<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Assistance Needed: Reformatting Provided Events to Match Structure of 'blacklist3' in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Assistance-Needed-Reformatting-Provided-Events-to-Match/m-p/670518#M112433</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is it possible for someone to aid me in reformatting the given events to align with the structure present in blacklist3, organizing them into their respective blacklists or potentially amalgamating them into a unified blacklist?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;blacklist3 = $XmlRegex="&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;.*&amp;lt;Data Name=('NewProcessName'|'ParentProcessName')&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Tanium&amp;nbsp; Events:&lt;/P&gt;&lt;P&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\Tools\\StdUtils\\TaniumExecWrapper\.exe|&lt;BR /&gt;C:\\Program Files (\x86\)\\Tanium\\Tanium Client\\Patch\\tools\\TaniumExecWrapper\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumClient\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\Patch\\tools\\TaniumFileInfo\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumCX\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\python38\\TPython\.exe|&lt;BR /&gt;C:\Program Files (x86)\Tanium\Tanium Client\Tools\Patch\7za.exe&lt;/P&gt;&lt;P&gt;Windows defender:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseCM.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender\Platform\.*\MpCmdRun.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender\Platform\.*\MsMpEng.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection\.*\OpenHandleCollector.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseNdr.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\.*\SenseCM.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\.*\SenseIR.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\.*\MsSense.exe&lt;BR /&gt;C:\Program Files\Windows Defender\MpCmdRun.exe&lt;BR /&gt;C:\Program Files\Windows Defender\MsMpEng.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseTVM.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\10.8560.25364.1036\SenseTVM.exe&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Rapid7&lt;/P&gt;&lt;P&gt;ParentProcessName count&lt;BR /&gt;C:\Program Files\Rapid7\Insight Agent\components\insight_agent\3.2.4.63\ir_agent.exe&lt;BR /&gt;C:\Program Files\Rapid7\Insight Agent\components\insight_agent\4.0.0.1\ir_agent.exe&lt;BR /&gt;C:\Program Files\Rapid7\Insight Agent\ir_agent.exe&lt;BR /&gt;C:\\Program Files\\Rapid7\\Insight Agent\\components\\insight_agent\\.*\\get_proxy\.exe|&lt;/P&gt;&lt;P&gt;Azure:&lt;/P&gt;&lt;P&gt;C:\Program Files\AzureConnectedMachineAgent\ExtensionService\GC\gc_service.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\GCArcService\GC\gc_arc_service.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\GCArcService\GC\gc_service.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\GCArcService\GC\gc_worker.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\azcmagent.exe&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Gytpol:&lt;/P&gt;&lt;P&gt;C:\\Program Files\\WindowsPowerShell\\Modules\\gytpol\\Client\\fw.*\\GytpolClientFW.*\.exe|&lt;/P&gt;&lt;P&gt;forescout:&lt;/P&gt;&lt;P&gt;ParentProcessName count&lt;BR /&gt;C:\Program Files\ForeScout SecureConnector\SecureConnector.exe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks//..&lt;/P&gt;</description>
    <pubDate>Sat, 02 Dec 2023 07:14:42 GMT</pubDate>
    <dc:creator>AL3Z</dc:creator>
    <dc:date>2023-12-02T07:14:42Z</dc:date>
    <item>
      <title>Assistance Needed: Reformatting Provided Events to Match Structure of 'blacklist3'</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Assistance-Needed-Reformatting-Provided-Events-to-Match/m-p/670518#M112433</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is it possible for someone to aid me in reformatting the given events to align with the structure present in blacklist3, organizing them into their respective blacklists or potentially amalgamating them into a unified blacklist?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;blacklist3 = $XmlRegex="&amp;lt;EventID&amp;gt;4688&amp;lt;\/EventID&amp;gt;.*&amp;lt;Data Name=('NewProcessName'|'ParentProcessName')&amp;gt;[C-F]:\\Program Files\\Splunk(?:UniversalForwarder)?\\bin\\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi))\.exe"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Tanium&amp;nbsp; Events:&lt;/P&gt;&lt;P&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\Tools\\StdUtils\\TaniumExecWrapper\.exe|&lt;BR /&gt;C:\\Program Files (\x86\)\\Tanium\\Tanium Client\\Patch\\tools\\TaniumExecWrapper\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumClient\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\Patch\\tools\\TaniumFileInfo\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumCX\.exe|&lt;BR /&gt;C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\python38\\TPython\.exe|&lt;BR /&gt;C:\Program Files (x86)\Tanium\Tanium Client\Tools\Patch\7za.exe&lt;/P&gt;&lt;P&gt;Windows defender:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseCM.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender\Platform\.*\MpCmdRun.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender\Platform\.*\MsMpEng.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection\.*\OpenHandleCollector.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseNdr.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\.*\SenseCM.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\.*\SenseIR.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\.*\MsSense.exe&lt;BR /&gt;C:\Program Files\Windows Defender\MpCmdRun.exe&lt;BR /&gt;C:\Program Files\Windows Defender\MsMpEng.exe&lt;BR /&gt;C:\Program Files\Windows Defender Advanced Threat Protection\SenseTVM.exe&lt;BR /&gt;C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\10.8560.25364.1036\SenseTVM.exe&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Rapid7&lt;/P&gt;&lt;P&gt;ParentProcessName count&lt;BR /&gt;C:\Program Files\Rapid7\Insight Agent\components\insight_agent\3.2.4.63\ir_agent.exe&lt;BR /&gt;C:\Program Files\Rapid7\Insight Agent\components\insight_agent\4.0.0.1\ir_agent.exe&lt;BR /&gt;C:\Program Files\Rapid7\Insight Agent\ir_agent.exe&lt;BR /&gt;C:\\Program Files\\Rapid7\\Insight Agent\\components\\insight_agent\\.*\\get_proxy\.exe|&lt;/P&gt;&lt;P&gt;Azure:&lt;/P&gt;&lt;P&gt;C:\Program Files\AzureConnectedMachineAgent\ExtensionService\GC\gc_service.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\GCArcService\GC\gc_arc_service.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\GCArcService\GC\gc_service.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\GCArcService\GC\gc_worker.exe&lt;BR /&gt;C:\Program Files\AzureConnectedMachineAgent\azcmagent.exe&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Gytpol:&lt;/P&gt;&lt;P&gt;C:\\Program Files\\WindowsPowerShell\\Modules\\gytpol\\Client\\fw.*\\GytpolClientFW.*\.exe|&lt;/P&gt;&lt;P&gt;forescout:&lt;/P&gt;&lt;P&gt;ParentProcessName count&lt;BR /&gt;C:\Program Files\ForeScout SecureConnector\SecureConnector.exe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks//..&lt;/P&gt;</description>
      <pubDate>Sat, 02 Dec 2023 07:14:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Assistance-Needed-Reformatting-Provided-Events-to-Match/m-p/670518#M112433</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-02T07:14:42Z</dc:date>
    </item>
  </channel>
</rss>

