<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201518#M39868</link>
    <description>&lt;P&gt;Sure ,&lt;BR /&gt;
[default]&lt;BR /&gt;
host = splunk-102&lt;BR /&gt;
[splunktcp://9997]&lt;BR /&gt;
[WinEventLog:System]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;H1&gt;only index events with these event IDs.&lt;/H1&gt;

&lt;P&gt;whitelist = 7036-7037&lt;/P&gt;

&lt;H1&gt;exclude these event IDs from being indexed.&lt;/H1&gt;

&lt;P&gt;blacklist = 0-7035,7037-10000&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
current_only=1&lt;BR /&gt;
blacklist1=EventCode="4726"&lt;/P&gt;

&lt;P&gt;the same stanza appears in /opt/splunk/etc/apps/splunk_app_windows_infrastructure and in /opt/splunk/etc/apps/Splunk_TA_windows&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 08:14:40 GMT</pubDate>
    <dc:creator>vad34</dc:creator>
    <dc:date>2020-09-29T08:14:40Z</dc:date>
    <item>
      <title>How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201509#M39859</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;

&lt;P&gt;How do I filter events (Windows event log) on a forwarder? btw how do I install a heavy forwarder?&lt;BR /&gt;
I have Splunk 6.2.3.&lt;/P&gt;

&lt;P&gt;tnx in advance&lt;/P&gt;</description>
      <pubDate>Sun, 27 Dec 2015 08:47:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201509#M39859</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-27T08:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201510#M39860</link>
      <description>&lt;P&gt;Take a look at the whitelist and blacklist attributes:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.0/Data/MonitorWindowsdata"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.0/Data/MonitorWindowsdata&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;You can even use advanced filtering now (see advanced filtering section)&lt;/P&gt;

&lt;P&gt;For question number 2, the way you install a HF is exactly the same as any other Splunk Entrerprise instance. Just configure inputs and outputs accordingly and it'll behave like one. Take a look at this:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.3/Forwarding/Deployaheavyforwarder"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.3/Forwarding/Deployaheavyforwarder&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Hope that helps. &lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
J&lt;/P&gt;</description>
      <pubDate>Sun, 27 Dec 2015 09:07:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201510#M39860</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-27T09:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201511#M39861</link>
      <description>&lt;P&gt;Tnx for quick reply,&lt;BR /&gt;
I am unable to see how to download HF , only UF can be downloaded...&lt;/P&gt;</description>
      <pubDate>Sun, 27 Dec 2015 09:58:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201511#M39861</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-27T09:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201512#M39862</link>
      <description>&lt;P&gt;UF is a different installer. Everything else comes from the same one. Simply download Splunk Enterprise and configure it to behave like a HF following the instructions I mentioned above. &lt;/P&gt;</description>
      <pubDate>Sun, 27 Dec 2015 10:05:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201512#M39862</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-27T10:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201513#M39863</link>
      <description>&lt;P&gt;thanks a lot&lt;/P&gt;</description>
      <pubDate>Sun, 27 Dec 2015 16:35:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201513#M39863</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-27T16:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201514#M39864</link>
      <description>&lt;P&gt;Full Splunk and a HF are the same instance. The only difference is that a HF is configured not for indexing, but forwarding events upstream to the indexing tier. An HF is also required for some type of Splunk Apps and modular inputs such as DBX, Sourcefire, AWS etc.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Dec 2015 01:23:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201514#M39864</guid>
      <dc:creator>esix_splunk</dc:creator>
      <dc:date>2015-12-28T01:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201515#M39865</link>
      <description>&lt;P&gt;Hello again,&lt;BR /&gt;
I have configured heavy forwarder and have specified other Splunk instance to forward data .&lt;BR /&gt;
I also configured in inputs.conf -Windows system events - whitelist &amp;amp; blacklist , but I am still able to see that other events coming to splunk and filtering isn't working.&lt;BR /&gt;
Can u pls assist ?&lt;BR /&gt;
Tnx in advance&lt;/P&gt;</description>
      <pubDate>Mon, 28 Dec 2015 14:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201515#M39865</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-28T14:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201516#M39866</link>
      <description>&lt;P&gt;Anyone? ...&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2015 14:34:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201516#M39866</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-30T14:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201517#M39867</link>
      <description>&lt;P&gt;Can you paste your inputs.conf stanza here?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 08:58:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201517#M39867</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-31T08:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201518#M39868</link>
      <description>&lt;P&gt;Sure ,&lt;BR /&gt;
[default]&lt;BR /&gt;
host = splunk-102&lt;BR /&gt;
[splunktcp://9997]&lt;BR /&gt;
[WinEventLog:System]&lt;BR /&gt;
disabled = 0&lt;/P&gt;

&lt;H1&gt;only index events with these event IDs.&lt;/H1&gt;

&lt;P&gt;whitelist = 7036-7037&lt;/P&gt;

&lt;H1&gt;exclude these event IDs from being indexed.&lt;/H1&gt;

&lt;P&gt;blacklist = 0-7035,7037-10000&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
current_only=1&lt;BR /&gt;
blacklist1=EventCode="4726"&lt;/P&gt;

&lt;P&gt;the same stanza appears in /opt/splunk/etc/apps/splunk_app_windows_infrastructure and in /opt/splunk/etc/apps/Splunk_TA_windows&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:14:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201518#M39868</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2020-09-29T08:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201519#M39869</link>
      <description>&lt;P&gt;Hi, I've fixed several typos in your config. Try the following on your wineventlog section:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://System]
disabled = 0
whitelist = 7036-7037
# Blacklist not needed based on the whitelist defined above

[WinEventLog://Security]
disabled = 0
current_only = 1
# Collect everything but the below
blacklist = 4726
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:14:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201519#M39869</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-31T09:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201520#M39870</link>
      <description>&lt;P&gt;And don't forget to restart your splunk service of course.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:17:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201520#M39870</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-31T09:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201521#M39871</link>
      <description>&lt;P&gt;corrected it and restart the splunk service but still getting the event 4726  &lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:34:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201521#M39871</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T09:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201522#M39872</link>
      <description>&lt;P&gt;Is the whitelist on your System log stanza working at least?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:44:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201522#M39872</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-31T09:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201523#M39873</link>
      <description>&lt;P&gt;yes, i see the event in splunk (event id 7036)&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:47:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201523#M39873</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T09:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201524#M39874</link>
      <description>&lt;P&gt;Try the following too that uses advanced filtering. There seems to be some issues on certain versions with blacklists, see &lt;A href="https://answers.splunk.com/answers/152131/filter-windows-eventcode-using-blacklist-and-whitelist.html"&gt;this post&lt;/A&gt;.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://System]
disabled = 0
whitelist = 7036-7037
# Blacklist not needed based on the whitelist defined above

[WinEventLog://Security]
disabled = 0
current_only = 1
# Collect everything but the below
blacklist1=EventCode=”4726”
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:49:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201524#M39874</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-31T09:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201525#M39875</link>
      <description>&lt;P&gt;still the same (&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 09:57:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201525#M39875</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T09:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201526#M39876</link>
      <description>&lt;P&gt;still the same &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 10:02:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201526#M39876</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T10:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201527#M39877</link>
      <description>&lt;P&gt;Hi, I can't see your latest comment but I got the email notification.&lt;BR /&gt;
There's probably too many nested comments above so I'll answer here.&lt;/P&gt;

&lt;P&gt;Let's try a whitelist approach for your Security stanza:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
current_only = 1
whitelist = 1100-1108,4608-4725,4727-6416
# More details here: &lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/Default.aspx" target="test_blank"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/Default.aspx&lt;/A&gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 31 Dec 2015 10:14:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201527#M39877</guid>
      <dc:creator>javiergn</dc:creator>
      <dc:date>2015-12-31T10:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows event logs on a Splunk 6.2.3 forwarder?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201528#M39878</link>
      <description>&lt;P&gt;Ok i tried and still able to see the event  id 4726 &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2015 11:25:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-Windows-event-logs-on-a-Splunk-6-2-3-forwarder/m-p/201528#M39878</guid>
      <dc:creator>vad34</dc:creator>
      <dc:date>2015-12-31T11:25:29Z</dc:date>
    </item>
  </channel>
</rss>

