<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extracting multiple values in a Splunk Search in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490293#M8278</link>
    <description>&lt;P&gt;Reference:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;DS-Install-Replica 9923a32a-3607-11d2-b9be-0000f87a36b2 
DS-Replication-Manage-Topology 1131f6ac-9c07-11d1-f79f-00c04fc2dcd2
Schema-Id-Guid 19195a5b-6da0-11d0-afd3-00c04fd930c9
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;cf. &lt;A href="https://www.praetorian.com/blog/active-directory-visualization-for-blue-teams-and-threat-hunters"&gt;https://www.praetorian.com/blog/active-directory-visualization-for-blue-teams-and-threat-hunters&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your search
| rex max_match=0 "[^%](?&amp;lt;guid&amp;gt;{.*})"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;try &lt;CODE&gt;rex max_match&lt;/CODE&gt; . this command exclude &lt;EM&gt;Object Type&lt;/EM&gt; and &lt;EM&gt;Object Name&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Mar 2020 11:36:15 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2020-03-11T11:36:15Z</dc:date>
    <item>
      <title>Extracting multiple values in a Splunk Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490291#M8276</link>
      <description>&lt;P&gt;**Hi All, I need help extracting {0000000-0000-0000-0000-000000000000} and  {0000000-0000-0000-0000-000000000000} from the log sample below during search. This is what i have so far:&lt;/P&gt;

&lt;P&gt;sourcetype=wineventlog EventCode="4662" Account_Name="&lt;EM&gt;\$" Access_Mask=0x100 (Object_Type="%{19195a5b-6da0-11d0-afd3-00c04fd930c9}" OR ObjectT_ype="domainDNS")  | rex field=Message "Properties: (?P[^\s]+) {1131f6ad-9c07-11d1-f79f-00c04fc2dcd2} "  | rex field=Message "Properties: (?P[^\s]+) {9923a32a-3607-11d2-b9be-0000f87a36b2} " | rex field=Message "Properties: (?P[^\s]+) {1131f6ac-9c07-11d1-f79f-00c04fc2dcd2} "&lt;BR /&gt;
Please help me fix this search.&lt;/EM&gt;*&lt;/P&gt;

&lt;P&gt;LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4662&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=gghasfv.net&lt;BR /&gt;
TaskCategory=Directory Service Access&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=0000000&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=An operation was performed on an object.&lt;/P&gt;

&lt;P&gt;Subject :&lt;BR /&gt;
    Security ID:        S-1-5-21-0000000-0000-0000-0000-000000000000&lt;BR /&gt;
    Account Name:       NAME$&lt;BR /&gt;
    Account Domain:     GOAL&lt;BR /&gt;
    Logon ID:       GOAL&lt;/P&gt;

&lt;P&gt;Object:&lt;BR /&gt;
    Object Server:      DS&lt;BR /&gt;
    Object Type:        %{0000000-0000-0000-0000-000000000000}&lt;BR /&gt;
    Object Name:        %{0000000-0000-0000-0000-000000000000}&lt;BR /&gt;
    Handle ID:&lt;/P&gt;

&lt;P&gt;Operation:&lt;BR /&gt;
    Operation Type:     Object Access&lt;BR /&gt;
    Accesses:       Control Access&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Access Mask:        0x100
Properties:     Control Access
    {0000000-0000-0000-0000-000000000000}
{0000000-0000-0000-0000-000000000000}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Additional Information:&lt;BR /&gt;
    Parameter 1:&lt;BR /&gt;
    Parameter 2&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:32:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490291#M8276</guid>
      <dc:creator>enymanu</dc:creator>
      <dc:date>2020-09-30T04:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting multiple values in a Splunk Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490292#M8277</link>
      <description>&lt;P&gt;If this is properly structured xml or json just use mvexpand on your multi-value field. You can also pipe that to "search" for a specific value in the MV field.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/Mvexpand"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/Mvexpand&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 05:23:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490292#M8277</guid>
      <dc:creator>codebuilder</dc:creator>
      <dc:date>2020-03-11T05:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting multiple values in a Splunk Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490293#M8278</link>
      <description>&lt;P&gt;Reference:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;DS-Install-Replica 9923a32a-3607-11d2-b9be-0000f87a36b2 
DS-Replication-Manage-Topology 1131f6ac-9c07-11d1-f79f-00c04fc2dcd2
Schema-Id-Guid 19195a5b-6da0-11d0-afd3-00c04fd930c9
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;cf. &lt;A href="https://www.praetorian.com/blog/active-directory-visualization-for-blue-teams-and-threat-hunters"&gt;https://www.praetorian.com/blog/active-directory-visualization-for-blue-teams-and-threat-hunters&lt;/A&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your search
| rex max_match=0 "[^%](?&amp;lt;guid&amp;gt;{.*})"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;try &lt;CODE&gt;rex max_match&lt;/CODE&gt; . this command exclude &lt;EM&gt;Object Type&lt;/EM&gt; and &lt;EM&gt;Object Name&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 11:36:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490293#M8278</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-03-11T11:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting multiple values in a Splunk Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490294#M8279</link>
      <description>&lt;P&gt;This is my updated search. It is not filtering the properties.&lt;/P&gt;

&lt;P&gt;sourcetype=wineventlog (EventCode="4662" Account_Name="&lt;EM&gt;\$" Access_Mask=0x100 (Object_Type="%{19195a5b-6da0-11d0-afd3-00c04fd930c9}" OR Object_Type="domainDNS")) OR (EventCode="4624" session_id!="NT AUTHORITY&lt;/EM&gt;" Account_Domain!="Window Manager") | rex max_match=0 "&lt;A href="https://community.splunk.com/?%7B.*%7D" target="_blank"&gt;^%&lt;/A&gt;" | search (guid="&lt;EM&gt;{1131f6ad-9c07-11d1-f79f-00c04fc2dcd2}&lt;/EM&gt;" OR guid = "&lt;EM&gt;{9923a32a-3607-11d2-b9be-0000f87a36b2}&lt;/EM&gt;" OR guid = "&lt;EM&gt;{1131f6ac-9c07-11d1-f79f-00c04fc2dcd2}&lt;/EM&gt;")&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:33:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490294#M8279</guid>
      <dc:creator>enymanu</dc:creator>
      <dc:date>2020-09-30T04:33:00Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting multiple values in a Splunk Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490295#M8280</link>
      <description>&lt;P&gt;&lt;EM&gt;guid&lt;/EM&gt; is multivalue. &lt;CODE&gt;search&lt;/CODE&gt; can't work.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=wineventlog  ("{1131f6ad-9c07-11d1-f79f-00c04fc2dcd2}" OR "{9923a32a-3607-11d2-b9be-0000f87a36b2}" OR "{1131f6ac-9c07-11d1-f79f-00c04fc2dcd2}") (EventCode="4662" OR EventCode="4624")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;How is this? &lt;BR /&gt;
I guess if extra results appear, use&lt;CODE&gt;NOT&lt;/CODE&gt;&lt;BR /&gt;
you can do it.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 21:12:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490295#M8280</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-03-11T21:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting multiple values in a Splunk Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490296#M8281</link>
      <description>&lt;P&gt;This works fine but it slow. Is there away it can be accelerated&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 23:54:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490296#M8281</guid>
      <dc:creator>enymanu</dc:creator>
      <dc:date>2020-03-11T23:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting multiple values in a Splunk Search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490297#M8282</link>
      <description>&lt;P&gt;&lt;CODE&gt;(EventCode="4662" Account_Name="\$" Access_Mask=0x100 (Object_Type="%{19195a5b-6da0-11d0-afd3-00c04fd930c9}" OR Object_Type="domainDNS"))&lt;/CODE&gt; can use on same way.It will be faster.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 07:53:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Extracting-multiple-values-in-a-Splunk-Search/m-p/490297#M8282</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-03-12T07:53:24Z</dc:date>
    </item>
  </channel>
</rss>

