<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [Windows] Blacklisting Event 4656 for system accounts only in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386607#M112836</link>
    <description>&lt;P&gt;You may have figured this out already, but the blacklist you are using is looking for a match in the Message for Account Name, but in this event you've posted that doesn't show up.&lt;/P&gt;

&lt;P&gt;You might want to filter out Splunk processes logging events so you could add a new copy of the blacklist line but change the&lt;BR /&gt;
Message="Account Name:(\W+\w+\$)"&lt;BR /&gt;
to&lt;BR /&gt;
Message="%SplunkUniversalForwarder%"&lt;/P&gt;

&lt;P&gt;That might work.&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jun 2019 13:04:37 GMT</pubDate>
    <dc:creator>alastor</dc:creator>
    <dc:date>2019-06-06T13:04:37Z</dc:date>
    <item>
      <title>[Windows] Blacklisting Event 4656 for system accounts only</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386601#M112830</link>
      <description>&lt;P&gt;Good morning everyone, having a bit of a tough time with this, as my blacklists and whitelists aren't working properly. Windows Event 4656 is noisy, and I'm looking to ingest ONLY the events tied to a peron's account, and not the system account. Within Windows, the system account name is denoted by a literal "$" appended to the system name (i.e. COMPUTER$). I've tried various forms of regex within a blacklist, and tried a negative whitelist (i.e. accept all 4656 (?!Account Name:\s+\w+\$)). I've also noticed that if I activate the negative whitelist, the regex also blocks events from EventCode 4670 from showing up.&lt;/P&gt;

&lt;P&gt;Splunk Enterprise 7.0.2&lt;BR /&gt;
Splunk Forwarder 7.0.2&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;05/08/2018 04:16:49 PM
LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4656
EventType=0
Type=Information
ComputerName=computer.domain.com
TaskCategory=Removable Storage
OpCode=Info
RecordNumber=91946348
Keywords=Audit Success
Message=A handle to an object was requested.

Subject:
    Security ID:        NT AUTHORITY\SYSTEM
    Account Name:       COMPUTER$
    Account Domain:     DOMAIN
    Logon ID:       0x3E7

Object:
    Object Server:      Security
    Object Type:        File
    Object Name:        C:\Program Files\SplunkUniversalForwarder\var\lib\splunk\modinputs\WinEventLog\application
    Handle ID:      0x290
    Resource Attributes:    -

Process Information:
    Process ID:     0x4adc
    Process Name:       C:\Program Files\SplunkUniversalForwarder\bin\splunk-winevtlog.exe

Access Request Information:
    Transaction ID:     {00000000-0000-0000-0000-000000000000}
    Accesses:       READ_CONTROL
                SYNCHRONIZE
                WriteData (or AddFile)
                AppendData (or AddSubdirectory or CreatePipeInstance)
                WriteEA
                ReadAttributes
                WriteAttributes

    Access Reasons:     READ_CONTROL:   Granted by Ownership
                SYNCHRONIZE:    Granted by  D:(A;;FA;;;SY)
                WriteData (or AddFile): Granted by  D:(A;;FA;;;SY)
                AppendData (or AddSubdirectory or CreatePipeInstance):  Granted by  D:(A;;FA;;;SY)
                WriteEA:    Granted by  D:(A;;FA;;;SY)
                ReadAttributes: Granted by  D:(A;;FA;;;SY)
                WriteAttributes:    Granted by  D:(A;;FA;;;SY)

    Access Mask:        0x120196
    Privileges Used for Access Check:   -
    Restricted SID Count:   0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Regex used and currently Working for Similar Events (4663,4670):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist2 = EventCode="(4663|4670)" Message="Account Name:\W+\w+\$"
blacklist3 = EventCode="(5447)" Message="Account Name:\s+\S+LOCAL SERVICE"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Regex attempted and currently failing for event 4656&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist4 = EventCode="(4656)" Message="Account Name:\W+\w+\$"
#Results in all 4656 being blacklisted, not just the COMPUTER$ account events
whitelist1 = EventCode="(4656)" Message="Account Name:(?!\W+\w+\$)"
#Results in 4656 being filtered, and 4670, and 4663 not showing up.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Confirmed both 4656 blacklist and whitelist regex pull proper events while in SPL search by using &lt;CODE&gt;| regex Message=&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Where do I go from here?&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 13:23:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386601#M112830</guid>
      <dc:creator>Rhin0Crash</dc:creator>
      <dc:date>2018-05-09T13:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: [Windows] Blacklisting Event 4656 for system accounts only</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386602#M112831</link>
      <description>&lt;P&gt;I'm realizing now that the whitelist approach won't be the way to go.&lt;/P&gt;

&lt;P&gt;Events with the same regex working, but 4656 still failing:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;blacklist2 = EventCode="(4656|4670|4663|4703|4658)" Message="Account Name:(\W+\w+\$)"
#results in 4670,4663,4658 coming through with no COMPUTER$ events, but 4656 still doesn't show up
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 May 2018 14:03:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386602#M112831</guid>
      <dc:creator>Rhin0Crash</dc:creator>
      <dc:date>2018-05-09T14:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: [Windows] Blacklisting Event 4656 for system accounts only</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386603#M112832</link>
      <description>&lt;P&gt;For completeness sake, can you share an example of a 4656 event without a $ that should come through?&lt;/P&gt;

&lt;P&gt;Really weird that it works for other events, but not for this one...&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 14:10:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386603#M112832</guid>
      <dc:creator>FrankVl</dc:creator>
      <dc:date>2018-05-09T14:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: [Windows] Blacklisting Event 4656 for system accounts only</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386604#M112833</link>
      <description>&lt;P&gt;Added below&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 14:13:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386604#M112833</guid>
      <dc:creator>Rhin0Crash</dc:creator>
      <dc:date>2018-05-09T14:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: [Windows] Blacklisting Event 4656 for system accounts only</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386605#M112834</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;05/08/2018 04:16:50 PM
LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4656
EventType=0
Type=Information
ComputerName=computer.domain.com
TaskCategory=Removable Storage
OpCode=Info
RecordNumber=91946924
Keywords=Audit Success
Message=A handle to an object was requested.

Subject:
    Security ID:        DOMAIN\t-rex
    Account Name:       t-rex
    Account Domain:     DOMAIN
    Logon ID:       0x93270A40

Object:
    Object Server:      Security
    Object Type:        File
    Object Name:        C:\Program Files\SplunkUniversalForwarder\etc\apps
    Handle ID:      0x1f4
    Resource Attributes:    -

Process Information:
    Process ID:     0x50d4
    Process Name:       C:\Program Files\SplunkUniversalForwarder\bin\splunkd.exe

Access Request Information:
    Transaction ID:     {00000000-0000-0000-0000-000000000000}
    Accesses:       READ_CONTROL
                SYNCHRONIZE
                ReadData (or ListDirectory)

    Access Reasons:     READ_CONTROL:   Granted by  D:(A;;FA;;;BA)
                SYNCHRONIZE:    Granted by  D:(A;;FA;;;BA)
                ReadData (or ListDirectory):    Granted by  D:(A;;FA;;;BA)

    Access Mask:        0x120001
    Privileges Used for Access Check:   -
    Restricted SID Count:   0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 09 May 2018 14:20:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386605#M112834</guid>
      <dc:creator>Rhin0Crash</dc:creator>
      <dc:date>2018-05-09T14:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: [Windows] Blacklisting Event 4656 for system accounts only</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386606#M112835</link>
      <description>&lt;P&gt;The behaviour described doesn't make much sense, so I'm wondering if you maybe have some config lingering around from an earlier attempt or so that messes up the results?&lt;/P&gt;

&lt;P&gt;Can you try running btool on the respective forwarder to see what input config is getting applied?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk btool inputs list --debug
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And just to be sure: you don't have any props and transforms config that is also doing some filtering/routing that could affect this?&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 08:18:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386606#M112835</guid>
      <dc:creator>FrankVl</dc:creator>
      <dc:date>2018-05-10T08:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: [Windows] Blacklisting Event 4656 for system accounts only</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386607#M112836</link>
      <description>&lt;P&gt;You may have figured this out already, but the blacklist you are using is looking for a match in the Message for Account Name, but in this event you've posted that doesn't show up.&lt;/P&gt;

&lt;P&gt;You might want to filter out Splunk processes logging events so you could add a new copy of the blacklist line but change the&lt;BR /&gt;
Message="Account Name:(\W+\w+\$)"&lt;BR /&gt;
to&lt;BR /&gt;
Message="%SplunkUniversalForwarder%"&lt;/P&gt;

&lt;P&gt;That might work.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 13:04:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Windows-Blacklisting-Event-4656-for-system-accounts-only/m-p/386607#M112836</guid>
      <dc:creator>alastor</dc:creator>
      <dc:date>2019-06-06T13:04:37Z</dc:date>
    </item>
  </channel>
</rss>

