<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EventCode 4672 extraction prob? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297912#M175551</link>
    <description>&lt;P&gt;Giuseppe, Thanks for offering me your Help... but I only want to proof that I´m right... because this would have a much bigger impact if this happend to all the win event that have Tabstops in their massage field...&lt;/P&gt;</description>
    <pubDate>Tue, 14 Feb 2017 14:56:41 GMT</pubDate>
    <dc:creator>ndcl</dc:creator>
    <dc:date>2017-02-14T14:56:41Z</dc:date>
    <item>
      <title>EventCode 4672 extraction prob?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297908#M175547</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;did anyone also figure out that the 4672 Windows Event is not completly extracted by splunk?&lt;/P&gt;

&lt;P&gt;4672 is a importent Event because it shows the previlegs of a logon account. It´s raw looks like this:&lt;/P&gt;

&lt;P&gt;Special privileges assigned to new logon.&lt;/P&gt;

&lt;P&gt;Subject:&lt;/P&gt;

&lt;P&gt;Security ID:  WIN-R9H529RIO4Y\Administrator&lt;BR /&gt;
Account Name:  Administrator&lt;BR /&gt;
Account Domain:  WIN-R9H529RIO4Y&lt;BR /&gt;
Logon ID:  0x4b842&lt;/P&gt;

&lt;P&gt;Privileges:                           SeSecurityPrivilege&lt;BR /&gt;
SeTakeOwnershipPrivilege&lt;BR /&gt;
SeLoadDriverPrivilege&lt;BR /&gt;
SeBackupPrivilege&lt;BR /&gt;
SeRestorePrivilege&lt;BR /&gt;
SeDebugPrivilege&lt;BR /&gt;
SeSystemEnvironmentPrivilege&lt;BR /&gt;
SeImpersonatePrivilege&lt;/P&gt;

&lt;P&gt;Ok, hard to format here, but the section Privileges has a  tabstop in every row. What happend if you do a stats list on the Privileges Field is that it only shows the first row: SeSecurityPrivilege. If you use mvindex(Privileges,0) every index bigger than 0 is empty. This means to me that only the first row was extracted and the rest is skipped... To bad because this are some very valuable information.&lt;BR /&gt;
Can someone confirm this? &lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 13:27:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297908#M175547</guid>
      <dc:creator>ndcl</dc:creator>
      <dc:date>2017-02-14T13:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 4672 extraction prob?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297909#M175548</link>
      <description>&lt;P&gt;Hi dcl,&lt;BR /&gt;
you have to extract field from "Privileges:" to the end and then divide them.&lt;BR /&gt;
But to help you I need an event log: insert it as Code sample so it will remain the same.&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 13:56:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297909#M175548</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-02-14T13:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 4672 extraction prob?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297910#M175549</link>
      <description>&lt;P&gt;Nevermind. Our field also only extracts the first line.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 14:41:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297910#M175549</guid>
      <dc:creator>skalliger</dc:creator>
      <dc:date>2017-02-14T14:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 4672 extraction prob?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297911#M175550</link>
      <description>&lt;P&gt;Hi dcl,&lt;BR /&gt;
use a regex like (see &lt;A href="https://regex101.com/r/bqvXJI/1"&gt;https://regex101.com/r/bqvXJI/1&lt;/A&gt;) &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Privileges:\s(?&amp;lt;Privilege&amp;gt;[^ ]*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;to have all privileges in the same field.&lt;BR /&gt;
If in addition you want to separate each value in a row use &lt;CODE&gt;mvexpand&lt;/CODE&gt; command.&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 14:52:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297911#M175550</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-02-14T14:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 4672 extraction prob?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297912#M175551</link>
      <description>&lt;P&gt;Giuseppe, Thanks for offering me your Help... but I only want to proof that I´m right... because this would have a much bigger impact if this happend to all the win event that have Tabstops in their massage field...&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 14:56:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297912#M175551</guid>
      <dc:creator>ndcl</dc:creator>
      <dc:date>2017-02-14T14:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 4672 extraction prob?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297913#M175552</link>
      <description>&lt;P&gt;Ok, if you're satisfied accept my answer.&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2017 15:02:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297913#M175552</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-02-14T15:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: EventCode 4672 extraction prob?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297914#M175553</link>
      <description>&lt;P&gt;OK,&lt;BR /&gt;
based on Giuseppes Regex, there is this possible solution to get the lost fields reportable. There are of cause much more ways but I choosed this one. Adding an extraction and calculated fields to the props.conf. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EXTRACT-467_en = Privileges:\s(?&amp;lt;Privilege&amp;gt;[^ ]*) in _raw

EVAL-SeNetworkLogonRight= if(match(Privilege,".+SeNetworkLogonRight"),"Access this Computer from the Network","X")
EVAL-SeBatchLogonRight= if(match(Privilege,".+SeBatchLogonRight"),"Log on as a batch job","X")
EVAL-SeInteractiveLogonRight= if(match(Privilege,".+SeInteractiveLogonRight"),"Log on locally","X")
EVAL-SeServiceLogonRight= if(match(Privilege,".+SeServiceLogonRight"),"Logon as a service","X")
EVAL-SeDenyNetworkLogonRight= if(match(Privilege,".+SeDenyNetworkLogonRight"),"Deny Access to this computer from the network","X")
EVAL-SeDenyInteractiveLogonRight= if(match(Privilege,".+SeDenyInteractiveLogonRight"),"Deny local logon","X")
EVAL-SeDenyBatchLogonRight= if(match(Privilege,".+SeDenyBatchLogonRight"),"Deny logon as a batch file","X")
EVAL-SeDenyServiceLogonRight= if(match(Privilege,".+SeDenyServiceLogonRight"),"Deny logon as a service","X")
EVAL-SeTcbPrivilege= if(match(Privilege,".+SeTcbPrivilege"),"Act as part of the operating system","X")
EVAL-SeMachineAccountPrivilege= if(match(Privilege,".+SeMachineAccountPrivilege"),"Add workstations to the domain","X")
EVAL-SeBackupPrivilege= if(match(Privilege,".+SeBackupPrivilege"),"Backup files and directories","X")
EVAL-SeChangeNotifyPrivilege= if(match(Privilege,".+SeChangeNotifyPrivilege"),"Bypass traverse checking","X")
EVAL-SeSystemTimePrivilege= if(match(Privilege,".+SeSystemTimePrivilege"),"Change the system time","X")
EVAL-SeCreateTokenPrivilege= if(match(Privilege,".+SeCreateTokenPrivilege"),"Create a token object","X")
EVAL-SeCreatePermanentPrivilege= if(match(Privilege,".+SeCreatePermanentPrivilege"),"Create permanent shared objects","X")
EVAL-SeCreatePagefilePrivilege= if(match(Privilege,".+SeCreatePagefilePrivilege"),"Create a pagefile","X")
EVAL-SeDebugPrivilege= if(match(Privilege,".+SeDebugPrivilege"),"Debug programs","X")
EVAL-SeEnableDelegationPrivilege= if(match(Privilege,".+SeEnableDelegationPrivilege"),"Enable computer and user accounts to be trusted for delegation","X")
EVAL-SeRemoteShutdownPrivilege= if(match(Privilege,".+SeRemoteShutdownPrivilege"),"Force shutdown from a remote system","X")
EVAL-SeAuditPrivilege= if(match(Privilege,".+SeAuditPrivilege"),"Generate security audits","X")
EVAL-SeIncreaseQuotaPrivilege= if(match(Privilege,".+SeIncreaseQuotaPrivilege"),"Increase quotas","X")
EVAL-SeIncreaseBasePriorityPrivilege= if(match(Privilege,".+SeIncreaseBasePriorityPrivilege"),"Increase scheduling priority","X")
EVAL-SeLoadDriverPrivilege= if(match(Privilege,".+SeLoadDriverPrivilege"),"Load and unload device drivers","X")
EVAL-SeLockMemoryPrivilege= if(match(Privilege,".+SeLockMemoryPrivilege"),"Lock pages in memory","X")
EVAL-SeSecurityPrivilege= if(match(Privilege,".+SeSecurityPrivilege"),"Manage auditing and security log","X")
EVAL-SeSystemEnvironmentPrivilege= if(match(Privilege,".+SeSystemEnvironmentPrivilege"),"Modify firmware environment values","X")
EVAL-SeProfileSingleProcessPrivilege= if(match(Privilege,".+SeProfileSingleProcessPrivilege"),"Profile a single process","X")
EVAL-SeSystemProfilePrivilege= if(match(Privilege,".+SeSystemProfilePrivilege"),"Profile system performance","X")
EVAL-SeUndockPrivilege= if(match(Privilege,".+SeUndockPrivilege"),"Remove computer from docking station","X")
EVAL-SeAssignPrimaryTokenPrivilege= if(match(Privilege,".+SeAssignPrimaryTokenPrivilege"),"Replace a process-level token","X")
EVAL-SeRestorePrivilege= if(match(Privilege,".+SeRestorePrivilege"),"Restore files and directories","X")
EVAL-SeShutdownPrivilege= if(match(Privilege,".+SeShutdownPrivilege"),"Shut down the system","X")
EVAL-SeSyncAgentPrivilege= if(match(Privilege,".+SeSyncAgentPrivilege"),"Synchronize directory service data","X")
EVAL-SeTakeOwnershipPrivilege= if(match(Privilege,".+SeTakeOwnershipPrivilege"),"Take ownership of files or other objects","X")
EVAL-SeUnsolicitedInputPrivilege= if(match(Privilege,".+SeUnsolicitedInputPrivilege"),"Read unsolicited data from a terminal device","X")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;this will create fields nemed like the Shortcut in the event. If this right is not set then there is an "X". Otherwise there is an Userfriendly discription.&lt;BR /&gt;
Btw: this will work with every latin language just create an alias to Privileges.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2017 10:31:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/EventCode-4672-extraction-prob/m-p/297914#M175553</guid>
      <dc:creator>ndcl</dc:creator>
      <dc:date>2017-04-25T10:31:57Z</dc:date>
    </item>
  </channel>
</rss>

