<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: building a search on windows event security logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51112#M9811</link>
    <description>&lt;P&gt;Thank you very much, I am trying that now!  I appreciate the help, my regex looked nothing like that...&lt;/P&gt;</description>
    <pubDate>Tue, 01 Mar 2011 19:23:25 GMT</pubDate>
    <dc:creator>udiggity</dc:creator>
    <dc:date>2011-03-01T19:23:25Z</dc:date>
    <item>
      <title>building a search on windows event security logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51108#M9807</link>
      <description>&lt;P&gt;I'm trying to build a search on windows event logs, that will exclude activity by the real time antivirus scanner and return a list of users in order of amount of data accessed... Not sure if this is possible.  Below is the line I'd like to filter on as that is the av program.  Can anyone point me in the right direction... Should point out that I am very new to Splunk and don't know much about the build in searching tools (reading doc now)&lt;/P&gt;

&lt;P&gt;Image File Name:    E:\Program Files\CA\eTrustITM\InoRT.exe&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2011 23:11:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51108#M9807</guid>
      <dc:creator>udiggity</dc:creator>
      <dc:date>2011-02-28T23:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: building a search on windows event security logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51109#M9808</link>
      <description>&lt;P&gt;Looking high level, you have two different options. If your logs are absolutely filled with those entries, you can filter them out altogether so that they won't be in Splunk. How to do that is dependent on how you are getting the event log data into Splunk (e.g., WMI, Lasso, etc.). Answers.splunk.com and Splunk Documentation is filled with questions about how to do that, but here's a couple that might be useful:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;A href="http://www.splunk.com/base/Documentation/latest/Admin/Routeandfilterdata" rel="nofollow"&gt;http://www.splunk.com/base/Documentation/latest/Admin/Routeandfilterdata&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="http://www.splunk.com/support/forum:SplunkGeneral/2247" rel="nofollow"&gt;http://www.splunk.com/support/forum:SplunkGeneral/2247&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;A simpler approach, though, would be to just exclude it from your search. For example, if a search for Windows Security Event Logs is &lt;CODE&gt;sourcetype=windows_security&lt;/CODE&gt; you could run:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=windows_security NOT "Image File Name: E:\Program Files\CA\eTrustITM\InoRT.exe"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That will leave you with the security event log information, excluding the AV activity. Apart from cleanliness and speed, the big advantage of the first approach is that it won't count against your quota.  &lt;/P&gt;

&lt;P&gt;Hopefully that answers your question.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2011 23:42:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51109#M9808</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2011-02-28T23:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: building a search on windows event security logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51110#M9809</link>
      <description>&lt;P&gt;Thank you I'll try this, Yeah I tried filtering it in the props and transforms files but couldn't get the regex to work right.  I am filtering on multiple system accounts succesfully at the moment so I'm fairly certain it is just a matter of getting the proper regex string. I am using WMI to get the EV logs from my windows servers.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2011 01:36:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51110#M9809</guid>
      <dc:creator>udiggity</dc:creator>
      <dc:date>2011-03-01T01:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: building a search on windows event security logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51111#M9810</link>
      <description>&lt;P&gt;Ah, yeah. That does sound like a regex issue, if you're able to filter out other events from the source. I'd go with the regex: &lt;BR /&gt;
Image File Name: .*?InoRT.exe&lt;BR /&gt;
myself. That should match InoRT.exe anywhere in the event, which I'd guess is good enough for your needs. You should be able to use the full string, but you'll likely need to escape the slashes. I haven't done event filtering myself, but I would expect that you would need to replace every \ with \.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2011 02:19:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51111#M9810</guid>
      <dc:creator>David</dc:creator>
      <dc:date>2011-03-01T02:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: building a search on windows event security logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51112#M9811</link>
      <description>&lt;P&gt;Thank you very much, I am trying that now!  I appreciate the help, my regex looked nothing like that...&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:23:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51112#M9811</guid>
      <dc:creator>udiggity</dc:creator>
      <dc:date>2011-03-01T19:23:25Z</dc:date>
    </item>
    <item>
      <title>Re: building a search on windows event security logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51113#M9812</link>
      <description>&lt;P&gt;Thanks, that regex string did it!  I really appreciate the help.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2011 19:56:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/building-a-search-on-windows-event-security-logs/m-p/51113#M9812</guid>
      <dc:creator>udiggity</dc:creator>
      <dc:date>2011-03-01T19:56:36Z</dc:date>
    </item>
  </channel>
</rss>

