<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660346#M227945</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this regex seems to not work,&lt;/P&gt;&lt;P&gt;Did you tried the one I shared (that works on rgex101)?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Wed, 11 Oct 2023 06:54:55 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2023-10-11T06:54:55Z</dc:date>
    <item>
      <title>Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660159#M227881</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Looking for some assistance with Regex to blacklist&amp;nbsp; inputs.conf on Windows Systems.&amp;nbsp; We modified inputs.conf located:&lt;BR /&gt;/opt/apps/splunk/etc/deployment-apps/Splunk_TA_windows/local/inputs.conf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Applied Regex :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist1 = EventCode="4688" $XmlRegex="&amp;lt;Data Name='NewProcessName'&amp;gt;
(C:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense.exe)|(C:\\Program Files (x86)\\Tanium\\Tanium Client\\TaniumCX.exe)
&amp;lt;/Data&amp;gt;"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I attempted all available methods to blacklist the events above, but they did not take effect. Do we need to make modifications in order to successfully blacklist them?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 13:08:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660159#M227881</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-12-06T13:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660161#M227882</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;please try this regex:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;\&amp;lt;EventID\&amp;gt;4688\&amp;lt;\/EventID\&amp;gt;.*\&amp;lt;Data Name\=\'NewProcessName\'\&amp;gt;.*(C:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense\.exe)|(C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumCX\.exe)&lt;/LI-CODE&gt;&lt;P&gt;that you can test at&amp;nbsp;&lt;A href="https://regex101.com/r/053rNX/1" target="_blank"&gt;https://regex101.com/r/053rNX/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 16:51:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660161#M227882</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-10-09T16:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660169#M227883</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;/&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;This regex is not getting applied forthe events. I believe we need to&amp;nbsp; blacklist by using parent field ??&lt;BR /&gt;&lt;BR /&gt;blacklist3 = $XmlRegex="&lt;SPAN&gt;&amp;lt;EventID\&amp;gt;4688\&amp;lt;\/EventID\&amp;gt;.*\&amp;lt;Data Name\=\'NewProcessName\'\&amp;gt;.*(C:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense\.exe)"&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;This is the actual log from EventViewer :&lt;BR /&gt;&lt;BR /&gt;A new process has been created.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Creator Subject:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Security ID: SYSTEM&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Account Name: SECUREJUMP$&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Account Domain: EC&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Logon ID: 0x3E7&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Target Subject:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Security ID: NULL SID&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Account Name: -&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Account Domain: -&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Logon ID: 0x0&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Process Information:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;New Process ID: 0x561c&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;New Process Name: C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Token Elevation Type: %%1936&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Mandatory Label: Mandatory Label\System Mandatory Level&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Creator Process ID: 0x3520&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Creator Process Name: C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Process Command Line:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 13:56:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660169#M227883</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-10T13:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660170#M227884</link>
      <description>&lt;P&gt;The RHS of the blacklist setting must be in key=regex format where key is one of Category, CategoryString, ComputerName, EventCode, EventType, Keywords, LogName, Message, OpCode, RecordNumber, Sid, SidType, SourceName, TaskCategory, Type, or User; and regex is a regular expression enclosed in delimiters (quotes can be a delimiter).&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 17:50:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660170#M227884</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-10-09T17:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660236#M227905</link>
      <description>&lt;P&gt;I see a few problems here.&lt;/P&gt;&lt;P&gt;1. The blacklist1 setting is not in the proper format.&amp;nbsp; It must be a list of event IDs or a keyword followed by "=" followed by a regular expression.&lt;/P&gt;&lt;P&gt;2. The regex shown is trying to match XML, but the sample event is not in XML.&lt;/P&gt;&lt;P&gt;3. The regex is looking for text ("4688", "MsSense.exe", "TaniumCX.exe") that is not in the sample event.&lt;/P&gt;&lt;P&gt;Any of these would cause the blacklist to fail.&amp;nbsp; To fix them:&lt;/P&gt;&lt;P&gt;1. Put the blacklist1 setting in an expected format.&lt;/P&gt;&lt;P&gt;2. Examine the log entry as Splunk sees it (_raw) rather than as shown by another program (which may have changed it for display purposes).&lt;/P&gt;&lt;P&gt;3. Ensure the regex matches the sample data.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 12:15:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660236#M227905</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-10-10T12:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660248#M227907</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Need a clarification on blacklisting the field which one we need to put under blacklist is it newprocessname or parentprocessname ??&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 15:05:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660248#M227907</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-10T15:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660252#M227908</link>
      <description>&lt;P&gt;The blacklist setting supports neither of those.&amp;nbsp; See my earlier reply for the list of supported keywords/fields.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 15:53:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660252#M227908</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-10-10T15:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660326#M227937</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Is there any option where we can see the errors for the blacklisted regex&amp;nbsp; if it's not getting applied?&lt;/P&gt;&lt;P&gt;Thanks..&lt;/P&gt;</description>
      <pubDate>Tue, 10 Oct 2023 23:39:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660326#M227937</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-10T23:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660327#M227938</link>
      <description>&lt;P&gt;I'm not aware of any such option.&amp;nbsp; Perhaps one of the DEBUG log settings will help.&lt;/P&gt;&lt;P&gt;Failure to apply a regex is not an error - it just means the data doesn't match the regex, which is perfectly normal.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 00:14:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660327#M227938</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-10-11T00:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660337#M227940</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have been struggling to fix this blacklist in windows_ta app inputs.conf in the DS and deployed it to clients but it not working as expected, please help me in fixing this issue&lt;BR /&gt;&lt;BR /&gt;Still logs are ingesting..&lt;/P&gt;&lt;P&gt;Thanks Eagerly waiting for your answers....&lt;/P&gt;</description>
      <pubDate>Fri, 13 Oct 2023 17:22:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660337#M227940</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-13T17:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660342#M227943</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;as you can read at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.1/admin/Inputsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.1/admin/Inputsconf&lt;/A&gt;&amp;nbsp;, blacklist uses a regex, so if in your logs there isn't the exact string&amp;nbsp;&lt;SPAN&gt;EventCode="4662"&amp;nbsp; with equal and quotes, the filter doesn't work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Use regex101 (as I did in my first answer) to find the regex to filter your logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciao.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Giuseppe&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 06:29:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660342#M227943</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-10-11T06:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660345#M227944</link>
      <description>&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;Is this a right format of applying?&lt;BR /&gt;&lt;BR /&gt;blacklist5&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;EventCode="4688" $&lt;/SPAN&gt;&lt;SPAN&gt;XmlRegex&lt;/SPAN&gt;&lt;SPAN&gt;=&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;\&amp;lt;EventID\&amp;gt;4688\&amp;lt;\/EventID\&amp;gt;.*\&amp;lt;Data Name\=\'NewProcessName\'\&amp;gt;.*(C:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense\.exe)|(C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumCX\.exe)"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks..&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 06:52:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660345#M227944</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-11T06:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660346#M227945</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this regex seems to not work,&lt;/P&gt;&lt;P&gt;Did you tried the one I shared (that works on rgex101)?&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 06:54:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660346#M227945</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-10-11T06:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660347#M227946</link>
      <description>&lt;P&gt;It's not 4662 it's 4688.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 06:57:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660347#M227946</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-11T06:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660349#M227948</link>
      <description>&lt;P&gt;Nope, I have added $xmlRegex followed by your regex&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Is this a right one as you mentioned in the regex101 if not pls correct it&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;blacklist5 = EventCode="4688" Message="\&amp;lt;EventID\&amp;gt;4688\&amp;lt;\/EventID\&amp;gt;.*\&amp;lt;Data Name\=\'NewProcessName\'\&amp;gt;.*(C:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense\.exe)|(C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumCX\.exe)"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 07:05:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660349#M227948</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-11T07:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660353#M227952</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;don't use quotes:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;blacklist5 = \&amp;lt;EventID\&amp;gt;4688\&amp;lt;\/EventID\&amp;gt;.*\&amp;lt;Data Name\=\'NewProcessName\'\&amp;gt;.*(C:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense\.exe)|(C:\\Program Files \(x86\)\\Tanium\\Tanium Client\\TaniumCX\.exe)&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 07:08:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660353#M227952</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-10-11T07:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660356#M227955</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;This regex is not working ! Do we need to use&amp;nbsp; followed by&amp;nbsp; EventCode="4688" Message="&amp;nbsp; "&amp;nbsp; to get it work ?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 08:09:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660356#M227955</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-11T08:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660360#M227959</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;it's a regex, instead these are Splunk fields: try only the regex.&lt;/P&gt;&lt;P&gt;the EventCode=4688 is inside the regex, so you don't need to repeat it.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 08:25:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660360#M227959</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-10-11T08:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660372#M227964</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I had gone through your one of the answer in the post&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/td-p/598999" target="_blank"&gt;https://community.splunk.com/t5/Getting-Data-In/How-to-blacklist-inputs-conf/td-p/598999&lt;/A&gt;&lt;BR /&gt;, But in my case there is no Transforms.conf in my windows_ta app,H ow we can apply the same in my case and stop the logs from ingesting into splunk ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 09:49:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660372#M227964</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-11T09:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble in applying regex to blacklist Windows events on a Universal Forwarder.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660374#M227965</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/252275"&gt;@AL3Z&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;blacklisting is in inputs.conf.&lt;/P&gt;&lt;P&gt;transformas.conf and props.conf is the second solution described in the above link used to filter logs on Indexers or Heavy Forwarders (if present), when you cannot filter logs on the Universal forwarder.&lt;/P&gt;&lt;P&gt;It isn't your situation: you have to find the exact regex, please try with my first regex, to insert in the blacklist option of your inputs.conf&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2023 10:04:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Having-trouble-in-applying-regex-to-blacklist-Windows-events-on/m-p/660374#M227965</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-10-11T10:04:48Z</dc:date>
    </item>
  </channel>
</rss>

