<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extracting details from windows logs in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523809#M147773</link>
    <description>&lt;P&gt;You can extract the fields and then do further searches e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "Process Name:\s+(?&amp;lt;ProcessName&amp;gt;\S+)"
| where like(ProcessName, "%cmd.exe")&lt;/LI-CODE&gt;&lt;P&gt;It then depends what else you want to do. What do you want to correlate other events with? You can do a lot of things, so long as the data is there, there is usually a way to extract information, although to be fair some are easier than others and possibly not all are possible.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2020 20:06:38 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2020-10-08T20:06:38Z</dc:date>
    <item>
      <title>Extracting details from windows logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523789#M147761</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="spicynuggs_1-1602182883224.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11220i7830905BF5E6B4D9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="spicynuggs_1-1602182883224.png" alt="spicynuggs_1-1602182883224.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hi I'm new to splunk and hope you guys are having a good day!&lt;BR /&gt;&lt;BR /&gt;How can I query and extract out the information from this event field? Example I would like to the object value name and the change information. From there i'll create a column and display it values extracted.&lt;BR /&gt;&lt;BR /&gt;I feel that the windows log itself is quite difficult to search due to the limited number of fields&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 18:50:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523789#M147761</guid>
      <dc:creator>spicynuggs</dc:creator>
      <dc:date>2020-10-08T18:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting details from windows logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523795#M147762</link>
      <description>&lt;LI-CODE lang="markup"&gt;| rex "Object Value Name:\s+(?&amp;lt;ObjectValueName&amp;gt;\S+)"
| rex "Old Value Type:\s+(?&amp;lt;OldValueType&amp;gt;\S+)"
| rex "Old Value:\s+(?&amp;lt;OldValue&amp;gt;\S+)"
| rex "New Value Type:\s+(?&amp;lt;NewValueType&amp;gt;\S+)"
| rex "New Value:\s+(?&amp;lt;NewValue&amp;gt;\S+)"&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 08 Oct 2020 19:16:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523795#M147762</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-08T19:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting details from windows logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523799#M147764</link>
      <description>&lt;P&gt;Hey! Thanks I think my mistake was with the my regex...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Just a follow up question, with my current results, would I be able to search from my current index and add on other details to correlate? or is there another way around it?&lt;/P&gt;&lt;P&gt;Right now,&amp;nbsp; i would like to add any activity with cmd.exe to correlate or event id specific&lt;/P&gt;&lt;P&gt;Thank you so much&lt;BR /&gt;&lt;BR /&gt;edit: found out about sub-search, but any advice or tips would be appreicated too&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 19:39:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523799#M147764</guid>
      <dc:creator>spicynuggs</dc:creator>
      <dc:date>2020-10-08T19:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: Extracting details from windows logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523809#M147773</link>
      <description>&lt;P&gt;You can extract the fields and then do further searches e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "Process Name:\s+(?&amp;lt;ProcessName&amp;gt;\S+)"
| where like(ProcessName, "%cmd.exe")&lt;/LI-CODE&gt;&lt;P&gt;It then depends what else you want to do. What do you want to correlate other events with? You can do a lot of things, so long as the data is there, there is usually a way to extract information, although to be fair some are easier than others and possibly not all are possible.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 20:06:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Extracting-details-from-windows-logs/m-p/523809#M147773</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-08T20:06:38Z</dc:date>
    </item>
  </channel>
</rss>

