<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remove section from windows 2008r2 security log in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Remove-section-from-windows-2008r2-security-log/m-p/76382#M15590</link>
    <description>&lt;P&gt;You might want to consider changing the search for your statistics to not include where Account Name/Domain fields are equal to to a -. &lt;/P&gt;

&lt;P&gt;The other option is to take a look at using the SEDCMD parameter in your props.conf file and create a sed script to re-write those lines.&lt;/P&gt;

&lt;P&gt;For example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;s/Account\sName:\s+\-//g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This would replace the "Account Name: -" line with an empty line.&lt;/P&gt;

&lt;P&gt;Another option is to use a script (bash, batch, python, powershell, perl, etc.) to clean up the event before it is indexed to remove that particular section.&lt;/P&gt;</description>
    <pubDate>Sat, 27 Oct 2012 00:22:18 GMT</pubDate>
    <dc:creator>Rob</dc:creator>
    <dc:date>2012-10-27T00:22:18Z</dc:date>
    <item>
      <title>Remove section from windows 2008r2 security log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Remove-section-from-windows-2008r2-security-log/m-p/76381#M15589</link>
      <description>&lt;P&gt;I'm playing with WinEventLog:Security source, and I found a "-" username that altered my statistics.&lt;BR /&gt;
In a generic login log, there is a section with this user, and I'm looking for a way to remove it and clean/normaliza my logs before they'll be indexed.&lt;/P&gt;

&lt;P&gt;An example:&lt;/P&gt;

&lt;P&gt;&lt;PRE&gt;&lt;BR /&gt;
09/15/2011 01:41:18 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4624&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=DC.domain.local&lt;BR /&gt;
TaskCategory=Logon&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=22396221&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=An account was successfully logged on.&lt;/PRE&gt;&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
        Security ID:                S-1-0-0&lt;BR /&gt;
        Account Name:                -&lt;BR /&gt;
        Account Domain:                -&lt;BR /&gt;
        Logon ID:                0x0&lt;/P&gt;

&lt;P&gt;Logon Type:                        3&lt;/P&gt;

&lt;P&gt;New Logon:&lt;BR /&gt;
        Security ID:                S-1-5-21-1759315991-2675907183-3548838191-1129&lt;BR /&gt;
        Account Name:                username&lt;BR /&gt;
        Account Domain:                DOMAIN&lt;BR /&gt;
        Logon ID:                0x155b3446&lt;BR /&gt;
        Logon GUID:                {FBB0AB00-6A66-14F3-0CF8-6709832A3FB8}&lt;/P&gt;

&lt;P&gt;Process Information:&lt;BR /&gt;
        Process ID:                0x0&lt;BR /&gt;
        Process Name:                -&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
        Workstation Name:&lt;BR /&gt;
        Source Network Address:        10.x.y.z&lt;BR /&gt;
        Source Port:                50233&lt;/P&gt;

&lt;P&gt;Detailed Authentication Information:&lt;BR /&gt;
        Logon Process:                Kerberos&lt;BR /&gt;
        Authentication Package:        Kerberos&lt;BR /&gt;
        Transited Services:        -&lt;BR /&gt;
        Package Name (NTLM only):        -&lt;BR /&gt;
        Key Length:                0&lt;BR /&gt;
&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;How I can remove the section:&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
        Security ID:                S-1-0-0&lt;BR /&gt;
        Account Name:                -&lt;BR /&gt;
        Account Domain:                -&lt;BR /&gt;
        Logon ID:                0x0&lt;/P&gt;

&lt;P&gt;from my log?&lt;/P&gt;

&lt;P&gt;Regards&lt;BR /&gt;
bizza&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2011 13:18:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Remove-section-from-windows-2008r2-security-log/m-p/76381#M15589</guid>
      <dc:creator>bizza</dc:creator>
      <dc:date>2011-09-15T13:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Remove section from windows 2008r2 security log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Remove-section-from-windows-2008r2-security-log/m-p/76382#M15590</link>
      <description>&lt;P&gt;You might want to consider changing the search for your statistics to not include where Account Name/Domain fields are equal to to a -. &lt;/P&gt;

&lt;P&gt;The other option is to take a look at using the SEDCMD parameter in your props.conf file and create a sed script to re-write those lines.&lt;/P&gt;

&lt;P&gt;For example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;s/Account\sName:\s+\-//g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This would replace the "Account Name: -" line with an empty line.&lt;/P&gt;

&lt;P&gt;Another option is to use a script (bash, batch, python, powershell, perl, etc.) to clean up the event before it is indexed to remove that particular section.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Oct 2012 00:22:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Remove-section-from-windows-2008r2-security-log/m-p/76382#M15590</guid>
      <dc:creator>Rob</dc:creator>
      <dc:date>2012-10-27T00:22:18Z</dc:date>
    </item>
  </channel>
</rss>

