<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Universal Forwarder Blacklist: By event code,  process name, and account name in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431098#M75452</link>
    <description>&lt;P&gt;Thanks for the help Jacob but there are some issues with your regex statements.&lt;/P&gt;

&lt;P&gt;Yes I have my blacklists setup sequentially in the inputs.conf. I was also using examples from the Splunk_TA_windows inputs.conf.&lt;/P&gt;

&lt;P&gt;The first one says it should be both processes which it technically should be one of the two.&lt;/P&gt;

&lt;P&gt;Your second one puts an OR in between the account name and the process name which wouldn't work either.&lt;/P&gt;

&lt;P&gt;I just tried the below without capture groups:&lt;/P&gt;

&lt;P&gt;blacklist7 = EventCode="4674" Message="Account Name:.+slwprdadmin.+Process Name:.+\Windows\SysWOW64\wbem\WmiPrvSE.exe|.+\Windows\System32\wbem\WmiPrvSE.exe"&lt;/P&gt;

&lt;P&gt;Still doesn't work&lt;/P&gt;

&lt;P&gt;I have these other blacklists that work fine so this doesn't make any sense to me.&lt;/P&gt;

&lt;P&gt;blacklist5 = EventCode="4688" Message="(?:New Process Name:).+(?:SplunkUniversalForwarder\bin\splunk.exe)|.+(?:SplunkUniversalForwarder\bin\splunkd.exe)|.+(?:SplunkUniversalForwarder\bin\btool.exe)|.+(?:Splunk\bin\splunk.exe)|.+(?:Splunk\bin\splunkd.exe)|.+(?:Splunk\bin\btool.exe)|.+(?:Agent\MonitoringHost.exe)"&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 01:41:44 GMT</pubDate>
    <dc:creator>adalbor</dc:creator>
    <dc:date>2020-09-30T01:41:44Z</dc:date>
    <item>
      <title>Universal Forwarder Blacklist: By event code,  process name, and account name</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431094#M75448</link>
      <description>&lt;P&gt;Hey All,&lt;BR /&gt;
I am looking to add a blacklist entry to our inputs for our Windows UF's that would blacklist based on the event code, a process name (with wildcard path), and a specific account name.&lt;/P&gt;

&lt;P&gt;Would it be as simple as?:&lt;BR /&gt;
blacklist = EventCode="4674" User="user" Process_Name="*\blah.exe"&lt;/P&gt;

&lt;P&gt;Or would I need a regex with user and process name trying to match on the message field?&lt;/P&gt;

&lt;P&gt;Ive written some with Event Code and Process Name but never specific enough with a user.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;BR /&gt;
Andrew&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 17:36:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431094#M75448</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2019-08-07T17:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder Blacklist: By event code,  process name, and account name</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431095#M75449</link>
      <description>&lt;P&gt;Or  should it look like this?&lt;/P&gt;

&lt;P&gt;EventCode="4674" Message="(?:Account\sName:\s+ACCOUNTNAME).+(?:Process\sName:\s+?:\wbem\WmiPrvSE.exe)&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 17:59:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431095#M75449</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2019-08-07T17:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder Blacklist: By event code,  process name, and account name</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431096#M75450</link>
      <description>&lt;P&gt;This by all knowledge appears it should work but it doesnt.  Any ideas?&lt;/P&gt;

&lt;P&gt;blacklist7 = EventCode="4674" Message="(?:Account Name:.+ACCOUNT).+(?:Process Name:).+(?:\Windows\SysWOW64\wbem\WmiPrvSE.exe)|.+(?:\Windows\System32\wbem\WmiPrvSE.exe)"&lt;/P&gt;

&lt;P&gt;This matches most of the message in 2 regex tools.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 19:39:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431096#M75450</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2019-08-07T19:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder Blacklist: By event code,  process name, and account name</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431097#M75451</link>
      <description>&lt;P&gt;This is copied directly from the latest &lt;A href="https://splunkbase.splunk.com/app/742/" target="_blank"&gt;Splunk_TA_windows&lt;/A&gt; default &lt;CODE&gt;inputs.conf&lt;/CODE&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"
blacklist1 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope that helps. The only thing I can think of for your example is to remove the capturing groups since they aren't doing anything as far as I can tell. I'm also assuming you have blacklist1 through blacklist6 defined sequentially.&lt;/P&gt;

&lt;P&gt;Either:&lt;BR /&gt;
&lt;CODE&gt;blacklist7 = EventCode="4674" Message="Account Name:.+ACCOUNT.+Process Name:.+\\Windows\\SysWOW64\\wbem\\WmiPrvSE.exe.+\\Windows\\System32\\wbem\\WmiPrvSE.exe"&lt;/CODE&gt;&lt;BR /&gt;
or&lt;BR /&gt;
&lt;CODE&gt;blacklist7 = EventCode="4674" Message="(?:Account Name:.+ACCOUNT|Process Name:|\\Windows\\SysWOW64\\wbem\\WmiPrvSE.exe|\\Windows\\System32\\wbem\\WmiPrvSE.exe)"&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:41:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431097#M75451</guid>
      <dc:creator>jacobpevans</dc:creator>
      <dc:date>2020-09-30T01:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder Blacklist: By event code,  process name, and account name</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431098#M75452</link>
      <description>&lt;P&gt;Thanks for the help Jacob but there are some issues with your regex statements.&lt;/P&gt;

&lt;P&gt;Yes I have my blacklists setup sequentially in the inputs.conf. I was also using examples from the Splunk_TA_windows inputs.conf.&lt;/P&gt;

&lt;P&gt;The first one says it should be both processes which it technically should be one of the two.&lt;/P&gt;

&lt;P&gt;Your second one puts an OR in between the account name and the process name which wouldn't work either.&lt;/P&gt;

&lt;P&gt;I just tried the below without capture groups:&lt;/P&gt;

&lt;P&gt;blacklist7 = EventCode="4674" Message="Account Name:.+slwprdadmin.+Process Name:.+\Windows\SysWOW64\wbem\WmiPrvSE.exe|.+\Windows\System32\wbem\WmiPrvSE.exe"&lt;/P&gt;

&lt;P&gt;Still doesn't work&lt;/P&gt;

&lt;P&gt;I have these other blacklists that work fine so this doesn't make any sense to me.&lt;/P&gt;

&lt;P&gt;blacklist5 = EventCode="4688" Message="(?:New Process Name:).+(?:SplunkUniversalForwarder\bin\splunk.exe)|.+(?:SplunkUniversalForwarder\bin\splunkd.exe)|.+(?:SplunkUniversalForwarder\bin\btool.exe)|.+(?:Splunk\bin\splunk.exe)|.+(?:Splunk\bin\splunkd.exe)|.+(?:Splunk\bin\btool.exe)|.+(?:Agent\MonitoringHost.exe)"&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:41:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431098#M75452</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-09-30T01:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder Blacklist: By event code,  process name, and account name</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431099#M75453</link>
      <description>&lt;P&gt;Opened a ticket with support as I am unsure why I can't get this to work.  The first regex they suggested which also matched in a regex editor didn't work either. Still searching for a solution&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 14:33:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431099#M75453</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2019-08-13T14:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Universal Forwarder Blacklist: By event code,  process name, and account name</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431100#M75454</link>
      <description>&lt;P&gt;I ended up using this and it worked....for the most part lol.  We still have some events matching this blacklist coming in but we saw a reduction from 76mil events to right over 2mil events.&lt;/P&gt;

&lt;P&gt;blacklist7 = EventCode="4674" Message=".*[\S\s]*Account\sName:\s:.+ACCOUNT.+Process\sName:.+\Windows\SysWOW64\wbem\WmiPrvSE.exe|.+\Windows\System32\wbem\WmiPrvSE.exe"&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:47:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Universal-Forwarder-Blacklist-By-event-code-process-name-and/m-p/431100#M75454</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-09-30T01:47:19Z</dc:date>
    </item>
  </channel>
</rss>

