<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query for creation of registry keys in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655383#M53912</link>
    <description>&lt;P&gt;Your initial search can find all the events in your index (within the time constraints of the search) which have the string in&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your index&amp;gt; "4657"&lt;/LI-CODE&gt;</description>
    <pubDate>Wed, 23 Aug 2023 16:52:24 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2023-08-23T16:52:24Z</dc:date>
    <item>
      <title>How to create search for creation of registry keys?</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655347#M53906</link>
      <description>&lt;P&gt;Hi, I just started Splunk yesterday and was looking for proper syntax for trying to search for the creation of registry keys on all machines and if possible, how to get alerts for deleted reg keys. I havent touched every dashboard in Splunk but I imagine a simple table that includes all machines in the network with reg key counts would be the way to go. Im not sure about the alerts part for deleted keys&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 19:55:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655347#M53906</guid>
      <dc:creator>Chase</dc:creator>
      <dc:date>2023-08-23T19:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: Query for creation of registry keys</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655348#M53907</link>
      <description>&lt;P&gt;The first thing you need to do is understand the data you have in Splunk. What events have you already ingested?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 14:20:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655348#M53907</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-08-23T14:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Query for creation of registry keys</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655371#M53910</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/259925"&gt;@Chase&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;as usual to havea result in Splunk requires 70% of knowledge of the matter to search and less than 30% of Splunk knowledge.&lt;/P&gt;&lt;P&gt;You need a knowledge about windows registry keys registration or deletion, so you should search which are the EventCodes to use in search,&lt;/P&gt;&lt;P&gt;in your case , probably the Eventcodes to use are:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;4657	A registry value was modified
5039	A registry key was virtualized&lt;/LI-CODE&gt;&lt;P&gt;I cannot help you more because I'm not a windows expert.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 15:46:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655371#M53910</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-08-23T15:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: Query for creation of registry keys</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655381#M53911</link>
      <description>&lt;P&gt;I did see that event code on listed as response to someone asking a previous question and after attempting to pipe it to our index it said "unknown search cmd '4657'". What is the proper syntax for searching eventcodes?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 16:28:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655381#M53911</guid>
      <dc:creator>Chase</dc:creator>
      <dc:date>2023-08-23T16:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Query for creation of registry keys</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655383#M53912</link>
      <description>&lt;P&gt;Your initial search can find all the events in your index (within the time constraints of the search) which have the string in&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your index&amp;gt; "4657"&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 23 Aug 2023 16:52:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655383#M53912</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-08-23T16:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Query for creation of registry keys</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655391#M53916</link>
      <description>&lt;P&gt;Ok so after trying that string with my index and switching the time search to 'All time', (and got a ton of irrelevant hits, I opened one of the hits and found "EventID" had its own field. Just as a reference for anyone else looking at this issue later:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Chase_0-1692810932218.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/26949iD7479BBAA3E3598C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Chase_0-1692810932218.png" alt="Chase_0-1692810932218.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;A search without that field option gives 5,800+ events. 99 is about what I expect from an index that started 8 days ago. Ty for the help&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 17:21:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655391#M53916</guid>
      <dc:creator>Chase</dc:creator>
      <dc:date>2023-08-23T17:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Query for creation of registry keys</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655437#M53923</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/259925"&gt;@Chase&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;this is usually named EventCode on windows logs:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog EventCode=4657&lt;/LI-CODE&gt;&lt;P&gt;beware to the field name that's case sensistive.&lt;/P&gt;&lt;P&gt;In addition, if possible try to avoid "All time" in your searches because it's a too expensive and long search.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 06:11:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655437#M53923</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-08-24T06:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: Query for creation of registry keys</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655456#M53926</link>
      <description>&lt;P&gt;OK, so now you have learned that your data has fields which you can use to refine your search, as you have done. This is the sort of thing you need to understand about your data. Don't forget that, we can only provide answers based on the information you give us, although we can make educated guesses based on experience, but they may not always be correct.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 08:26:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/How-to-create-search-for-creation-of-registry-keys/m-p/655456#M53926</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-08-24T08:26:50Z</dc:date>
    </item>
  </channel>
</rss>

