<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk_TA_Windows event blacklist not working in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387504#M174490</link>
    <description>&lt;P&gt;I have below configuration in Splunk_TA_Windows inputs.conf to blacklist the NT AUTHORITY\SYSTEM events in 4663 code.&lt;BR /&gt;
But my blacklist3 is not working as expected, still I get the events indexed.&lt;BR /&gt;
Can some one help me in resolving the issue ?&lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;BR /&gt;
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
&lt;STRONG&gt;&lt;EM&gt;blacklist3 = EventCode="4663" Message="Security ID:(\w[NT]\s\w+.\w+)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;
renderXml=false&lt;BR /&gt;
index = winlogs&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 22:00:36 GMT</pubDate>
    <dc:creator>vsskishore</dc:creator>
    <dc:date>2020-09-29T22:00:36Z</dc:date>
    <item>
      <title>Splunk_TA_Windows event blacklist not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387504#M174490</link>
      <description>&lt;P&gt;I have below configuration in Splunk_TA_Windows inputs.conf to blacklist the NT AUTHORITY\SYSTEM events in 4663 code.&lt;BR /&gt;
But my blacklist3 is not working as expected, still I get the events indexed.&lt;BR /&gt;
Can some one help me in resolving the issue ?&lt;/P&gt;

&lt;P&gt;[WinEventLog://Security]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
start_from = oldest&lt;BR /&gt;
current_only = 0&lt;BR /&gt;
evt_resolve_ad_obj = 1&lt;BR /&gt;
checkpointInterval = 5&lt;BR /&gt;
blacklist1 = EventCode="4662" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
blacklist2 = EventCode="566" Message="Object Type:(?!\s*groupPolicyContainer)"&lt;BR /&gt;
&lt;STRONG&gt;&lt;EM&gt;blacklist3 = EventCode="4663" Message="Security ID:(\w[NT]\s\w+.\w+)&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;
renderXml=false&lt;BR /&gt;
index = winlogs&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:00:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387504#M174490</guid>
      <dc:creator>vsskishore</dc:creator>
      <dc:date>2020-09-29T22:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk_TA_Windows event blacklist not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387505#M174491</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;blacklist3 = EventCode="4663" Message="Security ID:(\w[NT]\s\w+.\w+)"&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;
this is not working.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Nov 2018 04:35:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387505#M174491</guid>
      <dc:creator>vsskishore</dc:creator>
      <dc:date>2018-11-17T04:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk_TA_Windows event blacklist not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387506#M174492</link>
      <description>&lt;P&gt;Have you checked whether that regex is correct?  &lt;CODE&gt;Security ID:(\w[NT]\s\w+.\w+)&lt;/CODE&gt; doesn't seem entirely accurate to match &lt;CODE&gt;Security ID:  NT AUTHORITY\SYSTEM&lt;/CODE&gt;. Perhaps simply try &lt;CODE&gt;Message=Security ID:\s*NT\sAUTHORITY\\SYSTEM&lt;/CODE&gt; or something along those lines?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 10:32:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387506#M174492</guid>
      <dc:creator>FrankVl</dc:creator>
      <dc:date>2018-11-19T10:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk_TA_Windows event blacklist not working</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387507#M174493</link>
      <description>&lt;P&gt;Hey FrankVI,&lt;BR /&gt;
I've tried the given suggestion but no luck.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 18:35:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-TA-Windows-event-blacklist-not-working/m-p/387507#M174493</guid>
      <dc:creator>vsskishore</dc:creator>
      <dc:date>2018-11-19T18:35:22Z</dc:date>
    </item>
  </channel>
</rss>

