<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is the correct filter to find persistence in Windows registry? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643201#M222809</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm investigating Windows log in Splunk, struggling to apply the correct filter.&lt;/P&gt;
&lt;P&gt;What filter do I need to apply to find the persistence in the Windows registry?&lt;/P&gt;
&lt;P&gt;What filter do I need to apply to find the Sysmon id 13 events to find the registry key used to maintain persistence in Windows?&lt;/P&gt;
&lt;P&gt;Filter for what port number is listening for an incoming connection, using Sysmon&amp;nbsp; 12 and sysmon13 event IDs.&lt;/P&gt;
&lt;P&gt;my current search: index=*&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Any assistance will be immensely appreciated&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 15 May 2023 12:53:19 GMT</pubDate>
    <dc:creator>tonyfer</dc:creator>
    <dc:date>2023-05-15T12:53:19Z</dc:date>
    <item>
      <title>What is the correct filter to find persistence in Windows registry?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643201#M222809</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm investigating Windows log in Splunk, struggling to apply the correct filter.&lt;/P&gt;
&lt;P&gt;What filter do I need to apply to find the persistence in the Windows registry?&lt;/P&gt;
&lt;P&gt;What filter do I need to apply to find the Sysmon id 13 events to find the registry key used to maintain persistence in Windows?&lt;/P&gt;
&lt;P&gt;Filter for what port number is listening for an incoming connection, using Sysmon&amp;nbsp; 12 and sysmon13 event IDs.&lt;/P&gt;
&lt;P&gt;my current search: index=*&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Any assistance will be immensely appreciated&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:53:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643201#M222809</guid>
      <dc:creator>tonyfer</dc:creator>
      <dc:date>2023-05-15T12:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: what is the correct filter to find persistence in windows registry.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643208#M222811</link>
      <description>&lt;P&gt;Similar to this question&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-identify-windows-registry-key-use-for-persistence/m-p/643087#M222765" target="_blank"&gt;Re: How to Identify windows registry key use for p... - Splunk Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Do you have examples of the events you are dealing with?&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 12:34:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643208#M222811</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-05-12T12:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: what is the correct filter to find persistence in windows registry.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643246#M222824</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I want to search for sysmon events in splunk&lt;/P&gt;&lt;P&gt;&amp;nbsp;my current search: index=* sourcetype="WinEventLog:Microsoft-Windows-sysmon/operation" Registry&lt;/P&gt;&lt;P&gt;I'm trying to identify any persistence in the system, is that the correct filter for Splunk search?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 18:15:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643246#M222824</guid>
      <dc:creator>tonyfer</dc:creator>
      <dc:date>2023-05-12T18:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: what is the correct filter to find persistence in windows registry.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643263#M222826</link>
      <description>&lt;P&gt;So, your question is not really a Splunk question, it is more about your data, and how to interpret your data to identify the "persistence" events. Without knowledge of your data, it is difficult for us to advise. Perhaps if you shared some of your events, anonymised of course, we might be able to make some suggestions.&lt;/P&gt;&lt;P&gt;Having said that, a quick &lt;A href="https://www.google.com/search?q=persistence+events+in+windows+sysmon+logs&amp;amp;oq=persistence+events+in+windows+sysmon+logs" target="_self"&gt;google search&lt;/A&gt; (which you could have done yourself!) returns this &lt;A href="https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon" target="_self"&gt;link to Microsoft&lt;/A&gt;, which seems to indicate that events 12, 13 and 14 are to do with the Registry. Perhaps you could start with those.&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2023 08:57:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/What-is-the-correct-filter-to-find-persistence-in-Windows/m-p/643263#M222826</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-05-13T08:57:42Z</dc:date>
    </item>
  </channel>
</rss>

