<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186052#M37290</link>
    <description>&lt;P&gt;Why don't you make a new blacklist for each of those events then? Something like the following:&lt;BR /&gt;
    blacklist2 = EventCode="4688"&lt;BR /&gt;
    blacklist3 = EventCode="4689"&lt;/P&gt;</description>
    <pubDate>Tue, 13 Sep 2016 20:57:51 GMT</pubDate>
    <dc:creator>pkiripolsky</dc:creator>
    <dc:date>2016-09-13T20:57:51Z</dc:date>
    <item>
      <title>How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186042#M37280</link>
      <description>&lt;P&gt;Trying to blacklist Windows Events 4688 and 4689 that come from the Splunk Universal Forwarder, I've checked the regex and it looks right according to &lt;A href="http://regexr.com/"&gt;http://regexr.com/&lt;/A&gt;.   I've looked through many of the different links and haven't seen anyone doing this specifically. Has anyone else had any luck with this?&lt;/P&gt;

&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;

&lt;P&gt;My config file for the app looks like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
index= wineventlog
blacklist = 5156,5158,4656
blacklist1 = EventCode="4689" Message="Process Name:.*SplunkUniversalForwarder"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Sample Event&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;08/25/2015 11:15:35 AM
LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4688
EventType=0
Type=Information
ComputerName=XXXXXXXX.com
TaskCategory=Process Creation
OpCode=Info
RecordNumber=60854906
Keywords=Audit Success
Message=A new process has been created.

Subject:
    Security ID:        NT AUTHORITY\SYSTEM
    Account Name:       XXXXX$
    Account Domain:     XXXXX
    Logon ID:       0x3e7

Process Information:
    New Process ID:     0x808
    New Process Name:   C:\Program Files\SplunkUniversalForwarder\bin\splunk-netmon.exe
    Token Elevation Type:   TokenElevationTypeDefault (1)
    Creator Process ID: 0x12e8
    Process Command Line:   
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 25 Aug 2015 17:23:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186042#M37280</guid>
      <dc:creator>iccuisdept</dc:creator>
      <dc:date>2015-08-25T17:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186043#M37281</link>
      <description>&lt;P&gt;This is event ID 4688 where the Process Information lists it as "New Process Name", in the 4689 event ID, it lists it as Process Name, so the regex should be right.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2015 18:01:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186043#M37281</guid>
      <dc:creator>iccuisdept</dc:creator>
      <dc:date>2015-08-25T18:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186044#M37282</link>
      <description>&lt;P&gt;If you have more than one blacklist, you must number them all, starting at 1. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist1 = 5156,5158,4656
blacklist2 = EventCode=%^4689$% Message=%SplunkUniversalForwarder%
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Additionally, the "regex" used, is not normal regex. Try this, and let me know how it goes.&lt;/P&gt;

&lt;P&gt;Here's the doc:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.5/admin/inputsconf"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.5/admin/inputsconf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2015 18:12:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186044#M37282</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2015-08-25T18:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186045#M37283</link>
      <description>&lt;P&gt;If the title of the question is correct "on a universal forwarder", then you can't. To filter data, using those configs, before sending it to a indexer you need a heavy forwarder. If you still want to keep the universal forwarder, you need to apply those configs in the indexer instead.&lt;BR /&gt;
More on forwarder types from docs:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.5/Forwarding/Typesofforwarders"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.5/Forwarding/Typesofforwarders&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 14:22:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186045#M37283</guid>
      <dc:creator>diogofgm</dc:creator>
      <dc:date>2015-08-26T14:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186046#M37284</link>
      <description>&lt;P&gt;Not true in versions 6 and up. The UFs are becoming more and more powerful to help filter out unwanted data before it gets to the indexers.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 15:06:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186046#M37284</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2015-08-26T15:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186047#M37285</link>
      <description>&lt;P&gt;You sure? At least in the link i provided from docs in the forwarder comparison chart it states that UFs can't do Per-event filtering, Event routing or Event parsing. &lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 15:24:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186047#M37285</guid>
      <dc:creator>diogofgm</dc:creator>
      <dc:date>2015-08-26T15:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186048#M37286</link>
      <description>&lt;P&gt;Positive. EventLog filtering is a Windows-only configuration. That table you reference also has Light Forwarders, which in most practical  instances, are not used any more. The "Per-Event Filtering" is probably a generalized statement as it only applies to "Windows Event Logs" only. Any other file, monitor, script, etc will not be filtered like the Windows Event Logs.&lt;/P&gt;

&lt;P&gt;Check my link for inputs.conf, and see this section in the docs:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;###
# Windows Event Log Monitor
###
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 26 Aug 2015 15:36:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186048#M37286</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2015-08-26T15:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186049#M37287</link>
      <description>&lt;P&gt;Nice. Also just found this article. &lt;BR /&gt;
&lt;A href="http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/"&gt;http://blogs.splunk.com/2014/05/23/controlling-4662-messages-in-the-windows-security-event-log/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 15:49:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186049#M37287</guid>
      <dc:creator>diogofgm</dc:creator>
      <dc:date>2015-08-26T15:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186050#M37288</link>
      <description>&lt;P&gt;Here's how I filtered out the splunk events for event code 4688&lt;BR /&gt;
blacklist3 = EventCode="4688" Message="(?:New Process Name:).+(?:splunk)"&lt;BR /&gt;
blacklist4 = EventCode="4688" Message="(?:New Process Name:).+(?:splunk-netmon.exe)"&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 16:19:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186050#M37288</guid>
      <dc:creator>sylax</dc:creator>
      <dc:date>2016-01-25T16:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186051#M37289</link>
      <description>&lt;P&gt;Here is how to filter from windows eventlogs  from 6.4.2 inputs.conf.spec. &lt;/P&gt;

&lt;H1&gt;EventLog filtering&lt;/H1&gt;

&lt;H1&gt;Filtering at the input layer is desirable to reduce the total processing load&lt;/H1&gt;

&lt;H1&gt;in network transfer and computation on the Splunk nodes acquiring and&lt;/H1&gt;

&lt;H1&gt;processing the data.&lt;/H1&gt;

&lt;P&gt;whitelist =  | key=regex [key=regex]&lt;BR /&gt;
blacklist =  | key=regex [key=regex]&lt;/P&gt;

&lt;P&gt;whitelist1 =  | key=regex [key=regex]&lt;BR /&gt;
blacklist1 =  | key=regex [key=regex]&lt;BR /&gt;
blacklist2 =  | key=regex [key=regex]&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;These settings are optional.&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Both numbered and unnumbered whitelists and blacklists support two formats: A&lt;BR /&gt;
comma-separated list of event IDs and a list of key=regular expression pairs.&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;These two formats cannot be combined, only one may be used in a specific line.&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Numbered whitelist settings are permitted from 1 to 9, so whitelist1 through&lt;BR /&gt;
whitelist9 and blacklist1 through blacklist9 are supported.&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;If no white or blacklist rules are present, all events will be read.&lt;/P&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;H1&gt;Formats:&lt;/H1&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;P&gt;Event ID list format:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;A comma-seperated list of terms.&lt;/LI&gt;
&lt;LI&gt;Terms may be a single event ID (e.g. 6) or range of event IDs (e.g. 100-200)&lt;/LI&gt;
&lt;LI&gt;Example: 4,5,7,100-200&lt;/LI&gt;
&lt;LI&gt;This would apply to events with IDs 4, 5, 7, or any event ID between 100
and 200, inclusive.&lt;/LI&gt;
&lt;LI&gt;Provides no additional functionality over the key=regex format, but may be
easier to understand than the equivalent:
List format:      4,5,7,100-200
Regex equivalent: EventCode=%^(4|5|7|1..|200)$%&lt;/LI&gt;
&lt;/UL&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;key=regex format&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;A whitespace-separated list of event log components to match, and
regexes to match against against them.&lt;/LI&gt;
&lt;LI&gt;There can be one match expression or multiple per line.&lt;/LI&gt;
&lt;LI&gt;The key must belong to the set of valid keys provided below.&lt;/LI&gt;
&lt;LI&gt;The regex consists of a leading delimiter, the regex expression, and a
trailing delimeter. Examples: %regex%, &lt;EM&gt;regex&lt;/EM&gt;, "regex"&lt;/LI&gt;
&lt;LI&gt;When multiple match expressions are present, they are treated as a
logical AND.  In other words, all expressions must match for the line to
apply to the event.&lt;/LI&gt;
&lt;LI&gt;If the value represented by the key does not exist, it is not considered
a match, regardless of the regex.&lt;/LI&gt;
&lt;LI&gt;Example:
whitelist = EventCode=%^200$% User=%jrodman%
Include events only if they have EventCode 200 and relate to User jrodman&lt;/LI&gt;
&lt;/UL&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;H1&gt;Valid keys for the regex format:&lt;/H1&gt;

&lt;UL&gt;
&lt;LI&gt;The following keys are equivalent to the fields which appear in the text of
the acquired events: Category CategoryString ComputerName EventCode
EventType Keywords LogName Message OpCode RecordNumber Sid SidType
SourceName TaskCategory Type User&lt;/LI&gt;
&lt;LI&gt;There are two special keys that do not appear literally in the event.

&lt;UL&gt;
&lt;LI&gt;$TimeGenerated : The time that the computer generated the event&lt;/LI&gt;
&lt;LI&gt;$Timestamp: The time that the event was received and recorded by the
        Event Log service.&lt;/LI&gt;
&lt;/UL&gt;&lt;/LI&gt;
&lt;LI&gt;EventType is only available on Server 2003 / XP and earlier&lt;/LI&gt;
&lt;LI&gt;Type is only available on Server 2008 / Vista and later&lt;/LI&gt;
&lt;LI&gt;For a more full definition of these keys, see the web documentation:&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 13 Sep 2016 19:55:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186051#M37289</guid>
      <dc:creator>cesaccenturefed</dc:creator>
      <dc:date>2016-09-13T19:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist Windows Security Event Logs 4689 and 4688 on a universal forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186052#M37290</link>
      <description>&lt;P&gt;Why don't you make a new blacklist for each of those events then? Something like the following:&lt;BR /&gt;
    blacklist2 = EventCode="4688"&lt;BR /&gt;
    blacklist3 = EventCode="4689"&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2016 20:57:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-Windows-Security-Event-Logs-4689-and-4688-on-a/m-p/186052#M37290</guid>
      <dc:creator>pkiripolsky</dc:creator>
      <dc:date>2016-09-13T20:57:51Z</dc:date>
    </item>
  </channel>
</rss>

