<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to filter Windows Event 4663 at indexing time? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373196#M109767</link>
    <description>&lt;P&gt;Did you restart splunkd after making these changes?&lt;/P&gt;</description>
    <pubDate>Mon, 21 Aug 2017 17:01:15 GMT</pubDate>
    <dc:creator>skoelpin</dc:creator>
    <dc:date>2017-08-21T17:01:15Z</dc:date>
    <item>
      <title>How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373189#M109760</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;How to filter out wineventlog with "EventCode 4663" and "Accesses: ReadData (or ListDirectory)", using props.conf and transforms.conf below is sample event.&lt;/P&gt;

&lt;P&gt;08/17/2017 01:35:55 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4663&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=abc.cde&lt;BR /&gt;
TaskCategory=Removable Storage&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=2326&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=An attempt was made to access an object.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
    Security ID:        S-1-5-80-1390545455-656-4545454545&lt;BR /&gt;
    Account Name:       AAAADDDDDD&lt;BR /&gt;
    Account Domain:     NT SERVICE&lt;BR /&gt;
    Logon ID:       0xC8184&lt;/P&gt;

&lt;P&gt;Object:&lt;BR /&gt;
    Object Server:      Security&lt;BR /&gt;
    Object Type:        File&lt;BR /&gt;
    Object Name:        D:\Program Files\dir\test\tt.exe&lt;BR /&gt;
    Handle ID:      0x11a5c&lt;BR /&gt;
    Resource Attributes:&lt;BR /&gt;
Process Information:&lt;BR /&gt;
    Process ID:     0x224&lt;BR /&gt;
    Process Name:       D:\Program Files\dir\test\tt.exe&lt;/P&gt;

&lt;P&gt;Access Request Information:&lt;BR /&gt;
    Accesses:       ReadData (or ListDirectory)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Access Mask:        0x1
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 17 Aug 2017 18:50:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373189#M109760</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-08-17T18:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373190#M109761</link>
      <description>&lt;P&gt;Check out this doc:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/6.6.0/Forwarding/Routeandfilterdatad"&gt;Router and Filter Data&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Do a ctrl+f on your browser and search for &lt;CODE&gt;setnull&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2017 18:56:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373190#M109761</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2017-08-17T18:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373191#M109762</link>
      <description>&lt;P&gt;I tried below, its not working, did I miss anything?&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set-null=set_null&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;/P&gt;

&lt;P&gt;[set_null]&lt;BR /&gt;
REGEX="(?msi)EventCode=4663.*readdata|EventCode=4663.*listdirectory"&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:27:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373191#M109762</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2020-09-29T15:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373192#M109763</link>
      <description>&lt;P&gt;Try this regex instead. &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;(EventCode=4663*.readdata|EventCode=4663.*listdirectory)&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2017 21:10:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373192#M109763</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2017-08-18T21:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373193#M109764</link>
      <description>&lt;P&gt;I tried, its not working.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2017 21:24:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373193#M109764</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-08-18T21:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373194#M109765</link>
      <description>&lt;P&gt;[set_null_1]&lt;BR /&gt;
REGEX=EventCode=4663.*readdata&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;[set_null_2]&lt;BR /&gt;
REGEX=EventCode=4663.*listdirectory&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;try two seperate stanza's and call them out in props. Sometimes regex is funky with the ".*" and "|" matches in preindexing. &lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:27:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373194#M109765</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2020-09-29T15:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373195#M109766</link>
      <description>&lt;P&gt;I tried, its not filtering out the events, I'm also using one more regex to filter out splunk events, May be this is caousing the issue.&lt;/P&gt;

&lt;P&gt;props.conf:&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set-exclude=set_exclude,set_nullqueue&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set-null1=set_null_1&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set-null2=set_null_2&lt;/P&gt;

&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;P&gt;[set_exclude]&lt;BR /&gt;
REGEX=.&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = indexQueue&lt;/P&gt;

&lt;P&gt;[set_nullqueue]&lt;BR /&gt;
REGEX=C:\Program Files\SplunkUniversalForwarder\bin\*&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;[set_null_1]&lt;BR /&gt;
REGEX=EventCode=4663.*readdata&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;[set_null_2]&lt;BR /&gt;
REGEX=EventCode=4663.*listdirectory&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:28:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373195#M109766</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2020-09-29T15:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373196#M109767</link>
      <description>&lt;P&gt;Did you restart splunkd after making these changes?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2017 17:01:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373196#M109767</guid>
      <dc:creator>skoelpin</dc:creator>
      <dc:date>2017-08-21T17:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373197#M109768</link>
      <description>&lt;P&gt;yes, I restarted all Indexers &lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2017 17:07:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373197#M109768</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-08-21T17:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373198#M109769</link>
      <description>&lt;P&gt;As a test, remove  the  ".* " and everything after it from your regexes and see if that works.  &lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2017 17:09:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373198#M109769</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2017-08-21T17:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373199#M109770</link>
      <description>&lt;P&gt;I removed everything after EventCode, it filtered out all Event with 4663.&lt;/P&gt;

&lt;P&gt;[set_remove]&lt;BR /&gt;
REGEX = EventCode=4663&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:28:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373199#M109770</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2020-09-29T15:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373200#M109771</link>
      <description>&lt;P&gt;is it filtering out all of those events? &lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2017 18:14:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373200#M109771</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2017-08-21T18:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373201#M109772</link>
      <description>&lt;P&gt;yes, it filtering all events with 4663 Eventcodes, but I have filter out with Accesses: ReadData (or ListDirectory)&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2017 18:16:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373201#M109772</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2017-08-21T18:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373202#M109773</link>
      <description>&lt;P&gt;yeah, so you'll need to find the right RegEx match to filter out what you need. I use .* or .+ in my extractions, but for some reason, during pre-indexing Splunk doesn't like those big wildcards. &lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2017 18:18:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373202#M109773</guid>
      <dc:creator>tmarlette</dc:creator>
      <dc:date>2017-08-21T18:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373203#M109774</link>
      <description>&lt;P&gt;Hi kiran331,&lt;BR /&gt;
following Splunk documentation &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Routeandfilterdatad&lt;/A&gt; you have to create props.conf and transforms.conf:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;TRANSFORMS-set-null=set_parsing,set_null
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[set_parsing]
REGEX = .
DEST_KEY = queue
FORMAT = indexQueue

[set_null]
REGEX=(?ms)EventCode\=4663.*Accesses:\sReadData\s\(or\sListDirectory\)
DEST_KEY=queue
FORMAT=nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Beware to the order of stanzas in TRANSFORMS command in props.conf, instead order in transforms.conf it's not important.&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 08:02:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373203#M109774</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-08-22T08:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373204#M109775</link>
      <description>&lt;P&gt;Hi Cusello,&lt;/P&gt;

&lt;P&gt;Its still indexing Read Events. Below are my config files, Did I miss anthing?&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;P&gt;[WinEventLog:Security]&lt;/P&gt;

&lt;H1&gt;Returns most of the space savings XML would provide&lt;/H1&gt;

&lt;P&gt;SEDCMD-clean0 = s/(?m)(^\s+[^:]+:)\s+-?$/\1/g s/(?m)(^\s+[^:]+:)\s+-?$/\1/g s/(?m)(:)(\s+NULL SID)$/\1/g s/(?m)(ID:)(\s+0x0)$/\1/g&lt;/P&gt;

&lt;H1&gt;Returns most of the space savings XML would provide&lt;/H1&gt;

&lt;P&gt;SEDCMD-clean1 = s/This event is generated[\S\s\r\n]+$//g&lt;BR /&gt;
SEDCMD-clean2 = s/Certificate information is only[\S\s\r\n]+$//g&lt;/P&gt;

&lt;H1&gt;addresses most of the Ipv6 log event issues&lt;/H1&gt;

&lt;P&gt;SEDCMD-clean3 = s/::ffff://g&lt;/P&gt;

&lt;H1&gt;FIX #1&lt;/H1&gt;

&lt;P&gt;SEDCMD-clean4 = s/Token Elevation Type indicates[\S\s\r\n]+$//g&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set-null=set_parsing,set_null&lt;/P&gt;

&lt;P&gt;TRANSFORMS-set-exclude=set_nullqueue&lt;/P&gt;

&lt;P&gt;transforms.conf:&lt;/P&gt;

&lt;P&gt;[Target_Server_Name_as_dest_nt_host]&lt;BR /&gt;
SOURCE_KEY = Target_Server_Name&lt;BR /&gt;
REGEX = ^(?!localhost)([\]+)?([^-].*)&lt;BR /&gt;
FORMAT = dest_nt_host::"$2"&lt;/P&gt;

&lt;P&gt;[Target_Server_Name_as_dest]&lt;BR /&gt;
SOURCE_KEY = Target_Server_Name&lt;BR /&gt;
REGEX = ^(?!localhost)([\]+)?([^-].*)&lt;BR /&gt;
FORMAT = dest::"$2"&lt;/P&gt;

&lt;P&gt;[set_parsing]&lt;BR /&gt;
REGEX= .&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=indexQueue&lt;/P&gt;

&lt;P&gt;[set_null]&lt;BR /&gt;
REGEX=(?ms)EventCode=4663.*Accesses:\sReadData\s(or\sListDirectory)&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;[set_nullqueue]&lt;BR /&gt;
REGEX=C:\Program Files\SplunkUniversalForwarder\bin\*&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:28:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373204#M109775</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2020-09-29T15:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to filter Windows Event 4663 at indexing time?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373205#M109776</link>
      <description>&lt;P&gt;Hi kiran331,&lt;BR /&gt;
Parentheses are special characters for regex so you must put a backslash before them where they are in the search string.&lt;BR /&gt;
So the regex of set_null stanza is&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(?ms)EventCode\=4663.*Accesses:\sReadData\s\(or\sListDirectory\)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2017 16:37:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-Windows-Event-4663-at-indexing-time/m-p/373205#M109776</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-08-22T16:37:39Z</dc:date>
    </item>
  </channel>
</rss>

