<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Event Excessive Logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341847#M86060</link>
    <description>&lt;P&gt;Has anyone inserted this in the inputs.conf that has the appropriate regex to make this work?&lt;/P&gt;</description>
    <pubDate>Fri, 20 Mar 2020 18:42:16 GMT</pubDate>
    <dc:creator>avery2007</dc:creator>
    <dc:date>2020-03-20T18:42:16Z</dc:date>
    <item>
      <title>What might be the reason for excessive logs in Windows event?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341844#M86057</link>
      <description>&lt;P&gt;I have around 800 users in my environment and the count of 4624 and 4634 is around 80,000 for the last 15 minutes. What might be the reason.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 21:27:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341844#M86057</guid>
      <dc:creator>omprakash9998</dc:creator>
      <dc:date>2023-02-21T21:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Event Excessive Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341845#M86058</link>
      <description>&lt;P&gt;if your problem is too much verbose events from wineventlog, causing higher license usage&lt;BR /&gt;
you can a use a blacklist filter on the splunk inputs.conf to exclude them from the monitoring.&lt;/P&gt;

&lt;P&gt;see wineventlog whitelist/blacklist settings&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.1/Data/MonitorWindowseventlogdata"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.1/Data/MonitorWindowseventlogdata&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 20:00:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341845#M86058</guid>
      <dc:creator>yannK</dc:creator>
      <dc:date>2017-12-19T20:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Event Excessive Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341846#M86059</link>
      <description>&lt;P&gt;Pro Tip:&lt;/P&gt;

&lt;P&gt;Decide which login events you really care about (maybe check with security team if applicable)&lt;BR /&gt;
However, most of your 4624s will probably be LoginType 3 - Which is network access - you may see this every time you access anything on the network, even if you don't actually open/edit a file etc.&lt;/P&gt;

&lt;P&gt;You may decide that you only care about:&lt;BR /&gt;
LoginType 2 - Interactive (ie with a keyboard attached to the system) &lt;BR /&gt;
Type7 - Unlocking a workstation, or &lt;BR /&gt;
Type 10 - remote Interactive (ie RDP/remote access etc)&lt;/P&gt;

&lt;P&gt;you could blacklist types 1,3,4,5,6,8,9 and reduce your login events to a fraction of what you have right now, whilst preserving the most important/relevant ones.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;blacklist = EventCode="4624" Message="LogonType=(1|3|4|5|6|8|9)"&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;or to just drop type 3&lt;BR /&gt;
&lt;CODE&gt;blacklist1 = EventCode="4624" Message="LogonType=3"&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 20:29:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341846#M86059</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2017-12-19T20:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Event Excessive Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341847#M86060</link>
      <description>&lt;P&gt;Has anyone inserted this in the inputs.conf that has the appropriate regex to make this work?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2020 18:42:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/341847#M86060</guid>
      <dc:creator>avery2007</dc:creator>
      <dc:date>2020-03-20T18:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Event Excessive Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/631762#M108271</link>
      <description>&lt;P&gt;While years late, hopefully this helps someone out in the future. This works:&lt;/P&gt;&lt;P&gt;blacklist1 = EventCode="4624" Message="Logon Type:\s+3"&lt;BR /&gt;blacklist2 = EventCode="4634" Message="Logon Type:\s+3"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 21:18:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/631762#M108271</guid>
      <dc:creator>96nick</dc:creator>
      <dc:date>2023-02-21T21:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Event Excessive Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/740913#M117772</link>
      <description>&lt;P&gt;Just one line:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;blacklist1 = EventCode="46[23]4" Message="Logon Type:\s+3"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 11:53:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/What-might-be-the-reason-for-excessive-logs-in-Windows-event/m-p/740913#M117772</guid>
      <dc:creator>jotne</dc:creator>
      <dc:date>2025-03-05T11:53:17Z</dc:date>
    </item>
  </channel>
</rss>

