<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blacklisting in [WinEventLog://Security] in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634561#M108584</link>
    <description>&lt;P&gt;Thanks for the suggestions however none of them work - i have tried both of those as well as various other options combinations - with and without quotes on the eventcode and on the keywords statement&lt;/P&gt;&lt;PRE&gt;blacklist = EventCode=4673 Keywords=Audit\sFailure&lt;/PRE&gt;&lt;PRE&gt;blacklist = EventCode=4673.*Keywords=Audit Failure&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what i have discovered is that I can blacklist the entire event easily enough by using&amp;nbsp;&lt;/P&gt;&lt;P&gt;blacklist = EventCode="4673"&lt;/P&gt;&lt;P&gt;but when i try to blacklist the event without quotes it doesnt work.&lt;/P&gt;&lt;P&gt;However I would like to keep the successful events in splunk - has anyone else managed this and is willing to share their configuration?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Mar 2023 12:13:24 GMT</pubDate>
    <dc:creator>nick_currie</dc:creator>
    <dc:date>2023-03-15T12:13:24Z</dc:date>
    <item>
      <title>Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634522#M108575</link>
      <description>&lt;P&gt;Im looking to drop EventID 4673 where the action=failure&lt;/P&gt;&lt;P&gt;Here is an example log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;3/15/2023&lt;/SPAN&gt; &lt;SPAN class=""&gt;02:51:42&lt;/SPAN&gt; &lt;SPAN class=""&gt;PM&lt;/SPAN&gt; &lt;SPAN class=""&gt;LogName=Security&lt;/SPAN&gt; &lt;SPAN class=""&gt;EventCode=4673&lt;/SPAN&gt; &lt;SPAN class=""&gt;EventType=0&lt;/SPAN&gt; &lt;SPAN class=""&gt;ComputerName=redacted&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;SourceName=Microsoft&lt;/SPAN&gt; &lt;SPAN class=""&gt;Windows&lt;/SPAN&gt; &lt;SPAN class=""&gt;security&lt;/SPAN&gt; &lt;SPAN class=""&gt;auditing.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Type=Information&lt;/SPAN&gt; &lt;SPAN class=""&gt;RecordNumber=redacted&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Keywords=Audit&lt;/SPAN&gt; &lt;SPAN class=""&gt;Failure&lt;/SPAN&gt; &lt;SPAN class=""&gt;TaskCategory=Sensitive&lt;/SPAN&gt; &lt;SPAN class=""&gt;Privilege&lt;/SPAN&gt; &lt;SPAN class=""&gt;Use&lt;/SPAN&gt; &lt;SPAN class=""&gt;OpCode=Info&lt;/SPAN&gt; &lt;SPAN class=""&gt;Message=A&lt;/SPAN&gt; &lt;SPAN class=""&gt;privileged&lt;/SPAN&gt; &lt;SPAN class=""&gt;service&lt;/SPAN&gt; &lt;SPAN class=""&gt;was&lt;/SPAN&gt; &lt;SPAN class=""&gt;called.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Subject:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Security&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;redacted&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;redacted&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Domain:&lt;/SPAN&gt; &lt;SPAN class=""&gt;redacted&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;redacted&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Service:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Server:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Security&lt;/SPAN&gt; &lt;SPAN class=""&gt;Service&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Process:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Process&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt;&amp;nbsp;xxxxx&amp;nbsp;&lt;SPAN class=""&gt;Process&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;C:\Windows\System32\backgroundTaskHost.exe&lt;/SPAN&gt; &lt;SPAN class=""&gt;Service&lt;/SPAN&gt; &lt;SPAN class=""&gt;Request&lt;/SPAN&gt; &lt;SPAN class=""&gt;Information:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Privileges:&lt;/SPAN&gt; &lt;SPAN class=""&gt;SeTcbPrivilege&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;From reading&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.6/Admin/Inputsconf?_ga=2.40401506.1999669205.1678852413-817152181.1624861549&amp;amp;_gl=1*s1kmhp*_ga*ODE3MTUyMTgxLjE2MjQ4NjE1NDk.*_ga_5EPM2P39FV*MTY3ODg2MDY5OS44Ni4xLjE2Nzg4NjA3NjAuNjAuMC4w#Event_Log_allow_list_and_deny_list_formats&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I can see that action is not a valid field to filter on?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;# Valid keys for the key=regex format:

* The following keys are equivalent to the fields that appear in the text of
  the acquired events:
  * Category, CategoryString, ComputerName, EventCode, EventType, Keywords,
    LogName, Message, OpCode, RecordNumber, Sid, SidType, SourceName,
    TaskCategory, Type, User&lt;/PRE&gt;&lt;P&gt;&lt;SPAN class=""&gt;So i chose to use Keywords which has the value&amp;nbsp;Audit Failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Here is my inputs.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------------&lt;/P&gt;&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;disabled = 0&lt;BR /&gt;index=corp_oswinsec&lt;BR /&gt;current_only=1&lt;BR /&gt;evt_resolve_ad_obj=0&lt;BR /&gt;checkpointInterval = 5&lt;/P&gt;&lt;P&gt;blacklist1 = EventCode="4673" Keywords="Audit Failure"&lt;/P&gt;&lt;P&gt;--------------------------------&lt;/P&gt;&lt;P&gt;I am still seeing these events being indexed however - any tips on where i am going wrong would be much appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 07:11:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634522#M108575</guid>
      <dc:creator>nick_currie</dc:creator>
      <dc:date>2023-03-15T07:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634527#M108576</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/244274"&gt;@nick_currie&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;to blacklist events you can use more approaches in wineventlog:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist = &amp;lt;comma-separated list&amp;gt; | key=regex [key=regex]&lt;/LI-CODE&gt;&lt;P&gt;if you have more fields, I'd prefer to use a regex&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist = EventCode=4673.*Keywords=Audit Failure&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 07:22:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634527#M108576</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-03-15T07:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634536#M108579</link>
      <description>&lt;P&gt;Specifying regexes for white/blacklisting can be a PITA sometimes. Instead of&lt;/P&gt;&lt;PRE&gt;EventCode="4673" Keywords="Audit Failure"&lt;/PRE&gt;&lt;P&gt;Try&lt;/P&gt;&lt;PRE&gt;EventCode=4673 Keywords=Audit\sFailure&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;In your case quotes are interpreted as parts of regexes so if your values don't contain them, they're not getting filtered out.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 09:01:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634536#M108579</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-03-15T09:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634561#M108584</link>
      <description>&lt;P&gt;Thanks for the suggestions however none of them work - i have tried both of those as well as various other options combinations - with and without quotes on the eventcode and on the keywords statement&lt;/P&gt;&lt;PRE&gt;blacklist = EventCode=4673 Keywords=Audit\sFailure&lt;/PRE&gt;&lt;PRE&gt;blacklist = EventCode=4673.*Keywords=Audit Failure&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what i have discovered is that I can blacklist the entire event easily enough by using&amp;nbsp;&lt;/P&gt;&lt;P&gt;blacklist = EventCode="4673"&lt;/P&gt;&lt;P&gt;but when i try to blacklist the event without quotes it doesnt work.&lt;/P&gt;&lt;P&gt;However I would like to keep the successful events in splunk - has anyone else managed this and is willing to share their configuration?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 12:13:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634561#M108584</guid>
      <dc:creator>nick_currie</dc:creator>
      <dc:date>2023-03-15T12:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634567#M108585</link>
      <description>&lt;P&gt;Further testing has shown i can filter with regex on the Message field - such as this to filter out any msedge events.&lt;BR /&gt;&lt;SPAN&gt;blacklist = EventCode="4673" Message=".*Edge"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The issue is that the Message field does not contain whether it is successful or not. That information is only within the Keywords field of the fields that the UF is supposed to be able to blacklist with.. Is this a bug or do I need to do this another way? I dont want to have to send all of this traffic back to a HF to filter it as we have some mobile devices that send logs directly to splunk cloud so as not to require the VPN.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 12:45:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634567#M108585</guid>
      <dc:creator>nick_currie</dc:creator>
      <dc:date>2023-03-15T12:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634574#M108586</link>
      <description>&lt;P&gt;I'm not sure I follow. If the Success/Failure value is stored in Keywords field, you can't match against it on Message field.&lt;/P&gt;&lt;P&gt;In such case you should match on&lt;/P&gt;&lt;PRE&gt;EventCode=4673 Keywords=Failure&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 12:48:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634574#M108586</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-03-15T12:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634603#M108587</link>
      <description>&lt;P&gt;No what i mean is that the regex does not seem to work for me on the Keywords field. Have you tried?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 14:47:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634603#M108587</guid>
      <dc:creator>nick_currie</dc:creator>
      <dc:date>2023-03-15T14:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634626#M108589</link>
      <description>&lt;P&gt;No.&amp;nbsp; I "misadvised" you. I forgot that indeed the regex must be surrounded by something (and since you used a quote, I mistook it with the typical mistake in props.conf).&lt;/P&gt;&lt;P&gt;Yes, the regex must be surrounded by something so that the UF can properly find where the spearate regexes start and end.&lt;/P&gt;&lt;P&gt;So it turns out it should be done like this:&lt;/P&gt;&lt;PRE&gt;EventCode="4673" Keywords="Failure"&lt;/PRE&gt;&lt;P&gt;or&lt;/P&gt;&lt;PRE&gt;EventCode=%4673% Keywords=%Failure%&lt;/PRE&gt;&lt;P&gt;or&lt;/P&gt;&lt;PRE&gt;EventCode=*4673* Keywords=/Failure/&lt;/PRE&gt;&lt;P&gt;...&lt;/P&gt;</description>
      <pubDate>Wed, 15 Mar 2023 17:14:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634626#M108589</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-03-15T17:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting in [WinEventLog://Security]</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634751#M108620</link>
      <description>&lt;P&gt;Ok thanks Rick - What worked for this was&lt;/P&gt;&lt;PRE&gt;EventCode="4673" Keywords=".*Failure"&lt;/PRE&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 09:44:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Blacklisting-in-WinEventLog-Security/m-p/634751#M108620</guid>
      <dc:creator>nick_currie</dc:creator>
      <dc:date>2023-03-16T09:44:16Z</dc:date>
    </item>
  </channel>
</rss>

