<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to exclude the Windows events with Splunk process before indexing? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342389#M101429</link>
    <description>&lt;P&gt;Hi&lt;BR /&gt;
following &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.2/Forwarding/Routeandfilterdatad"&gt;http://docs.splunk.com/Documentation/Splunk/6.6.2/Forwarding/Routeandfilterdatad&lt;/A&gt; put in your indexers something like this:&lt;/P&gt;

&lt;P&gt;in props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
 TRANSFORMS-set-exclude=set_exclude,set_nullqueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[set_exclude]
 REGEX=.
 DEST_KEY = queue
 FORMAT = indexQueue

 [set_nullqueue]
 REGEX=C:\\Program Files\\SplunkUniversalForwarder\\bin\\\*
 DEST_KEY=queue
 FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 31 Jul 2017 14:43:30 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2017-07-31T14:43:30Z</dc:date>
    <item>
      <title>How to exclude the Windows events with Splunk process before indexing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342383#M101423</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I see a lot of events in Windows logs with Process splunk-regmon, powershell etc. Is there a way to exclude the processes before indexing?&lt;/P&gt;

&lt;P&gt;message contains:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;C:\Program Files\SplunkUniversalForwarder\bin\*
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 28 Jul 2017 16:40:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342383#M101423</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-07-28T16:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude the Windows events with Splunk process before indexing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342384#M101424</link>
      <description>&lt;P&gt;i think its better to disable the monitoring of regmon if possible&lt;BR /&gt;
if you want to filter events, start here:&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.2/Forwarding/Routeandfilterdatad"&gt;http://docs.splunk.com/Documentation/Splunk/6.6.2/Forwarding/Routeandfilterdatad&lt;/A&gt;&lt;BR /&gt;
hope it helps&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 17:32:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342384#M101424</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2017-07-28T17:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude the Windows events with Splunk process before indexing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342385#M101425</link>
      <description>&lt;P&gt;Hi Adonio, &lt;/P&gt;

&lt;P&gt;I tried&lt;/P&gt;

&lt;P&gt;blacklist3 = EventCode="4688" Message="New Process Name: (?i)^(C:\Program Files\Splunk(?:UniversalForwarder)?\bin\(?:btool|splunkd|splunk|splunk-(?:MonitorNoHandle|admon|netmon|perfmon|powershell|regmon|winevtlog|winhostinfo|winprintmon|wmi)).exe)" in inputs.conf, its not working. Is there anything I have to change in it.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jul 2017 19:00:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342385#M101425</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-07-28T19:00:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude the Windows events with Splunk process before indexing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342386#M101426</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/168759"&gt;@kiran331&lt;/a&gt;&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
blacklist3 = EventCode="4688" New_Process_Name="C:\Program Files\SplunkUniversalForwarder\bin\*"&lt;/P&gt;

&lt;P&gt;I hope New_Process_Name as been extracted.&lt;/P&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;BR /&gt;
blacklist3 = EventCode="4688" Message="A new process has been created."&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:09:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342386#M101426</guid>
      <dc:creator>sbbadri</dc:creator>
      <dc:date>2020-09-29T15:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude the Windows events with Splunk process before indexing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342387#M101427</link>
      <description>&lt;P&gt;I tried blacklist3 = EventCode="4688" New_Process_Name="C:\Program Files\SplunkUniversalForwarder\bin\*", it dint worked&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:06:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342387#M101427</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2020-09-29T15:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude the Windows events with Splunk process before indexing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342388#M101428</link>
      <description>&lt;P&gt;you are missing a "\" at the end after bin\&lt;BR /&gt;
there supposed to be 2 of them \&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2017 14:37:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342388#M101428</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2017-07-31T14:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to exclude the Windows events with Splunk process before indexing?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342389#M101429</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;
following &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.2/Forwarding/Routeandfilterdatad"&gt;http://docs.splunk.com/Documentation/Splunk/6.6.2/Forwarding/Routeandfilterdatad&lt;/A&gt; put in your indexers something like this:&lt;/P&gt;

&lt;P&gt;in props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
 TRANSFORMS-set-exclude=set_exclude,set_nullqueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;in transforms.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[set_exclude]
 REGEX=.
 DEST_KEY = queue
 FORMAT = indexQueue

 [set_nullqueue]
 REGEX=C:\\Program Files\\SplunkUniversalForwarder\\bin\\\*
 DEST_KEY=queue
 FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2017 14:43:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-exclude-the-Windows-events-with-Splunk-process-before/m-p/342389#M101429</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-07-31T14:43:30Z</dc:date>
    </item>
  </channel>
</rss>

