<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EventCode 5156 in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101970#M21395</link>
    <description>&lt;P&gt;&lt;A href="https://static1.squarespace.com/static/552092d5e4b0661088167e5c/t/5aa04717f9619a859be42a1f/1520453400319/Windows+Splunk+Logging+Cheat+Sheet+v2.2.1.pdf"&gt;From Windows Splunk Logging Cheat Sheet&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Filter by Message, NOT by Event Code: It is common to blacklist event codes that are noisy or excessive that&lt;BR /&gt;
impacts storage and licensing. By enabling Process Creation Success (4688) Process Terminate (4689) and Windows&lt;BR /&gt;
Firewall Filtering Platform Connection Success (5156 &amp;amp; 5158) they will be the top four event codes in your Splunk&lt;BR /&gt;
index. Filtering by the content of the Message or Field name is the better way to go. Once you understand what&lt;BR /&gt;
normal noise is, has minimal risk to be exploited or important to security monitoring you can filter those out at the&lt;BR /&gt;
client or server. For Windows, Splunk limits the blacklist to only 10 entries, so you will need to chain similar events&lt;BR /&gt;
in one line. Here is an example of a proper exclusion:&lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
disabled=0&lt;BR /&gt;
current_only=1&lt;BR /&gt;
blacklist = 4689,5158&lt;BR /&gt;
blacklist1 = EventCode="4688" Message="(?:New Process&lt;BR /&gt;
Name:).+(?:SplunkUniversalForwarder\bin\splunk.exe)|.+(?:SplunkUniversalForwarder\bin\splunkd.exe)|.+(?:Splunk&lt;BR /&gt;
UniversalForwarder\bin\btool.exe)"&lt;BR /&gt;
blacklist2 = EventCode="4688" Message="(?:New Process Name:).+(?:SplunkUniversalForwarder\bin\splunkwinprintmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunkpowershell.exe)|.+(?:SplunkUniversalForwarder\bin\splunkregmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunk-netmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunkadmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunkMonitorNoHandle.exe)|.+(?:SplunkUniversalForwarder\bin\splunkwinevtlog.exe)|.+(?:SplunkUniversalForwarder\bin\splunkperfmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunk-wmi.exe)"&lt;BR /&gt;
blacklist3 = EventCode="4688" Message="(?:Process Command Line:).+(?:--scheme)|.+(?:--no-log)|.+(?:-Embedding)"&lt;/P&gt;</description>
    <pubDate>Wed, 12 Sep 2018 18:58:55 GMT</pubDate>
    <dc:creator>greyf1r3</dc:creator>
    <dc:date>2018-09-12T18:58:55Z</dc:date>
    <item>
      <title>EventCode 5156</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101966#M21391</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;

&lt;P&gt;We are using Splunk version 4.3.1, build 119532 on both the Indexer and the Universal Forwarder. &lt;/P&gt;

&lt;P&gt;Over the past 48 hours, were seeing a lot of MS EVentCode 5156 on our environment. One machine (FileServer) is shwoing that 99% of the event is being generated by the splunkd.exe. This event was generated more than 1 million times which is very unusual. We have a few dozen windows machines installed with Splunk Universal Forwarder and only this machine is generating this "noise". &lt;/P&gt;

&lt;P&gt;The amount of log being generated by this event is eating our 10GB/day license. Can anyone please help me on how to correct this? &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;=============================================================================================

“The Windows Filtering Platform has permitted a connection. Application Information: Process ID: 1936 Application Name: \device\harddiskvolume2\program files\splunkuniversalforwarder\bin\splunkd.exe Network Information: Direction: Outbound Source Address: 172.24.1.55 Source Port: 49196 Destination Address: 172.16.0.81 Destination Port: 9997 Protocol: 6 Filter Information: Filter Run-Time ID: 0 Layer Name: Connect Layer Run-Time ID: 48”

=============================================================================================
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks you very much.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jul 2012 07:59:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101966#M21391</guid>
      <dc:creator>splunktp</dc:creator>
      <dc:date>2012-07-18T07:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 5156</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101967#M21392</link>
      <description>&lt;P&gt;I am no expert on Windows and the "Filtering Platform" - but this looks some sort of firewall setting to me. I expect that this message is being generated each time the Universal Forwarder sends a packet to the indexer.&lt;/P&gt;

&lt;P&gt;There is obviously some setting that needs to be changed on the file server. Sorry I can't help you with exactly what that is. What's different about the firewall settings on this server?&lt;/P&gt;

&lt;P&gt;However, I can tell you how to filter these events so that they don't chew up your Splunk license.&lt;/P&gt;

&lt;P&gt;On the indexer, add the following to your props.conf and transforms.conf, where TheHost represents the host name (in Splunk) of the Universal Forwarder with issues:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[host::TheHost]
TRANSFORMS-t1=eliminate-splunkd-5136
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[eliminate-splunkd-5136]
REGEX=5156.*splunkd.exe
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You might be able to make the REGEX a bit cleaner, but I think that will work. &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Deploy/Routeandfilterdatad#Discard_specific_events_and_keep_the_rest"&gt;Here&lt;/A&gt; is the relevant discussion in the manual.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jul 2012 15:32:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101967#M21392</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-07-18T15:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 5156</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101968#M21393</link>
      <description>&lt;P&gt;That is a valid event from my perspective.  You're WFP is set to log permitted connections. This is entirely a function of your operating system, and if you wanted to figure out why, you could use a tool like process monitor to see what is happening just prior to the event, which should tell you why it is triggering. &lt;/P&gt;

&lt;P&gt;My suggestion would be to disable successful auditing for connections. I don't think you can do this via the GUI, but disable specific subcategories with Auditpol.exe. This may or may not be acceptable to admins, but the command to run is:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;auditpol /set /subcategory:”Filtering Platform Connection” /success:disable /failure:enable
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 18 Jul 2012 15:40:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101968#M21393</guid>
      <dc:creator>jbsplunk</dc:creator>
      <dc:date>2012-07-18T15:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 5156</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101969#M21394</link>
      <description>&lt;P&gt;There is a way in win 2008 to disable those events at the source, with the audit policies.&lt;BR /&gt;
see &lt;A href="http://www.cupfighter.net/index.php/2009/10/get-rid-of-event-id-5156-the-windows-filtering-platform-has-allowed-a-connection/"&gt;http://www.cupfighter.net/index.php/2009/10/get-rid-of-event-id-5156-the-windows-filtering-platform-has-allowed-a-connection/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2013 16:11:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101969#M21394</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2013-07-23T16:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 5156</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101970#M21395</link>
      <description>&lt;P&gt;&lt;A href="https://static1.squarespace.com/static/552092d5e4b0661088167e5c/t/5aa04717f9619a859be42a1f/1520453400319/Windows+Splunk+Logging+Cheat+Sheet+v2.2.1.pdf"&gt;From Windows Splunk Logging Cheat Sheet&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Filter by Message, NOT by Event Code: It is common to blacklist event codes that are noisy or excessive that&lt;BR /&gt;
impacts storage and licensing. By enabling Process Creation Success (4688) Process Terminate (4689) and Windows&lt;BR /&gt;
Firewall Filtering Platform Connection Success (5156 &amp;amp; 5158) they will be the top four event codes in your Splunk&lt;BR /&gt;
index. Filtering by the content of the Message or Field name is the better way to go. Once you understand what&lt;BR /&gt;
normal noise is, has minimal risk to be exploited or important to security monitoring you can filter those out at the&lt;BR /&gt;
client or server. For Windows, Splunk limits the blacklist to only 10 entries, so you will need to chain similar events&lt;BR /&gt;
in one line. Here is an example of a proper exclusion:&lt;BR /&gt;
[WinEventLog://Security]&lt;BR /&gt;
disabled=0&lt;BR /&gt;
current_only=1&lt;BR /&gt;
blacklist = 4689,5158&lt;BR /&gt;
blacklist1 = EventCode="4688" Message="(?:New Process&lt;BR /&gt;
Name:).+(?:SplunkUniversalForwarder\bin\splunk.exe)|.+(?:SplunkUniversalForwarder\bin\splunkd.exe)|.+(?:Splunk&lt;BR /&gt;
UniversalForwarder\bin\btool.exe)"&lt;BR /&gt;
blacklist2 = EventCode="4688" Message="(?:New Process Name:).+(?:SplunkUniversalForwarder\bin\splunkwinprintmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunkpowershell.exe)|.+(?:SplunkUniversalForwarder\bin\splunkregmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunk-netmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunkadmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunkMonitorNoHandle.exe)|.+(?:SplunkUniversalForwarder\bin\splunkwinevtlog.exe)|.+(?:SplunkUniversalForwarder\bin\splunkperfmon.exe)|.+(?:SplunkUniversalForwarder\bin\splunk-wmi.exe)"&lt;BR /&gt;
blacklist3 = EventCode="4688" Message="(?:Process Command Line:).+(?:--scheme)|.+(?:--no-log)|.+(?:-Embedding)"&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 18:58:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/EventCode-5156/m-p/101970#M21395</guid>
      <dc:creator>greyf1r3</dc:creator>
      <dc:date>2018-09-12T18:58:55Z</dc:date>
    </item>
  </channel>
</rss>

