<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277092#M53115</link>
    <description>&lt;P&gt;in your opinion what is the best way to index ONLY events security specified in INPUTS.conf and only for users defined by me?&lt;BR /&gt;
you must also keep SetNull?&lt;/P&gt;</description>
    <pubDate>Thu, 05 Nov 2015 15:49:10 GMT</pubDate>
    <dc:creator>amadmin</dc:creator>
    <dc:date>2015-11-05T15:49:10Z</dc:date>
    <item>
      <title>How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277086#M53109</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;I installed Splunk Enterprise to a single instance and am installing the Splunk Universal Forwarder.&lt;BR /&gt;
The goal is to index only Windows security event logs of Windows login success, failed, and logout.&lt;/P&gt;

&lt;P&gt;I have configured the PROPS file on the server as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[default]

[csv]
CHECK_FOR_HEADER = false

[WinEventLog:Security]
# MODIFICARE: Filtro sugli gli eventi WinEventLog Security locali (server Splunk)
TRANSFORMS-wineventlog_security = SetNull, GetLocalWinAdmin
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and TRANSFORMS:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[SetNull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[GetLocalWinAdmin]
# Filtro per prendere log(falliti e non) e logoff solo di tutti gli Admin (Win2000/3 e Win2008)
#REGEX =(?msi)EventCode=(?:5(?:28|29|3[0-8]|40)|46(?:24|25|34|47|48))\s
#REGEX =(?msi)EventCode=(?:5(?:29|3[0-7])|4625)|EventCode=(?:5(28|38|40)|46(?:24|34|47|48))\s+.+(?:(?:User|Account)\s+Name:|(?:Nome\s+(?:utente|account):))\s+(?:Admin|Administrator|user1|user2|user3)\s

source="WinEventLog:*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;on FORWARDER servers I configured the file inputs and outputs as follows:&lt;/P&gt;

&lt;P&gt;INPUTS:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
checkpointInterval = 5
disabled = 0
current_only = 1 
evt_resolve_ad_obj = 1
# start_from = newest
whitelist = 528,538,540,529,530,531,532,533,534,535,536,537,539,4624,4625,4634,4648,4672,4625,4771
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;OUTPUTS:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[tcpout]
defaultGroup = default-autolb-group

[tcpout:default-autolb-group]
server = SPLUNK.domain.local:9997
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;At present I have received some data source with 2:&lt;BR /&gt;
WinEventLog: Application&lt;BR /&gt;
WinEventLog: System&lt;/P&gt;

&lt;P&gt;but not of WinEventLog: Security !!!! That is what I'm interested in.&lt;BR /&gt;
I do not understand why it's not working. Can anyone help?&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 11:31:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277086#M53109</guid>
      <dc:creator>amadmin</dc:creator>
      <dc:date>2015-10-20T11:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277087#M53110</link>
      <description>&lt;P&gt;This stanza is broken:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[GetLocalWinAdmin]
# Filtro per prendere log(falliti e non) e logoff solo di tutti gli Admin (Win2000/3 e Win2008)
#REGEX =(?msi)EventCode=(?:5(?:28|29|3[0-8]|40)|46(?:24|25|34|47|48))\s
#REGEX =(?msi)EventCode=(?:5(?:29|3[0-7])|4625)|EventCode=(?:5(28|38|40)|46(?:24|34|47|48))\s+.+(?:(?:User|Account)\s+Name:|(?:Nome\s+(?:utente|account):))\s+(?:Admin|Administrator|user1|user2|user3)\s
source="WinEventLog:*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Replace it with this (or similar; you may need to fix &lt;CODE&gt;REGEX&lt;/CODE&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[GetLocalWinAdmin]
REGEX=(?m)^EventCode=(?:5(?:28|29|3[0-8]|40)|46(?:24|25|34|47|48))\s
DEST_KEY=queue
FORMAT=indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;P.S. Forget my first (wrong) answer (now deleted).&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2015 16:56:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277087#M53110</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-10-30T16:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277088#M53111</link>
      <description>&lt;P&gt;because wrong?&lt;BR /&gt;
thanks to the previous answer, now I get events WinEventLog: Security &lt;BR /&gt;
but, I want to index only WinEventLog: Security&lt;/P&gt;

&lt;P&gt;It could indicate TRANSFORMS.conf entire file? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2015 10:35:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277088#M53111</guid>
      <dc:creator>amadmin</dc:creator>
      <dc:date>2015-11-02T10:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277089#M53112</link>
      <description>&lt;P&gt;It appears that you are trying to do 2 levels of filtering.&lt;BR /&gt;
The first level is &lt;CODE&gt;whitelisting&lt;/CODE&gt; by &lt;CODE&gt;EventCode&lt;/CODE&gt;.  You have configured this correctly so that only EventCodes in the whitelist should be forwarded.  If you keep my first answer (which was remove &lt;CODE&gt;SetNull&lt;/CODE&gt; from the &lt;CODE&gt;TRANSFORMS-&lt;/CODE&gt; line), then you will get no additional filtering and you will get some (the whitelisted) events.  If you keep &lt;CODE&gt;SetNull&lt;/CODE&gt; and would like to use it to do &lt;EM&gt;additional&lt;/EM&gt; filtering, then you need to make sure that you use a RegEx that works to pull events back out of the &lt;CODE&gt;nullQueue&lt;/CODE&gt; (the way you have it right now, it has no RegEx so it is as though it does not exist so all events go into the &lt;CODE&gt;nullQueue&lt;/CODE&gt; and none are pulled back out).&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 00:11:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277089#M53112</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-11-03T00:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277090#M53113</link>
      <description>&lt;P&gt;thanks for the reply woodcock.&lt;BR /&gt;
it is exactly like that, I want to do two levels of filtering.&lt;BR /&gt;
the first whitelisting by EventCode now is OK, for the second filter I would keep SetNull. how can I make a RegEx suitable for this?&lt;/P&gt;

&lt;P&gt;Thanks to all for any suggestion.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 14:09:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277090#M53113</guid>
      <dc:creator>amadmin</dc:creator>
      <dc:date>2015-11-03T14:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277091#M53114</link>
      <description>&lt;P&gt;Take a look at my answer; just make sure that you are specifying a valid &lt;CODE&gt;REGEX&lt;/CODE&gt; and it should work just fine.  You will have to restart the Splunk instances on your Indexers, though, and it will only apply to events that are indexed after the restarts.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 14:27:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277091#M53114</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-11-03T14:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277092#M53115</link>
      <description>&lt;P&gt;in your opinion what is the best way to index ONLY events security specified in INPUTS.conf and only for users defined by me?&lt;BR /&gt;
you must also keep SetNull?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 15:49:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277092#M53115</guid>
      <dc:creator>amadmin</dc:creator>
      <dc:date>2015-11-05T15:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277093#M53116</link>
      <description>&lt;P&gt;I would like written on index Splunk only event from WinEventLog: // Security&lt;BR /&gt;
whith EventCode 528,538,540,529,530,531,532,533,534,535,536,537,539,4624,4625,4634,4648,4672,4625,4711&lt;BR /&gt;
in my case it is useful to use SetNull, and how? &lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2015 17:03:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277093#M53116</guid>
      <dc:creator>amadmin</dc:creator>
      <dc:date>2015-11-06T17:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my configuration to index security event logs for Windows success/failed login and logout events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277094#M53117</link>
      <description>&lt;P&gt;If you only need to filter on EventCode, then you do not need &lt;EM&gt;anything&lt;/EM&gt; in &lt;CODE&gt;props.conf&lt;/CODE&gt;, not &lt;CODE&gt;transforms.conf&lt;/CODE&gt;; your whitelist in &lt;CODE&gt;inputs.conf&lt;/CODE&gt; should work just fine.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Nov 2015 04:10:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-do-I-edit-my-configuration-to-index-security-event-logs-for/m-p/277094#M53117</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-11-07T04:10:07Z</dc:date>
    </item>
  </channel>
</rss>

