<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blacklisting the hypen processname using REGEX in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Blacklisting-the-hypen-processname-using-REGEX/m-p/661071#M228241</link>
    <description>&lt;P&gt;This would be done on a heavy forwarder or the indexer(s), whichever the events hit first. The below link has information for how to do this. You can do it with SEDCMD in a props.conf. The code below is an excerpt from that page that shows specifically how you would do this. In this case this&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;&amp;lt;Data Name='IpPort'&amp;gt;0&amp;lt;/Data&amp;gt;&lt;/STRONG&gt;&lt;/EM&gt; is being turned into this&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;&amp;lt;Data Name='IpPort'&amp;gt;&amp;lt;/Data&amp;gt;&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;#For XmlWinEventLog:Security
     SEDCMD-cleanxmlsrcport = s/&amp;lt;Data Name='IpPort'&amp;gt;0&amp;lt;\/Data&amp;gt;/&amp;lt;Data Name='IpPort'&amp;gt;&amp;lt;\/Data&amp;gt;/&lt;/LI-CODE&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Configuration" target="_blank"&gt;https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Configuration&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Oct 2023 17:36:41 GMT</pubDate>
    <dc:creator>fredclown</dc:creator>
    <dc:date>2023-10-17T17:36:41Z</dc:date>
    <item>
      <title>Blacklisting the hypen processname using REGEX</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Blacklisting-the-hypen-processname-using-REGEX/m-p/661047#M228232</link>
      <description>&lt;P&gt;Hi, As I was wondering can we blacklist the processname like "-"&amp;nbsp; in the inputs.conf of DS ?? to save the splunk license .&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AL3Z_0-1697558769612.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27614iE6CDF0717D2D4720/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AL3Z_0-1697558769612.png" alt="AL3Z_0-1697558769612.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sample Event:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;Event xmlns='&lt;A href="http://schemas.microsoft.com/win/2004/08/events/event" target="_blank"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;'&amp;gt;&amp;lt;System&amp;gt;&amp;lt;Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-a5ba-3e3b0328c30d}'/&amp;gt;&amp;lt;EventID&amp;gt;4624&amp;lt;/EventID&amp;gt;&amp;lt;Version&amp;gt;3&amp;lt;/Version&amp;gt;&amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&amp;lt;Task&amp;gt;12544&amp;lt;/Task&amp;gt;&amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&amp;lt;TimeCreated SystemTime='2023-10-17T16:07:15.4402877Z'/&amp;gt;&amp;lt;EventRecordID&amp;gt;455140&amp;lt;/EventRecordID&amp;gt;&amp;lt;Correlation ActivityID='{b2071651-382e-4101-85e8-28f5e9b1b5d5}'/&amp;gt;&amp;lt;Execution ProcessID='1112' ThreadID='3816'/&amp;gt;&amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&amp;lt;Computer&amp;gt;xyz.com&amp;lt;/Computer&amp;gt;&amp;lt;Security/&amp;gt;&amp;lt;/System&amp;gt;&amp;lt;EventData&amp;gt;&amp;lt;Data Name='SubjectUserSid'&amp;gt;NULL SID&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='SubjectLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserSid'&amp;gt;NT AUTHORITY\SYSTEM&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetUserName'&amp;gt;xxx$&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetDomainName'&amp;gt;xyx.COM&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLogonId'&amp;gt;0xb126027&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonType'&amp;gt;3&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonProcessName'&amp;gt;Kerberos&amp;lt;/Data&amp;gt;&amp;lt;Data Name='AuthenticationPackageName'&amp;gt;Kerberos&amp;lt;/Data&amp;gt;&amp;lt;Data Name='WorkstationName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LogonGuid'&amp;gt;{c425351a-8525-d2f0-f686-1a0aff9db449}&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TransmittedServices'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='LmPackageName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='KeyLength'&amp;gt;0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ProcessName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpAddress'&amp;gt;127.0.0.1&amp;lt;/Data&amp;gt;&amp;lt;Data Name='IpPort'&amp;gt;0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ImpersonationLevel'&amp;gt;%%1833&amp;lt;/Data&amp;gt;&amp;lt;Data Name='RestrictedAdminMode'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='RemoteCredentialGuard'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundUserName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetOutboundDomainName'&amp;gt;-&amp;lt;/Data&amp;gt;&amp;lt;Data Name='VirtualAccount'&amp;gt;%%1843&amp;lt;/Data&amp;gt;&amp;lt;Data Name='TargetLinkedLogonId'&amp;gt;0x0&amp;lt;/Data&amp;gt;&amp;lt;Data Name='ElevatedToken'&amp;gt;%%1842&amp;lt;/Data&amp;gt;&amp;lt;/EventData&amp;gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 16:09:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Blacklisting-the-hypen-processname-using-REGEX/m-p/661047#M228232</guid>
      <dc:creator>AL3Z</dc:creator>
      <dc:date>2023-10-17T16:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Blacklisting the hypen processname using REGEX</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Blacklisting-the-hypen-processname-using-REGEX/m-p/661071#M228241</link>
      <description>&lt;P&gt;This would be done on a heavy forwarder or the indexer(s), whichever the events hit first. The below link has information for how to do this. You can do it with SEDCMD in a props.conf. The code below is an excerpt from that page that shows specifically how you would do this. In this case this&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;&amp;lt;Data Name='IpPort'&amp;gt;0&amp;lt;/Data&amp;gt;&lt;/STRONG&gt;&lt;/EM&gt; is being turned into this&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;&amp;lt;Data Name='IpPort'&amp;gt;&amp;lt;/Data&amp;gt;&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;#For XmlWinEventLog:Security
     SEDCMD-cleanxmlsrcport = s/&amp;lt;Data Name='IpPort'&amp;gt;0&amp;lt;\/Data&amp;gt;/&amp;lt;Data Name='IpPort'&amp;gt;&amp;lt;\/Data&amp;gt;/&lt;/LI-CODE&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Configuration" target="_blank"&gt;https://docs.splunk.com/Documentation/WindowsAddOn/latest/User/Configuration&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 17:36:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Blacklisting-the-hypen-processname-using-REGEX/m-p/661071#M228241</guid>
      <dc:creator>fredclown</dc:creator>
      <dc:date>2023-10-17T17:36:41Z</dc:date>
    </item>
  </channel>
</rss>

