<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How should the process name be designated for the blacklisting of Windows events? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669395#M112240</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;is this with quotes ?&lt;BR /&gt;&lt;SPAN&gt;blacklist5&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;EventCode&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"4688"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Message&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"(ParentProcessName.+Microsoft&amp;nbsp;Monitoring&amp;nbsp;Agent\\Agent\\MonitoringHost\.exe)"&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Tue, 21 Nov 2023 21:12:23 GMT</pubDate>
    <dc:creator>AL3Z</dc:creator>
    <dc:date>2023-11-21T21:12:23Z</dc:date>
    <item>
      <title>How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669345#M112229</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm uncertain which Process name—CreatorProcessName, ParentProcessName, or NewProcessName—is the appropriate one to apply windows events blacklisting in this context.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks..&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 15:06:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669345#M112229</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-21T15:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669364#M112231</link>
      <description>&lt;P&gt;Splunk supports none of those directly.&amp;nbsp; You'd have to use a regex on the Message field to filter on the desired process name.&amp;nbsp; The most likely candidate is NewProcessName, but that depends on what event(s) you're filtering.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 16:52:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669364#M112231</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-21T16:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669385#M112235</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;When I try to apply this blacklist it is not getting blacklisted even after applied matching regex pattern&amp;nbsp;&lt;BR /&gt;blacklist3 = EventCode="4688" Message="(?:ParentProcessName).+(?:Microsoft Monitoring Agent\\Agent\\MonitoringHost.exe)"&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://regex101.com/r/Jq2IKb/1" target="_blank"&gt;https://regex101.com/r/Jq2IKb/1&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;What changes do we need&amp;nbsp; here?&lt;BR /&gt;&lt;BR /&gt;Thanks..&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 19:05:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669385#M112235</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-21T19:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669387#M112237</link>
      <description>&lt;P&gt;I don't know why Splunk is not matching that event.&amp;nbsp; The regex looks good to me.&amp;nbsp; Perhaps try without the&amp;nbsp; groups?&amp;nbsp; It shouldn't matter, but perhaps it will and the groups are not necessary.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 19:57:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669387#M112237</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-21T19:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669390#M112238</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;&lt;BR /&gt;Can you pls give me and eg. for above regex with out group ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 20:27:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669390#M112238</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-21T20:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669392#M112239</link>
      <description>&lt;LI-CODE lang="markup"&gt;ParentProcessName.+Microsoft Monitoring Agent\\Agent\\MonitoringHost\.exe&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 21 Nov 2023 20:51:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669392#M112239</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-21T20:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669395#M112240</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;is this with quotes ?&lt;BR /&gt;&lt;SPAN&gt;blacklist5&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;EventCode&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"4688"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Message&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"(ParentProcessName.+Microsoft&amp;nbsp;Monitoring&amp;nbsp;Agent\\Agent\\MonitoringHost\.exe)"&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 21 Nov 2023 21:12:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669395#M112240</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-21T21:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669397#M112241</link>
      <description>&lt;P&gt;What format are you pulling the logs in? Traditional or XML?&lt;/P&gt;&lt;PRE&gt; * $XmlRegex: Use this key for filtering when you render Windows Event
    log events in XML by setting the 'renderXml' setting to "true". Search
    the online documentation for "Filter data in XML format with the
    XmlRegex key" for details.&lt;/PRE&gt;</description>
      <pubDate>Tue, 21 Nov 2023 21:19:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669397#M112241</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-11-21T21:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669398#M112242</link>
      <description>&lt;P&gt;You asked for a regex so that is what I gave you.&amp;nbsp; Add quotes and other text as necessary.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 21:20:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669398#M112242</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-21T21:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669409#M112245</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Can we make changes to the splunk ta windows app inputs.conf of&amp;nbsp; the deployment server ??&lt;/P&gt;&lt;P&gt;There was some configs messed up in the inputs.conf how we can restore to the previous configs ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks...&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 01:58:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669409#M112245</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-22T01:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669439#M112247</link>
      <description>&lt;P&gt;That's another question, completely unrelated to the original issue. See my response in this thread &lt;A href="https://community.splunk.com/t5/Deployment-Architecture/What-are-the-best-practices-for-creating-and-distributing-apps/m-p/668990" target="_blank"&gt;https://community.splunk.com/t5/Deployment-Architecture/What-are-the-best-practices-for-creating-and-distributing-apps/m-p/668990&lt;/A&gt; for managing apps.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 10:00:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669439#M112247</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-11-22T10:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669514#M112254</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we use the props and transforms to send the unwanted events to null queue aas the applied regex are not working!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 18:36:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669514#M112254</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-22T18:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669517#M112255</link>
      <description>&lt;P&gt;Yes, the indexers or heavy forwarders can use the regex to discard matching events.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 18:50:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669517#M112255</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-22T18:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669698#M112285</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;The regex I used seems effective, but it's unexpectedly blocking all my Windows security events. I've checked the regex, and I haven't specifically blacklisted any Windows executables. Could you assist me in analyzing the below list of blacklisted executables?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#&amp;nbsp;Copyright&amp;nbsp;(C)&amp;nbsp;2019&amp;nbsp;Splunk&amp;nbsp;Inc.&amp;nbsp;All&amp;nbsp;Rights&amp;nbsp;Reserved.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#&amp;nbsp;DO&amp;nbsp;NOT&amp;nbsp;EDIT&amp;nbsp;THIS&amp;nbsp;FILE!&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#&amp;nbsp;Please&amp;nbsp;make&amp;nbsp;all&amp;nbsp;changes&amp;nbsp;to&amp;nbsp;files&amp;nbsp;in&amp;nbsp;$SPLUNK_HOME/etc/apps/Splunk_TA_windows/local.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#&amp;nbsp;To&amp;nbsp;make&amp;nbsp;changes,&amp;nbsp;copy&amp;nbsp;the&amp;nbsp;section/stanza&amp;nbsp;you&amp;nbsp;want&amp;nbsp;to&amp;nbsp;change&amp;nbsp;from&amp;nbsp;$SPLUNK_HOME/etc/apps/Splunk_TA_windows/default&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#&amp;nbsp;into&amp;nbsp;../local&amp;nbsp;and&amp;nbsp;edit&amp;nbsp;there.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;DIV&gt;&lt;SPAN&gt;######&amp;nbsp;OS&amp;nbsp;Logs&amp;nbsp;######&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;DIV&gt;&lt;SPAN&gt;[WinEventLog://Security]&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;disabled&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;0&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;start_from&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;oldest&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;current_only&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;0&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;evt_resolve_ad_obj&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;1&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;checkpointInterval&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;5&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;blacklist1&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;EventCode&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"4662"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Message&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"Object&amp;nbsp;Type:(?!\s*(groupPolicyContainer|computer|user))"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;blacklist2&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;EventCode&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"5447|4634|5156|4663|4656|5152|5157|4658|4673|4661|4690|4932|4933|5158|4957|5136|4674|4660|4670|5058|5061|4985|4965"&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;blacklist3&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;EventCode&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"4688"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Message&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"(?:New&amp;nbsp;Process&amp;nbsp;Name:).+(?:SplunkUniversalForwarder\\bin\\splunk.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunkd.exe)|.+(?:SplunkUniversalForwarder\\bin\\btool.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-powershell.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-winprintmon.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-regmon.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-netmon.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-admon.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-MonitorNoHandle.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-winevtlog.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-perfmon.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunkd.exe)|.+(?:SplunkUniversalForwarder\\bin\\splunk-wmi.exe)|.+(?:Windows&amp;nbsp;Defender&amp;nbsp;Advanced&amp;nbsp;Threat&amp;nbsp;Protection\\SenseCncProxy.exe)|.+(?:Windows&amp;nbsp;Defender&amp;nbsp;Advanced&amp;nbsp;Threat&amp;nbsp;Protection\\SenseCM.exe)|.+(?:Windows&amp;nbsp;Defender&amp;nbsp;Advanced&amp;nbsp;Threat&amp;nbsp;Protection\\MsSense.exe)|.+(?:Microsoft\\Windows&amp;nbsp;Defender\\Platform\\.*\MsMpEng.exe)|.+(?:Microsoft\\Windows&amp;nbsp;Defender\\Platform\\.*\\MpCmdRun.exe)|.+(?:Microsoft\\Windows&amp;nbsp;Defender&amp;nbsp;Advanced&amp;nbsp;Threat&amp;nbsp;Protection\\Platform\\.*\\MsSense.exe)|.+(?:Microsoft\\Windows&amp;nbsp;Defender\\Platform\\.*\\MsMpEng.exe)|.+(?:Microsoft\\Windows&amp;nbsp;Defender&amp;nbsp;Advanced&amp;nbsp;Threat&amp;nbsp;Protection\Platform\.*\\SenseIR.exe)|.+(?:Microsoft\\Windows&amp;nbsp;Defender&amp;nbsp;Advanced&amp;nbsp;Threat&amp;nbsp;Protection\\DataCollection\\.*\\OpenHandleCollector.exe)|.+(?:ForeScout&amp;nbsp;SecureConnector\\SecureConnector.exe)|.+(?:Windows&amp;nbsp;Defender&amp;nbsp;Advanced&amp;nbsp;Threat&amp;nbsp;Protection\\SenseIR.exe)|.+(?:Rapid7\\Insight&amp;nbsp;Agent\\components\\insight_agent\\.*\\get_proxy.exe)|.+(?:Rapid7\\Insight&amp;nbsp;Agent\\components\\insight_agent\\.*\\ir_agent.exe|.+(?:Tanium\\Tanium&amp;nbsp;Client\\TaniumCX.exe)|.+(?:AzureConnectedMachineAgent\\GCArcService\\GC\\gc_worker.exe)|.+(?:AzureConnectedMachineAgent\\GCArcService\\GC\\gc_service.exe)|.+(?:WindowsPowerShell\\Modules\\gytpol\\Client\\fw.*\\GytpolClientFW.*.exe)|.+(?:AzureConnectedMachineAgent\\azcmagent.exe)|.+(?:Microsoft&amp;nbsp;Monitoring&amp;nbsp;Agent\\Agent\\MonitoringHost.exe)"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;blacklist4&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;EventCode&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"4688"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Message&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"(?:New&amp;nbsp;Process&amp;nbsp;Name:).+(?:Tanium\\Tanium&amp;nbsp;Client)"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;blacklist5&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;EventCode&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"4688"&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Message&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"(?:Creator&amp;nbsp;Process&amp;nbsp;Name:).+(?:Tanium\\Tanium&amp;nbsp;Client)"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;renderXml&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;true&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;index&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;es_winsec&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;&lt;DIV&gt;&lt;SPAN&gt;Thanks...&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 25 Nov 2023 09:10:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669698#M112285</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-25T09:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669702#M112286</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;#&amp;nbsp;DO&amp;nbsp;NOT&amp;nbsp;EDIT&amp;nbsp;THIS&amp;nbsp;FILE!&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;# Please make all changes to files in $SPLUNK_HOME/etc/apps/Splunk_TA_windows/local.&lt;BR /&gt;# To make changes, copy the section/stanza you want to change from $SPLUNK_HOME/etc/apps/Splunk_TA_windows/default&lt;BR /&gt;# into ../local and edit there.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Stop right there!&amp;nbsp; These comments are very important and yet you've chosen to ignore them by editing a file that should not be modified.&amp;nbsp; What other instructions have you disregarded?&lt;/P&gt;&lt;P&gt;The configs shown look good to me, but I am not familiar enough with Windows to know if there's something there that shouldn't be there or vice versa.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2023 13:09:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669702#M112286</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-25T13:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669709#M112287</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have made changes to local inputs.conf on this app and deployed it to over 3k servers so we need to move these configurations from local to default to get it work ?&lt;/P&gt;&lt;P&gt;Thanks..&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2023 19:35:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669709#M112287</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-25T19:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669711#M112288</link>
      <description>&lt;P&gt;It will work as it is, but it is poor practice.&amp;nbsp; Your changes will be lost the next time Splunk_TA_windows is upgraded.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2023 20:47:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669711#M112288</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-25T20:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669713#M112289</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Windows event log events are stored by Windows in a language-independent format. When using renderXml = true, Splunk does not forward the locale-specific message string. You can further optimize forwarder resource usage by also setting the suppress_* settings to true.&lt;/P&gt;&lt;P&gt;In the case of the security event log Microsoft-Windows-Security-Auditing provider/source, event identifier 4688 will have no Message field beginning with "A new process has been created." You must instead use whitelist and blacklist values that reference $XmlRegex and match against the raw XML event.&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-a5ba-3e3b0328c30d}" /&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime="2023-11-19T16:06:34.0318973Z" /&amp;gt;&amp;lt;EventRecordID&amp;gt;139624&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation /&amp;gt;&amp;lt;Execution ProcessID="4" ThreadID="344" /&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;titan&amp;lt;/Computer&amp;gt;&amp;lt;Security /&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name="SubjectUserSid"&amp;gt;S-1-5-18&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectUserName"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectDomainName"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name="SubjectLogonId"&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name="NewProcessId"&amp;gt;0x320&amp;lt;/Data&amp;gt;&amp;lt;Data Name="NewProcessName"&amp;gt;C:\Windows\System32\lsass.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name="TokenElevationType"&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ProcessId"&amp;gt;0x1c8&amp;lt;/Data&amp;gt;&amp;lt;Data Name="CommandLine" /&amp;gt;&amp;lt;Data Name="TargetUserSid"&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&amp;lt;Data Name="TargetUserName"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name="TargetDomainName"&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name="TargetLogonId"&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name="ParentProcessName"&amp;gt;C:\Windows\System32\wininit.exe&amp;lt;/Data&amp;gt;&amp;lt;Data Name="MandatoryLabel"&amp;gt;S-1-16-16384&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;The raw XML event contains a series of &amp;lt;Data&amp;gt; elements, one of which is &amp;lt;Data Name="NewProcessName"&amp;gt;. To exclude a specific NewProcessName value, e.g. C:\Windows\System32\lsass.exe, we can construct a blacklist value using the $XmlRegex key. I'll use percent (%) as the regular expression delimiter. You can use one $XmlRegex key to match multiple parts of the raw XML or multiple $XmlRegex keys to make your matches easier to maintain. I've used three $XmlRegex keys to match the Provider, EventID, and Data elements:&lt;/P&gt;&lt;PRE&gt;blacklist3 = $XmlRegex=%&amp;lt;Provider[^&amp;gt;]+Name="Microsoft-Windows-Security-Auditing"% $XmlRegex=%&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;% $XmlRegex=%&amp;lt;Data Name="NewProcessName"&amp;gt;C:\\Windows\\System32\\lsass\.exe&amp;lt;\/Data&amp;gt;%&lt;/PRE&gt;&lt;P&gt;Note that I've included the provider/source because &lt;EM&gt;all Windows events are uniquely identified by a three-tuple of log, provider/source, and event identifier,&lt;/EM&gt; e.g. Security, Microsoft-Windows-Security-Auditing, and 4688.&lt;/P&gt;&lt;P&gt;You can add additional processes to your blacklist by using a regular expression group construct within the NewProcessName match:&lt;/P&gt;&lt;PRE&gt;blacklist3 = $XmlRegex=%&amp;lt;Provider[^&amp;gt;]+Name="Microsoft-Windows-Security-Auditing"% $XmlRegex=%&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;% $XmlRegex=%&amp;lt;Data Name="NewProcessName"&amp;gt;(C:\\Windows\\System32\\lsass\.exe|C:\\Program Files\\MyApp\\MyProgram\.exe)&amp;lt;\/Data&amp;gt;%&lt;/PRE&gt;&lt;P&gt;This setting would be added to C:\Program Files\SplunkUniversalForwarder\etc\apps\Splunk_TA_windows\local\inputs.conf.&lt;/P&gt;&lt;P&gt;Note that the default blacklist1 and blacklist2 values provided by Splunk Add-on for Windows do not work when renderXML = true, so we'll modify those as well. I did not include the provider in the modifications; it's a direct translation of the default.&lt;/P&gt;&lt;PRE&gt;[WinEventLog://Security]&lt;BR /&gt;disabled = 0&lt;BR /&gt;start_from = oldest&lt;BR /&gt;current_only = 0&lt;BR /&gt;evt_resolve_ad_obj = 1&lt;BR /&gt;checkpointInterval = 5&lt;BR /&gt;renderXml = true&lt;BR /&gt;suppress_keywords = true&lt;BR /&gt;suppress_opcode = true&lt;BR /&gt;suppress_sourcename = true&lt;BR /&gt;suppress_task = true&lt;BR /&gt;suppress_text = true&lt;BR /&gt;suppress_type = true&lt;BR /&gt;blacklist1 = $XmlRegex=%&amp;lt;EventID&amp;gt;4662&amp;lt;\/EventID&amp;gt;% $XmlRegex=%&amp;lt;Data Name="ObjectType"&amp;gt;(?!\s*groupPolicyContainer)%&lt;BR /&gt;blacklist2 = $XmlRegex=%&amp;lt;EventID&amp;gt;566&amp;lt;\/EventID&amp;gt;% $XmlRegex=%&amp;lt;Data Name="ObjectType"&amp;gt;(?!\s*groupPolicyContainer)%&lt;BR /&gt;blacklist3 = $XmlRegex=%&amp;lt;Provider[^&amp;gt;]+Name="Microsoft-Windows-Security-Auditing"% $XmlRegex=%&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;% $XmlRegex=%&amp;lt;Data Name="NewProcessName"&amp;gt;(C:\\Windows\\System32\\lsass\.exe|C:\\Program Files\\MyApp\\MyProgram\.exe)&amp;lt;\/Data&amp;gt;%&lt;/PRE&gt;&lt;P&gt;Deploy inputs.conf and restart Splunk Universal Forwarder using your configuration management tool of choice, e.g. a Splunk deployment server.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2023 21:09:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669713#M112289</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2023-11-25T21:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669721#M112290</link>
      <description>&lt;P&gt;For reference:&lt;/P&gt;&lt;P&gt;1. Microsoft Corporation. "About Event Logging." &lt;EM&gt;Windows App Development&lt;/EM&gt;, 7 January 2021, &lt;A href="https://learn.microsoft.com/en-us/windows/win32/eventlog/about-event-logging" target="_self"&gt;https://learn.microsoft.com/en-us/windows/win32/eventlog/about-event-logging&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;2. Splunk Inc. "inputs.conf Event Log allow list and deny list formats." &lt;EM&gt;Splunk Enterprise Admin Manual&lt;/EM&gt;, 16 November 2023, &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf#Event_Log_allow_list_and_deny_list_formats" target="_self"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Admin/Inputsconf#Event_Log_allow_list_and_deny_list_formats&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Nov 2023 01:33:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669721#M112290</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2023-11-26T01:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: How should the process name be designated for the blacklisting of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669770#M112299</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/49493"&gt;@tscroggins&lt;/a&gt;&amp;nbsp; &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp; &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;&lt;BR /&gt;In this below sample event&amp;nbsp; the&amp;nbsp;&lt;FONT color="#FF0000"&gt;C:\Program Files (x86)\Tanium\Tanium Client\TaniumClient.exe&lt;/FONT&gt; appears in both ParentParentName and NewProcessName, we might need a specialized handling. Would you like help with a xml regex pattern to cover these conditions?&lt;/P&gt;&lt;P&gt;&amp;lt;Event xmlns='&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank" rel="noopener"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-A5BA-3E3B0328C30D}'/&amp;gt;&amp;lt;EventID&amp;gt;4688&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;13312&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2023-11-27T08:18:13.998467800Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;151265209&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation/&amp;gt;&amp;lt;Execution ProcessID='4' ThreadID='11116'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;xxvy.com&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;NT AUTHORITY\SYSTEM&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;Admin$&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt;EC&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x3e7&amp;lt;/Data&amp;gt;&amp;lt;Data Name='NewProcessId'&amp;gt;0x3978&amp;lt;/Data&amp;gt;&amp;lt;&lt;FONT color="#FF0000"&gt;Data Name='NewProcessName'&amp;gt;C:\Program Files (x86)\Tanium\Tanium Client\TaniumClient.exe&amp;lt;/Data&lt;/FONT&gt;&amp;gt;&amp;lt;Data Name='TokenElevationType'&amp;gt;%%1936&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x2f80&amp;lt;/Data&amp;gt;&amp;lt;Data Name='CommandLine'&amp;gt;&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;NULL SID&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;&lt;FONT color="#FF0000"&gt;Data Name='ParentProcessName'&amp;gt;C:\Program Files (x86)\Tanium\Tanium Client\TaniumClient.exe&amp;lt;/Data&amp;gt;&lt;/FONT&gt;&amp;lt;Data Name='MandatoryLabel'&amp;gt;Mandatory Label\System Mandatory Level&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;&lt;BR /&gt;&lt;BR /&gt;Can we use like this ?&lt;BR /&gt;&lt;BR /&gt;blacklist4 = $XmlRegex=%&amp;lt;Provider[^&amp;gt;]+Name="Microsoft-Windows-Security-Auditing"% &lt;FONT color="#000000"&gt;$XmlRegex=%&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;% $XmlRegex=%&amp;lt;Data Name="NewProcessName"&amp;gt;(C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumClient\.exe)&amp;lt;\/Data&amp;gt;%&lt;BR /&gt;&lt;BR /&gt;blacklist5= $XmlRegex=%&amp;lt;Provider[^&amp;gt;]+Name="Microsoft-Windows-Security-Auditing"% $XmlRegex=%&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;% $XmlRegex=%&amp;lt;Data Name="ParentProcessName"&amp;gt;(C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumClient\.exe)&amp;lt;\/Data&amp;gt;%&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 08:47:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-should-the-process-name-be-designated-for-the-blacklisting/m-p/669770#M112299</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-11-27T08:47:52Z</dc:date>
    </item>
  </channel>
</rss>

