<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create a Windows process monitoring alert? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591757#M13703</link>
    <description>&lt;P&gt;I am looking for a Alert query for monitoring the windows process&lt;/P&gt;
&lt;P&gt;below is the scenario&lt;/P&gt;
&lt;P&gt;1. Lookup having a field name called "host" and "Process"&lt;/P&gt;
&lt;P&gt;2. windows index query where the process gets updating in the field called "Name" and we have host field as well by default.&lt;/P&gt;
&lt;P&gt;3. Query needs to pick the value from the "host" and "Process" from the lookup and finds the matching in the windows based index query, events should generate in Splunk results&lt;/P&gt;
&lt;P&gt;Kindly assist.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Apr 2022 14:44:27 GMT</pubDate>
    <dc:creator>sureshkumaar</dc:creator>
    <dc:date>2022-04-13T14:44:27Z</dc:date>
    <item>
      <title>How to create a Windows process monitoring alert?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591757#M13703</link>
      <description>&lt;P&gt;I am looking for a Alert query for monitoring the windows process&lt;/P&gt;
&lt;P&gt;below is the scenario&lt;/P&gt;
&lt;P&gt;1. Lookup having a field name called "host" and "Process"&lt;/P&gt;
&lt;P&gt;2. windows index query where the process gets updating in the field called "Name" and we have host field as well by default.&lt;/P&gt;
&lt;P&gt;3. Query needs to pick the value from the "host" and "Process" from the lookup and finds the matching in the windows based index query, events should generate in Splunk results&lt;/P&gt;
&lt;P&gt;Kindly assist.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 14:44:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591757#M13703</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-13T14:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591760#M13704</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;if the Process name in the lookup is the same of the Process field in events, you could use something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=your_index NOT [| inputlookup your_lookup.csv | fields host Process ]
| ...&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 12:36:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591760#M13704</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-31T12:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591761#M13705</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;- i am getting the process names that aren't in the lookup also, where as i am looking only when both process name in lookup and index is matching&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 12:44:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591761#M13705</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-03-31T12:44:22Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591766#M13706</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;sorry I forgot a part of the search, please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=your_index [| inputlookup your_lookup.csv | fields host Process ]
| eval host=lower(host), Process=lower(Process)
| stats count BY host Process
| append [ | inputlookup your_Process_Lookup.csv | eval host=lower(host), Process=lower(Process), count=0 | fields | eval host Process count ]
| stats sum(count) AS total BY host Process
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;In this way you monitor all the processes in your systems but only the ones listed in the lookup.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 13:12:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591766#M13706</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-31T13:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591769#M13707</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;getting error while trying to execute it&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Error in 'eval' command: Failed to parse the provided arguments. Usage: eval dest_key = expression.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 13:25:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591769#M13707</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-03-31T13:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591770#M13708</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;are you sure that you used the comma between the two expressions like my sample?&lt;/P&gt;&lt;P&gt;Could you share your search?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 13:29:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591770#M13708</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-31T13:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591784#M13709</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I understand that your query is picking the values from one lookup and appending to another lookup&lt;BR /&gt;&lt;BR /&gt;but actually my requirement, Splunk should show events when the values of host and process matches from one specific LOOKUP table when it matches with values of host and process which comes from the index query it should give the value&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 13:46:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591784#M13709</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-03-31T13:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591800#M13710</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;my approach is related to the requirement to find the processes that aren't present in the events.&lt;/P&gt;&lt;P&gt;using my search you have the count of events for each present process then you add one entry for each process that should be present, in this way you have a value=0 when in your lookup there a process for an host without events.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 15:02:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591800#M13710</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-03-31T15:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591925#M13712</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; I have these many fields in the lookup "windows_process"&lt;/P&gt;&lt;P&gt;host Process ResolutionID Assignment_Team Escalation_Team Urgency autocloser CI Attribute&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Is there any way to pick the value of "host" and "Process" from the lookup and match with values of "host" and "Process" which comes from the index=windows sourcetype=process?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 10:31:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591925#M13712</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-01T10:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591926#M13713</link>
      <description>&lt;P&gt;it should return host and Process results if the values from the lookup isn't coming/occurring as events through index&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 10:32:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591926#M13713</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-01T10:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591945#M13714</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows sourcetype=process [| inputlookup windows_proscess | fields host Process ]
| eval host=lower(host), Process=lower(Process)
| stats count BY host Process
| append [ | inputlookup your_Process_Lookup.csv | eval host=lower(host), Process=lower(Process), count=0 | fields | eval host Process count ]
| stats sum(count) AS total BY host Process
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:38:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/591945#M13714</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-04-01T13:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592143#M13730</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;From the query you provided, in the look where this inputlookup is mentioned, can you please let me know do we need to create an empty lookup with host, Process and count fields? where the values gets captured from index and the existing lookup&amp;nbsp;windows_proscess?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| inputlookup your_Process_Lookup.csv&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 07:43:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592143#M13730</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-04T07:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592150#M13731</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as you said, you already should have the lookup "&lt;SPAN&gt;windows_process"&amp;nbsp;&lt;/SPAN&gt;containing at least two columns (the other columns aren't relevant for the check).&lt;/P&gt;&lt;P&gt;You need this lookup to have a perimeter to check, but you said that youalready have it.&lt;/P&gt;&lt;P&gt;In my search you can use it adding a value for the check, but it isn't a column of your lookup, to use only for the check.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 08:28:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592150#M13731</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-04-04T08:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592166#M13732</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp; - Please find the snapshot where i am getting error using same lookup name in both the inputlookup&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Windows process.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18911iE263F95E78199DBD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Windows process.PNG" alt="Windows process.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 09:42:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592166#M13732</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-04T09:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592174#M13733</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;sorry cut &amp;amp; past error!&lt;/P&gt;&lt;P&gt;please try this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows sourcetype=process [| inputlookup windows_proscess | fields host Process ]
| eval host=lower(host), Process=lower(Process)
| stats count BY host Process
| append [ | inputlookup your_Process_Lookup.csv | eval host=lower(host), Process=lower(Process), count=0 | fields host Process count ]
| stats sum(count) AS total BY host Process
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 10:10:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592174#M13733</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-04-04T10:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592851#M13742</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for providing the query, i believe this query will show the results for all the process matching with lookup and index based process events.&lt;/P&gt;&lt;P&gt;Can we modify this query a little bit and see where we can see if the process from the lookup isn't coming in the index based process?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 08:16:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592851#M13742</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-07T08:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592853#M13743</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;as I said, I would show you the approach so you can adapt my hint to your real needs!&lt;/P&gt;&lt;P&gt;tell me if I can help you more, otherwise, please, accept one answer for the other people of Community.&lt;/P&gt;&lt;P&gt;Good luck and happy splunking.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated by all the Contributors &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 08:21:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592853#M13743</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-04-07T08:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592891#M13744</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;To test the query, i created one sample lookup "Test1.csv" and added only 2 entries and when i run the query those 2 entries are getting displayed in the result.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Where as it shouldn't get displayed in the results for this query as those 2 processes are sending events to the index&lt;/P&gt;&lt;P&gt;Process gets updated in lookup table field called "Process"&lt;/P&gt;&lt;P&gt;in Index process name gets updated in the field called "Name"&lt;/P&gt;&lt;P&gt;when these 2 matches we shouldn't be seeing the results, but we are seeing results&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Windows process_1.PNG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/18982i4E1499B22AB7352C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Windows process_1.PNG" alt="Windows process_1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 12:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592891#M13744</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-07T12:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592897#M13745</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206567"&gt;@sureshkumaar&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;it's correct: in this way you found the pair host/Process present in lookup and not present in main search results, in other words missed.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 12:43:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/592897#M13745</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-04-07T12:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: Windows process monitoring Alert</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/593422#M13747</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in the INDEX query we are able to the see process related events returning.&lt;/P&gt;&lt;P&gt;And my doubt here is the process name is getting updated in the field called "Name" in the INDEX based query&lt;BR /&gt;how it is able to check and match the name which is in the lookup ("Process")&amp;nbsp;field?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2022 09:46:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-a-Windows-process-monitoring-alert/m-p/593422#M13747</guid>
      <dc:creator>sureshkumaar</dc:creator>
      <dc:date>2022-04-12T09:46:04Z</dc:date>
    </item>
  </channel>
</rss>

