<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blacklisting specific events on Universal Forwarder in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-events-on-universal-forwarder/m-p/647005#M110020</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Are you using the option to render events as Xml in your inputs.conf file? (renderXml=true)&lt;/P&gt;&lt;P&gt;If this is the case, I would recommend you to use the &lt;STRONG&gt;$XmlRegex&lt;/STRONG&gt; in your blacklist.&lt;/P&gt;&lt;P&gt;Something like following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist1=$XmlRegex=&amp;lt;EventID&amp;gt;4688|&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd\.exe&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The regex above matches &lt;STRONG&gt;Event ID&lt;/STRONG&gt; 4688 or &lt;STRONG&gt;ParentProcessName&lt;/STRONG&gt; "C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd\.exe"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jun 2023 16:23:58 GMT</pubDate>
    <dc:creator>caiosalonso</dc:creator>
    <dc:date>2023-06-14T16:23:58Z</dc:date>
    <item>
      <title>How to blacklist specific events on universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-events-on-universal-forwarder/m-p/646953#M110015</link>
      <description>&lt;P&gt;Hello, community,&lt;/P&gt;
&lt;P&gt;I need help reducing Events containing 4688 and ParentProcessName=*splunkd.exe&lt;/P&gt;
&lt;P&gt;There is an excerpt from the log:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;&amp;lt;Event xmlns='&lt;/SPAN&gt;&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank" rel="noopener nofollow noreferrer"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid=' XXXXXXXX -4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2023-06-13T10:39:41.797279900Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;12536409&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='4' ThreadID='15216'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt; XXXXXXXX &amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;XXXXXXXX&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt; XXXXXXXX &amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0 XXXXXXXX 7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessId'&amp;gt;0x2734&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunk-MonitorNoHandle.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x17d4&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name='MandatoryLabel'&amp;gt;XXXXXXXX -16384&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can anyone help me create the appropriate regex I can use within the SEDCMD?&lt;/P&gt;
&lt;P&gt;After the reduction the above event the result I am after should look something like this:&amp;nbsp;&lt;SPAN&gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe&amp;lt;/Data&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;---------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I currently use:&amp;nbsp;blacklist1 = EventCode="4688" | ParentProcessName="(.*/ParentProcessName \= C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd\.exe)"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 18:00:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-events-on-universal-forwarder/m-p/646953#M110015</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2023-06-15T18:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting specific events on Universal Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-events-on-universal-forwarder/m-p/647005#M110020</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Are you using the option to render events as Xml in your inputs.conf file? (renderXml=true)&lt;/P&gt;&lt;P&gt;If this is the case, I would recommend you to use the &lt;STRONG&gt;$XmlRegex&lt;/STRONG&gt; in your blacklist.&lt;/P&gt;&lt;P&gt;Something like following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist1=$XmlRegex=&amp;lt;EventID&amp;gt;4688|&amp;lt;Data Name='ParentProcessName'&amp;gt;C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd\.exe&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The regex above matches &lt;STRONG&gt;Event ID&lt;/STRONG&gt; 4688 or &lt;STRONG&gt;ParentProcessName&lt;/STRONG&gt; "C:\\Program Files\\SplunkUniversalForwarder\\bin\\splunkd\.exe"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 16:23:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-events-on-universal-forwarder/m-p/647005#M110020</guid>
      <dc:creator>caiosalonso</dc:creator>
      <dc:date>2023-06-14T16:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting specific events on Universal Forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-events-on-universal-forwarder/m-p/697817#M115738</link>
      <description>&lt;P&gt;I used&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[WinEventLog://Security]
checkpointInterval = 5
current_only = 0
disabled = 0
blacklist1 = EventCode="4688" Message="New Process Name: (?i)(?:[C-F]:\Program Files\Splunk(?:UniversalForwarder)?\bin\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi)).exe)"
start_from = oldest&lt;/LI-CODE&gt;
&lt;P&gt;but it stops all 4688,&amp;nbsp; like not process other information&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 10:18:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-events-on-universal-forwarder/m-p/697817#M115738</guid>
      <dc:creator>Araton71</dc:creator>
      <dc:date>2024-08-30T10:18:33Z</dc:date>
    </item>
  </channel>
</rss>

