<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Additional Windows Event Logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697532#M115702</link>
    <description>&lt;P&gt;Interesting Fields is just a GUI feature that shows fields present in at least 10 (15?) percent of events. Just because field is not listed there doesn't mean it's not being parsed out from the event. Actually with renderXml=true you get xml-formatted events from which all fields should be automatically parsed.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Aug 2024 22:15:00 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2024-08-27T22:15:00Z</dc:date>
    <item>
      <title>Additional Windows Event Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697522#M115700</link>
      <description>&lt;P&gt;Hello! I am trying to collect 3 additional Windows Event logs and I have added them in the inputs.conf, for example&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog://Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Admin]
disabled = 0
start_from = oldest
current_only = 0
checkpointInterval = 5
renderXml=true&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Admin, Autopilot, and Operational, were added the same way.&lt;/P&gt;&lt;P&gt;I also added in props.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[WinEventLog:Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Admin]
rename = wineventlog

[WinEventLog:Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Autopilot]
rename = wineventlog

[WinEventLog:Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Operational]
rename = wineventlog&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The data are coming in, however, none of the fields are parsed as interesting fields.&lt;/P&gt;&lt;P&gt;Is there something I am missing? I looked through some of the other conf file, but I think I am in over my head to make a new section in props? I thought the base [WinEventLog] would take care of the basic breaking up of interesting fields like EventID, so I am a bit lost.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 20:38:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697522#M115700</guid>
      <dc:creator>UnsuperviseLeon</dc:creator>
      <dc:date>2024-08-27T20:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Additional Windows Event Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697532#M115702</link>
      <description>&lt;P&gt;Interesting Fields is just a GUI feature that shows fields present in at least 10 (15?) percent of events. Just because field is not listed there doesn't mean it's not being parsed out from the event. Actually with renderXml=true you get xml-formatted events from which all fields should be automatically parsed.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 22:15:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697532#M115702</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-08-27T22:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: Additional Windows Event Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697548#M115707</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/271636"&gt;@UnsuperviseLeon&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;as&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;said, fields are lister in interesting fields only if you have them in at least 20% of the events, you can check these fields putting in the main search one of these new fields (e.g. my_field=*).&lt;/P&gt;&lt;P&gt;then, it isn't sure that these fields are correctly parsed by the standard Windows parser, you have to check this and eventually add the missing parsings.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2024 06:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697548#M115707</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-08-28T06:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Additional Windows Event Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697719#M115728</link>
      <description>&lt;P&gt;Things like "EventID" is in every event and that isn't showing up. I'll poke around the other conf more.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 14:34:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697719#M115728</guid>
      <dc:creator>UnsuperviseLeon</dc:creator>
      <dc:date>2024-08-29T14:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Additional Windows Event Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697742#M115732</link>
      <description>&lt;P&gt;Ok. Aren't you perchance searching in fast mode? Oh, and I of course assume you have your TA_windows installed in all required places, right?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 18:01:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697742#M115732</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-08-29T18:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: Additional Windows Event Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697780#M115735</link>
      <description>&lt;P&gt;Not searching in fast mode.&lt;/P&gt;&lt;P&gt;I am going to assume that I did not installed it in all the required places, I inherited this from another employee. I have it deployed from the DS to my endpoints and the local conf are configured there. I have it also installed via Manage Apps in the Cloud search head.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 21:46:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Additional-Windows-Event-Logs/m-p/697780#M115735</guid>
      <dc:creator>UnsuperviseLeon</dc:creator>
      <dc:date>2024-08-29T21:46:43Z</dc:date>
    </item>
  </channel>
</rss>

