<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with Blacklisting and wildcards in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461847#M99512</link>
    <description>&lt;P&gt;Wait... here's the real page you want to look at:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/MonitorWindowseventlogdata"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/MonitorWindowseventlogdata&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Scroll down to &lt;STRONG&gt;Create advanced filters with 'whitelist' and 'blacklist'&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Following these syntax, you probably need something like:&lt;BR /&gt;
blacklist1 = EventCode="8004" Message="Workstation_name:\s+(?!SERVERNAME)"&lt;/P&gt;

&lt;P&gt;(note: haven't tested it -- just a guess).&lt;/P&gt;</description>
    <pubDate>Wed, 28 Aug 2019 15:25:55 GMT</pubDate>
    <dc:creator>memarshall63</dc:creator>
    <dc:date>2019-08-28T15:25:55Z</dc:date>
    <item>
      <title>Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461841#M99506</link>
      <description>&lt;P&gt;Trying to reduce some of the noise caused by NTLM failures by adding the following to our Windows Event Log stanza for our DC's:&lt;/P&gt;

&lt;P&gt;blacklist1 = EventCode="8004" Workstation_name=”SERVERNAME*”&lt;/P&gt;

&lt;P&gt;Due to a large server deployment, I'm using a wildcard at the end to filter out 8004 events from a group of servers with a common prefix. I can't get this working, is the wildcard throwing it off?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 16:14:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461841#M99506</guid>
      <dc:creator>asofo</dc:creator>
      <dc:date>2019-08-26T16:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461842#M99507</link>
      <description>&lt;P&gt;how is the event look like? could you provide a sample event?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 17:47:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461842#M99507</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2019-08-26T17:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461843#M99508</link>
      <description>&lt;P&gt;Sure:&lt;/P&gt;

&lt;P&gt;08/26/2019 12:34:20 PM&lt;BR /&gt;
LogName=Microsoft-Windows-NTLM/Operational&lt;BR /&gt;
SourceName=Microsoft-Windows-Security-Netlogon&lt;BR /&gt;
EventCode=8004&lt;BR /&gt;
EventType=4&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=#######&lt;BR /&gt;
User=NOT_TRANSLATED&lt;BR /&gt;
Sid=#####&lt;BR /&gt;
SidType=0&lt;BR /&gt;
TaskCategory=Auditing NTLM&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=#####&lt;BR /&gt;
Keywords=None&lt;BR /&gt;
Message=Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.&lt;BR /&gt;
Secure Channel name: ########&lt;BR /&gt;
User name: ##########&lt;BR /&gt;
Domain name: NULL&lt;BR /&gt;
Workstation name: #########&lt;BR /&gt;
Secure Channel type: 2&lt;/P&gt;

&lt;P&gt;Audit NTLM authentication requests within the domain NULL that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to any of the Deny options.&lt;/P&gt;

&lt;P&gt;If you want to allow NTLM authentication requests in the domain NULL, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.&lt;/P&gt;

&lt;P&gt;If you want to allow NTLM authentication requests to specific servers in the domain NULL, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in the domain NULL to which clients are allowed to use NTLM authentication.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 17:54:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461843#M99508</guid>
      <dc:creator>asofo</dc:creator>
      <dc:date>2019-08-26T17:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461844#M99509</link>
      <description>&lt;P&gt;Can you provide your whole stanza and which file it's in?&lt;/P&gt;

&lt;P&gt;I know that whitelists and blacklists in inputs.conf stanzas only use regular expressions, not search terms, but I may be I'm in the wrong neighborhood.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 23:20:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461844#M99509</guid>
      <dc:creator>memarshall63</dc:creator>
      <dc:date>2019-08-26T23:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461845#M99510</link>
      <description>&lt;P&gt;This is in our inputs.conf file in our deployment app.&lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;BR /&gt;
blacklist1 = EventCode="4662" Message="Object Type:\s+(?!groupPolicyContainer)"&lt;BR /&gt;
blacklist2 = EventCode="566" Message="Object Type:\s+(?!groupPolicyContainer)"&lt;BR /&gt;
blacklist3 = EventCode="8004" Workstation_name=”SERVERNAME*”&lt;BR /&gt;
blacklist4 = EventCode="8004" Workstation_name=”OTHERSERVERNAME*”&lt;BR /&gt;
index = wineventlog&lt;BR /&gt;
renderXml=false&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:54:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461845#M99510</guid>
      <dc:creator>asofo</dc:creator>
      <dc:date>2020-09-30T01:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461846#M99511</link>
      <description>&lt;P&gt;Hi..&lt;/P&gt;

&lt;P&gt;I've not had the opportunity to try to filter a Windows Event Log like that, but I can see the regex in blacklist1 and blacklist2 (the \s+).  So, I &lt;EM&gt;believe&lt;/EM&gt; that this file only use regex in blacklists.  So, that means the wildcard is being misinterpreted at best.  &lt;/P&gt;

&lt;P&gt;Is blacklist1 or blacklist2 working?  Those are at least closer to what I think should be here -- but even those I think might have issues.&lt;/P&gt;

&lt;P&gt;I think you may want to have a look at this:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Specifically, under the section: &lt;STRONG&gt;Keep specific events and discard the rest&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 13:08:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461846#M99511</guid>
      <dc:creator>memarshall63</dc:creator>
      <dc:date>2019-08-28T13:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461847#M99512</link>
      <description>&lt;P&gt;Wait... here's the real page you want to look at:&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/MonitorWindowseventlogdata"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/MonitorWindowseventlogdata&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Scroll down to &lt;STRONG&gt;Create advanced filters with 'whitelist' and 'blacklist'&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Following these syntax, you probably need something like:&lt;BR /&gt;
blacklist1 = EventCode="8004" Message="Workstation_name:\s+(?!SERVERNAME)"&lt;/P&gt;

&lt;P&gt;(note: haven't tested it -- just a guess).&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 15:25:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461847#M99512</guid>
      <dc:creator>memarshall63</dc:creator>
      <dc:date>2019-08-28T15:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Blacklisting and wildcards</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461848#M99513</link>
      <description>&lt;P&gt;Thanks! I'm looking into and testing this now. I'll let you know how I make out.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 15:38:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Problem-with-Blacklisting-and-wildcards/m-p/461848#M99513</guid>
      <dc:creator>asofo</dc:creator>
      <dc:date>2019-08-28T15:38:08Z</dc:date>
    </item>
  </channel>
</rss>

