Mask: 0x100&lt;BR /&gt;Properties: Control Access&lt;BR /&gt;Default Property Set&lt;BR /&gt;ms-Mcs-AdmPwd&lt;BR /&gt;computer&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Additional Information:&lt;BR /&gt;Parameter 1: -&lt;BR /&gt;Parameter 2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;I tried multiple regex and didnt work in my inputs.conf&lt;BR /&gt;&lt;BR /&gt;1)&amp;nbsp;blacklist1 = EventCode="4662"&amp;nbsp; Message="(Object Type:(?=\s*groupPolicyContainer))&lt;BR /&gt;[\s\S]*((Properties:(?=[\s\S]*Default Property Set(.*)\s*ms-Mcs-AdmPwd))(Access Mask:(?=[\s\S]*0x100)))"&lt;BR /&gt;&lt;BR /&gt;2)&amp;nbsp;blacklist1 = EventCode="4662" Message="(?ms)Account\sName:[\s\S]*\$*Access\sMask:[\s\S]+0x(0$|1$|2$|20$)"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 13:04:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/588926#M106114</guid>
      <dc:creator>despoilerr</dc:creator>
      <dc:date>2022-03-14T13:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Wineventlog blacklist not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/613137#M106115</link>
      <description>&lt;P&gt;Were you ever able to figure this out? I'm having the exact same issue trying to filter 4662 while allowing the group policy AND LAPS logs.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2022 18:47:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/613137#M106115</guid>
      <dc:creator>bursteinb</dc:creator>
      <dc:date>2022-09-14T18:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist EventCode 5145 with Wineventlog?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/613166#M106116</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please try below? I used the filter as blacklist3 because Windows TA already has blacklist1 ve blacklist2.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist3= EventCode="4662" Message="(?ms)Account\sName:[\s\S]+\$.*Access\sMask:[\s\S]+0x100"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 03:59:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/613166#M106116</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2022-09-15T03:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist EventCode 5145 with Wineventlog?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/613226#M106117</link>
      <description>&lt;P&gt;I appreciate the assistance but unfortunately that's not working. When applied, it looks like it's blocking only Access Mask 0x100 which is what the LAPS events fall under.&lt;/P&gt;&lt;P&gt;I had been considering compromising and allowing all 0x100 though, and I tried that a few different ways, but it seems like no matter what I try if I do ANY blacklisting of EventCode 4662 of any kind, the LAPS logs won't show up. When allowing 0x100, other 0x100 logs show up but the LAPS ones do not for some reason. When I remove any 4662 blacklists, they start showing up again.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 13:30:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-EventCode-5145-with-Wineventlog/m-p/613226#M106117</guid>
      <dc:creator>bursteinb</dc:creator>
      <dc:date>2022-09-15T13:30:46Z</dc:date>
    </item>
  </channel>
</rss>

