<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do I blacklist Logon Type 3 and Account Names in Windows Security logs? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265906#M50973</link>
    <description>&lt;P&gt;I am working with a customer that is trying to narrow down their Windows Security logs.  They would like to isolate the Event Code to only 4732,4624, while excluding Logon Type "3" and the list of Account Names.  This stanza does not seem to be working and I was hoping someone might be able to assist with either cleaning it up or suggesting a better solution.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security] 
whitelist1 = 4732,4624
disabled = 0 
followTail = 0
index = xxxxx
ignoreOlderThan = 2d
sourcetype=xxxx_wineventlog_sec
blacklist1 = Message="Logon\sType:\s+(3|(\w+\$))"
blacklist2 = Message="Account\sName:\s+(srvcy*|potalogp|micsperf|sssa|srvHPOM|srvc2cansible|(\w+\$))"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Oct 2016 18:29:11 GMT</pubDate>
    <dc:creator>CaptainHook</dc:creator>
    <dc:date>2016-10-19T18:29:11Z</dc:date>
    <item>
      <title>How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265906#M50973</link>
      <description>&lt;P&gt;I am working with a customer that is trying to narrow down their Windows Security logs.  They would like to isolate the Event Code to only 4732,4624, while excluding Logon Type "3" and the list of Account Names.  This stanza does not seem to be working and I was hoping someone might be able to assist with either cleaning it up or suggesting a better solution.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security] 
whitelist1 = 4732,4624
disabled = 0 
followTail = 0
index = xxxxx
ignoreOlderThan = 2d
sourcetype=xxxx_wineventlog_sec
blacklist1 = Message="Logon\sType:\s+(3|(\w+\$))"
blacklist2 = Message="Account\sName:\s+(srvcy*|potalogp|micsperf|sssa|srvHPOM|srvc2cansible|(\w+\$))"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2016 18:29:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265906#M50973</guid>
      <dc:creator>CaptainHook</dc:creator>
      <dc:date>2016-10-19T18:29:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265907#M50974</link>
      <description>&lt;P&gt;In which way is not working?  Is neither filter working?  Or one but not the other?  &lt;/P&gt;

&lt;P&gt;I'm not sure if/how relevant, but the documentation mentions putting delimiters around the regex expression.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;* key=regex format
  * A whitespace-separated list of event log components to match, and
    regexes to match against against them.
  * There can be one match expression or multiple per line.
  * The key must belong to the set of valid keys provided below.
  * The regex consists of a leading delimiter, the regex expression, and a
    trailing delimeter. Examples: %regex%, *regex*, "regex"
  * When multiple match expressions are present, they are treated as a
    logical AND.  In other words, all expressions must match for the line to
    apply to the event.
  * If the value represented by the key does not exist, it is not considered
    a match, regardless of the regex.
  * Example:
    whitelist = EventCode=%^200$% User=%jrodman%
    Include events only if they have EventCode 200 and relate to User jrodman
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 19 Oct 2016 22:22:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265907#M50974</guid>
      <dc:creator>maciep</dc:creator>
      <dc:date>2016-10-19T22:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265908#M50975</link>
      <description>&lt;P&gt;It seems as if the filter for the logon type and the Account name work separately, but together they do not.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2016 13:38:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265908#M50975</guid>
      <dc:creator>CaptainHook</dc:creator>
      <dc:date>2016-10-20T13:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265909#M50976</link>
      <description>&lt;P&gt;The documentation does say that they would be AND'd together.  So if both blacklist entries are there, are Logon Type 3 events excluded for those particular users?   That's the way I think it would work.&lt;/P&gt;

&lt;P&gt;Not sure what the solution would be, maybe find a way to whitelist one of those conditions instead?  For example, whitelist any Messages that don't equal Logon Type 3? &lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2016 14:36:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265909#M50976</guid>
      <dc:creator>maciep</dc:creator>
      <dc:date>2016-10-20T14:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265910#M50977</link>
      <description>&lt;P&gt;I think the issue is that the &lt;CODE&gt;Message&lt;/CODE&gt; field contains more than just the Logon or the Account Name. If there's other stuff in the Message then I think you need to say that in the regex:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; blacklist1 = Message=".*Logon\sType:\s+(3|(\w+\$)).*"
 blacklist2 = Message=".*Account\sName:\s+(srvcy*|potalogp|micsperf|sssa|srvHPOM|srvc2cansible|(\w+\$)).*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;See the &lt;CODE&gt;.*&lt;/CODE&gt; before and after?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2016 21:30:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265910#M50977</guid>
      <dc:creator>sloshburch</dc:creator>
      <dc:date>2016-10-20T21:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265911#M50978</link>
      <description>&lt;P&gt;I think I misread the documentation, so you can ignore the comment about them being AND'd together.  I think that is only if multiple expression in one blacklist entry.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2016 23:29:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265911#M50978</guid>
      <dc:creator>maciep</dc:creator>
      <dc:date>2016-10-20T23:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265912#M50979</link>
      <description>&lt;P&gt;Sorry for the delayed response...&lt;BR /&gt;
This is not working either; I am starting to think this may need to be handled from another approach.  The whitelist for !=LogonType 3 sounds interesting, but I am not certain on how to write that in.  Any suggestions there?  Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 14:27:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265912#M50979</guid>
      <dc:creator>CaptainHook</dc:creator>
      <dc:date>2016-10-28T14:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265913#M50980</link>
      <description>&lt;P&gt;This is the configuration that I have been able to get working. I appreciate all the assistance as this literally came down to trial and error.&lt;/P&gt;

&lt;P&gt;whitelist1 = 4732,4624&lt;BR /&gt;
blacklist = Message="Logon\sType:\t+3"&lt;BR /&gt;
blacklist1 = Message="Account\sName:\t+(srvcy*|potalogp|micsperf|sssa|srvHPOM|srvc2cansible)"&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Oct 2016 13:45:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265913#M50980</guid>
      <dc:creator>CaptainHook</dc:creator>
      <dc:date>2016-10-29T13:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265914#M50981</link>
      <description>&lt;P&gt;Some regex tools: &lt;A href="http://www.regexr.com/"&gt;http://www.regexr.com/&lt;/A&gt; and &lt;A href="https://regex101.com/"&gt;https://regex101.com/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2016 16:54:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/265914#M50981</guid>
      <dc:creator>sloshburch</dc:creator>
      <dc:date>2016-10-31T16:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: How do I blacklist Logon Type 3 and Account Names in Windows Security logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/538640#M90251</link>
      <description>&lt;P&gt;This was the trick for me :&amp;nbsp;&lt;/P&gt;&lt;P&gt;it worked when I added % arround my regex like follow :&amp;nbsp;%&amp;lt;Data Name='LogonType'&amp;gt;3&amp;lt;\/Data&amp;gt;%&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 16:18:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-blacklist-Logon-Type-3-and-Account-Names-in-Windows/m-p/538640#M90251</guid>
      <dc:creator>fulldanad</dc:creator>
      <dc:date>2021-02-04T16:18:52Z</dc:date>
    </item>
  </channel>
</rss>

