<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to blacklist specific accounts in Windows security log event 4663? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217354#M42774</link>
    <description>&lt;P&gt;Yes it is case sensitive&lt;BR /&gt;
try this one &lt;BR /&gt;
 blacklist1 = EventCode="4663" ComputerName=" Computer.name"  Message="\sAccount Name:\t\taccount1\s" &lt;/P&gt;

&lt;P&gt;blacklist2 = EventCode="4663" ComputerName=" Computer.name"  Message="\sAccount Name:\t\taccount2\s" &lt;/P&gt;

&lt;P&gt;blacklist3 = EventCode="4663" ComputerName=" Computer.name"  Message="\sAccount Name:\t\tComputername$\s" &lt;/P&gt;

&lt;P&gt;Or you can combine accounts by using pipe |.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Mar 2018 05:23:22 GMT</pubDate>
    <dc:creator>lredij</dc:creator>
    <dc:date>2018-03-09T05:23:22Z</dc:date>
    <item>
      <title>How to blacklist specific accounts in Windows security log event 4663?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217349#M42769</link>
      <description>&lt;P&gt;I've seen several posts here, but none that really have a concrete answer on this.  I'm trying to blacklist certain accounts in my inputs.conf on the Splunk universal forwarder for Windows event id 4663 (object access).&lt;/P&gt;

&lt;P&gt;Does anyone know the correct way to blacklist several account names from appearing in the data forwarded to Splunk?  I've seen some people say key off of user, others with message= followed by some regex with Account Name.&lt;/P&gt;

&lt;P&gt;The below obviously does not work.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist = EventCode="4663" Account Name="User, SERVER$, UserAccount1, UserAccount2"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 03 Jan 2017 14:47:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217349#M42769</guid>
      <dc:creator>splunkbacon</dc:creator>
      <dc:date>2017-01-03T14:47:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist specific accounts in Windows security log event 4663?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217350#M42770</link>
      <description>&lt;P&gt;This seems to be a common misconception about filtering Windows Event log inputs. You can't use any field that you want as a key. Fields are not keys; in fact, fields do not exist at input time. You can find the list of keys in the docs &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.5.1/Data/MonitorWindowseventlogdata#Create_advanced_filters_with_.27whitelist.27_and_.27blacklist.27"&gt;here&lt;/A&gt;.&lt;BR /&gt;
If the information that you want can be found in any of these keys, you can write a &lt;EM&gt;regular expression&lt;/EM&gt; that matches. For example:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist = EventCode="4663" Message="User|SERVER$|UserAccount1|UserAccount2"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 03 Jan 2017 19:05:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217350#M42770</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2017-01-03T19:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist specific accounts in Windows security log event 4663?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217351#M42771</link>
      <description>&lt;P&gt;Thank you.  I didn't try exactly what you have there but ended up getting this to work earlier.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist= Message="Account\sName:\s+(account1|SYSTEM|account2|(Computername\$))"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Does anyone know if these entries are case sensitive or not?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 19:11:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217351#M42771</guid>
      <dc:creator>splunkbacon</dc:creator>
      <dc:date>2017-01-03T19:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist specific accounts in Windows security log event 4663?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217352#M42772</link>
      <description>&lt;P&gt;Thank you.  I was able to get something similar to work after posting this.&lt;/P&gt;

&lt;P&gt;Does anyone know if these regex are case sensitive by default?  I believe we can't follow the regex with /i to ignore case?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 19:12:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217352#M42772</guid>
      <dc:creator>splunkbacon</dc:creator>
      <dc:date>2017-01-03T19:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist specific accounts in Windows security log event 4663?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217353#M42773</link>
      <description>&lt;P&gt;Regular expressions are always case sensitive. Since Splunk uses PCRE, you should be able to make a regular expression case-INsensitive by putting &lt;CODE&gt;(?i)&lt;/CODE&gt; at the beginning of the regex.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 20:50:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217353#M42773</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2017-01-03T20:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to blacklist specific accounts in Windows security log event 4663?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217354#M42774</link>
      <description>&lt;P&gt;Yes it is case sensitive&lt;BR /&gt;
try this one &lt;BR /&gt;
 blacklist1 = EventCode="4663" ComputerName=" Computer.name"  Message="\sAccount Name:\t\taccount1\s" &lt;/P&gt;

&lt;P&gt;blacklist2 = EventCode="4663" ComputerName=" Computer.name"  Message="\sAccount Name:\t\taccount2\s" &lt;/P&gt;

&lt;P&gt;blacklist3 = EventCode="4663" ComputerName=" Computer.name"  Message="\sAccount Name:\t\tComputername$\s" &lt;/P&gt;

&lt;P&gt;Or you can combine accounts by using pipe |.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Mar 2018 05:23:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-specific-accounts-in-Windows-security-log-event/m-p/217354#M42774</guid>
      <dc:creator>lredij</dc:creator>
      <dc:date>2018-03-09T05:23:22Z</dc:date>
    </item>
  </channel>
</rss>

