<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter inputs.conf whitelist content for Windows event logs? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211848#M41704</link>
    <description>&lt;P&gt;I believe you should be able to use a custom view. Try this and see if it's what you're looking for? &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.1/Data/MonitorWindowseventlogdata#Use_the_.22Full_Name.22_log_property_in_Event_Viewer_to_specify_complex_Event_Log_channel_names_properly"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.1/Data/MonitorWindowseventlogdata#Use_the_.22Full_Name.22_log_property_in_Event_Viewer_to_specify_complex_Event_Log_channel_names_properly&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jun 2016 16:19:49 GMT</pubDate>
    <dc:creator>ryanoconnor</dc:creator>
    <dc:date>2016-06-16T16:19:49Z</dc:date>
    <item>
      <title>How to filter inputs.conf whitelist content for Windows event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211845#M41701</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I configured an audit on a folder on Windows. Now I want to send it to my Splunk Server, but there are many file audits configured by the system itself (file access in System32...) and I'm not interested by these logs.&lt;/P&gt;

&lt;P&gt;So I need more than the eventID filter on the whitelist option of inputs.conf&lt;/P&gt;

&lt;P&gt;How can I do that, for example by checking the content of the log and only send it if it contains &lt;EM&gt;C:\MyFolder&lt;/EM&gt;?&lt;/P&gt;

&lt;P&gt;Thank's&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 10:21:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211845#M41701</guid>
      <dc:creator>Aexyn</dc:creator>
      <dc:date>2016-06-16T10:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter inputs.conf whitelist content for Windows event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211846#M41702</link>
      <description>&lt;P&gt;You'll want to do this with a props.conf and transforms.conf. Things get slightly more complex if you want to filter everything and only include some things (such as C:\MyFolder). You'll also probably add a lot of additional processing in Splunk that isn't necessary. If it's the case that you only want to audit a specific folder, you might want to configure that auditing specifically inside the OS. &lt;/P&gt;

&lt;P&gt;If you want to just filter out some folders (such as System32), you could setup a props.conf and transforms.conf like the following. You can also duplicate these for additional folders that you want to filter. &lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; [WinEventLog:Security]
 TRANSFORMS-FilterEvent = FilterEventSystem32
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[FilterEventSystem32]
REGEX = &amp;lt;REGEX_THAT_MATCHES_HERE&amp;gt;
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you can send a sample event you'd like to filter out I can be more specific with a Regex. &lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 13:59:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211846#M41702</guid>
      <dc:creator>ryanoconnor</dc:creator>
      <dc:date>2016-06-16T13:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter inputs.conf whitelist content for Windows event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211847#M41703</link>
      <description>&lt;P&gt;Thank's for your reply.&lt;BR /&gt;
Actually, my idea was to include only the events which concern this folder, with no restriction about the type of events (read, modification attempt, deletion ...). &lt;/P&gt;

&lt;P&gt;There is no specific format for stored files, the only condition is the path "C:\Myfolder*" (or C:\Myfolder*).&lt;BR /&gt;
Is it possible to exclude a drive? &lt;BR /&gt;
This way I could just set my folder as a shared network drive (and exclude any other drive).&lt;/P&gt;

&lt;P&gt;You're right about the OS configuration, I have started configuring Windows logs with the Advanced XML Filtering, it is a bit tedious but this should work.&lt;/P&gt;

&lt;P&gt;About that, do you know if it possible to forward Windows logs of a customised View, which filters logs, in the same way than ordinary logs (I mean [Winevent://MyView] in inputs.conf for example).&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 15:55:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211847#M41703</guid>
      <dc:creator>Aexyn</dc:creator>
      <dc:date>2016-06-16T15:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter inputs.conf whitelist content for Windows event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211848#M41704</link>
      <description>&lt;P&gt;I believe you should be able to use a custom view. Try this and see if it's what you're looking for? &lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.1/Data/MonitorWindowseventlogdata#Use_the_.22Full_Name.22_log_property_in_Event_Viewer_to_specify_complex_Event_Log_channel_names_properly"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.1/Data/MonitorWindowseventlogdata#Use_the_.22Full_Name.22_log_property_in_Event_Viewer_to_specify_complex_Event_Log_channel_names_properly&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2016 16:19:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211848#M41704</guid>
      <dc:creator>ryanoconnor</dc:creator>
      <dc:date>2016-06-16T16:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter inputs.conf whitelist content for Windows event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211849#M41705</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Finally, custom view configuration is rather limited and I'm not even sure I can do what I want, ie filtering ObjectName field.&lt;BR /&gt;
So I have just followed your advice on Splunk with transforms.conf and props.conf configuration.&lt;/P&gt;

&lt;P&gt;Even if I thought that was the "dirty way", after filtering "Object Name      C:*"  (even C:\Windows should be almost perfect) I don't receive any logs from the chatty Windows.&lt;/P&gt;

&lt;P&gt;If you want to do the same, honestly, don't lose your time searching weird Windows configuration and just filter any chatty folder.&lt;/P&gt;

&lt;P&gt;It is finally quite easy and powerful.&lt;/P&gt;

&lt;P&gt;Thank's for all&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 09:01:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211849#M41705</guid>
      <dc:creator>Aexyn</dc:creator>
      <dc:date>2016-06-17T09:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter inputs.conf whitelist content for Windows event logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211850#M41706</link>
      <description>&lt;P&gt;That's awesome news I'm glad you got it working! Let me know if you have any other questions around this&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2016 16:20:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-filter-inputs-conf-whitelist-content-for-Windows-event/m-p/211850#M41706</guid>
      <dc:creator>ryanoconnor</dc:creator>
      <dc:date>2016-06-17T16:20:22Z</dc:date>
    </item>
  </channel>
</rss>

