<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Comparing 2 Windows Event logs together in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360194#M165290</link>
    <description>&lt;P&gt;Thanks!  That worked out.  I had to adjust the Application name because in the 5156 it uses the Application portion as&lt;BR /&gt;
\device\harddiskvolume4&amp;lt; path to app &amp;gt;&lt;BR /&gt;
instead of &lt;BR /&gt;
c:\&lt;BR /&gt;
took some manipulation but it works!  I appreciate the help!&lt;/P&gt;</description>
    <pubDate>Sun, 12 Nov 2017 15:00:59 GMT</pubDate>
    <dc:creator>dirtyspawn</dc:creator>
    <dc:date>2017-11-12T15:00:59Z</dc:date>
    <item>
      <title>Comparing 2 Windows Event logs together</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360190#M165286</link>
      <description>&lt;P&gt;I am kind of new so I apologize to my ignorance.&lt;BR /&gt;
What I am trying to do is use the Windows Event Logs EventCode 5156 and 4688&lt;BR /&gt;
I want to search via 5156, it provides the PID and the Process making the connection.  I want to be able to then use the information from the 5156 to find the 4688 for that process which provides its command line arguments.  Any ideas?&lt;/P&gt;</description>
      <pubDate>Sat, 11 Nov 2017 22:00:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360190#M165286</guid>
      <dc:creator>dirtyspawn</dc:creator>
      <dc:date>2017-11-11T22:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing 2 Windows Event logs together</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360191#M165287</link>
      <description>&lt;P&gt;Complication - there are multiple 5156 events for each 4688, aren't there?  I mean, it's POSSIBLE a new process is created for EACH connection, but it truly seems bizarrely unlikely.&lt;/P&gt;

&lt;P&gt;That means you have to either &lt;/P&gt;

&lt;P&gt;a) bundle ALL The 5156's that go with the 4688 together (not hard but may have performance implications)&lt;/P&gt;

&lt;P&gt;b) only "group" the first 5156 that goes with the 4688 (even easier and with lower performance hit - but probably not what you want)&lt;/P&gt;

&lt;P&gt;c) group each 5156 with it's corresponding 4688 with the 5156 duplicated into each (really hard problem?  Not sure yet).&lt;/P&gt;

&lt;P&gt;d) actually thought of another way - if we built a lookup table of the 4688 events, since there should be far fewer of those, we could perhaps use that as a lookup for the 5156 events.  This may also be able to be done as a subsearch (not sure which would be best yet).  What is the time frame you are looking at?  Specifically, how much lag could we before you get the information?  Would a minute or 5 minutes be too much lag because you are trying for sub-minute alerts, or would a minute or a few minutes be OK?&lt;/P&gt;

&lt;P&gt;So I'd like to ask if answer A or B would work?  Though honestly option D sounds pretty interesting and I think it would be useful for my own uses too...&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2017 03:07:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360191#M165287</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-11-12T03:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing 2 Windows Event logs together</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360192#M165288</link>
      <description>&lt;P&gt;Sounds like  you want a subsearch&lt;/P&gt;

&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventCode=4688 [|search EventCode=5156 | fields + Process_ID Application_Name | rename Process_ID as New_Process_ID Application_Name as New_Process_Name]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you have an index for windows events, it would be good to use that as well.  The query turns Process_ID and Application_Name from event 5156 into search terms for event 4688.  Since Event 4648 has different field names, we have to rename the fields from 5156.&lt;/P&gt;

&lt;P&gt;I am not familiar with these EventCodes, so it could be that instead of New_Process_ID  and New_Process_Name, you may need Creator_Process_ID and Creator_Process_Name&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 16:42:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360192#M165288</guid>
      <dc:creator>MonkeyK</dc:creator>
      <dc:date>2020-09-29T16:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing 2 Windows Event logs together</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360193#M165289</link>
      <description>&lt;P&gt;Nice, MonkeyK!  I must've been tired last night, I kept starting from the 4688 side instead of just going backwards from the 5156 side.  This way makes so much more sense!&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2017 13:02:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360193#M165289</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-11-12T13:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing 2 Windows Event logs together</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360194#M165290</link>
      <description>&lt;P&gt;Thanks!  That worked out.  I had to adjust the Application name because in the 5156 it uses the Application portion as&lt;BR /&gt;
\device\harddiskvolume4&amp;lt; path to app &amp;gt;&lt;BR /&gt;
instead of &lt;BR /&gt;
c:\&lt;BR /&gt;
took some manipulation but it works!  I appreciate the help!&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2017 15:00:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360194#M165290</guid>
      <dc:creator>dirtyspawn</dc:creator>
      <dc:date>2017-11-12T15:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing 2 Windows Event logs together</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360195#M165291</link>
      <description>&lt;P&gt;@dirtyspawn, please accept the answer to mark this question as answered.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2017 16:20:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360195#M165291</guid>
      <dc:creator>niketn</dc:creator>
      <dc:date>2017-11-12T16:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Comparing 2 Windows Event logs together</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360196#M165292</link>
      <description>&lt;P&gt;Doesn't this run up against the limit imposed on the number of results that are returned from a subsearch? By default, limits.conf sets that to 10,000, but it can only be increased to 10,500. As written, won't this search miss data if there are more than 10,000 events of EventCode 5156?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 17:58:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Comparing-2-Windows-Event-logs-together/m-p/360196#M165292</guid>
      <dc:creator>samjenk_2</dc:creator>
      <dc:date>2019-06-11T17:58:52Z</dc:date>
    </item>
  </channel>
</rss>

