<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exclude Equal Value in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661151#M228265</link>
    <description>&lt;P&gt;Here is an event log output. Its both the same log only with an other date. I see both event logs in the output in splunk but i dont want see one of them if in the search are two same event logs. Means if i filter for 7 days and there is only one event log with CVE-2023-21554 then i want to see this because its "new" but when i filter for 30 days and then i find two equal eventlogs i dont want to see it in the output because its not new - right now i see it&lt;BR /&gt;&lt;BR /&gt;16/10/2023&lt;BR /&gt;04:00:03.000&lt;BR /&gt;"175373","CVE-2023-21554","10.0","Critical","10.56.93.133","tcp","1801","Microsoft Message Queuing RCE (CVE-2023-21554, QueueJumper)","A message queuing application is affected a remote code execution vulnerability.","The Microsoft Message Queuing running on the remote host is affected&lt;BR /&gt;by a remote code execution vulnerability. An unauthenticated remote&lt;BR /&gt;attacker can exploit this, via a specially crafted message, to&lt;BR /&gt;execute arbitrary code on the remote host.","Apply updates in accordance with the vendor advisory.","&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" target="_blank"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.nessus.org/u?383fb650" target="_blank"&gt;http://www.nessus.org/u?383fb650&lt;/A&gt;","Nessus was able to detect the issue by sending a specially crafted message to remote TCP port 1801."&lt;BR /&gt;CVE = CVE-2023-21554 Risk = Critical extracted_Host = 192.168.0.1 sourcetype = csv&lt;BR /&gt;&lt;BR /&gt;09/10/2023&lt;BR /&gt;04:00:03.000&lt;BR /&gt;"175373","CVE-2023-21554","10.0","Critical","10.56.93.133","tcp","1801","Microsoft Message Queuing RCE (CVE-2023-21554, QueueJumper)","A message queuing application is affected a remote code execution vulnerability.","The Microsoft Message Queuing running on the remote host is affected&lt;BR /&gt;by a remote code execution vulnerability. An unauthenticated remote&lt;BR /&gt;attacker can exploit this, via a specially crafted message, to&lt;BR /&gt;execute arbitrary code on the remote host.","Apply updates in accordance with the vendor advisory.","&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" target="_blank"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.nessus.org/u?383fb650" target="_blank"&gt;http://www.nessus.org/u?383fb650&lt;/A&gt;","Nessus was able to detect the issue by sending a specially crafted message to remote TCP port 1801."&lt;BR /&gt;CVE = CVE-2023-21554 Risk = Critical extracted_Host = 192.168.0.1 sourcetype = csv&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Oct 2023 08:11:45 GMT</pubDate>
    <dc:creator>LionSplunk</dc:creator>
    <dc:date>2023-10-18T08:11:45Z</dc:date>
    <item>
      <title>Exclude Equal Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661146#M228263</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;BR /&gt;i get in Splunk every 7 days a vulnerability scan log from all Hosts in our infrastructure - in the future the scan&amp;nbsp; should be everyday .&lt;/P&gt;&lt;P&gt;Now i want to filter which of the vulnerability findings are really new and which one is equal to last scan because they are not new anymore and have a reason that they are still in the filter and they should be excluded in the search output.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If they scan output are the same the CVE number and the message is&amp;nbsp; identical only the date is different.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;My output should look like that i see only event scan messages when they are only on time in the logs. When a scan log is the same (CVE Number) two times in the log it should not be showed in the output. The best thing would be when i can see in the statistics field which of the extracted_Host are new or in the logs.&lt;/P&gt;&lt;P&gt;Right now my filter is like this:&amp;nbsp;&lt;BR /&gt;I can see in the statistics which of the extracted Host are new with the CVE number but i see in the main Event logs equal logs which are not new anymore. I tried with dedup but thats only deleting the old event logs field value and i can exclude the old event log but the newest is still here.&lt;/P&gt;&lt;P&gt;index=nessus Risk=Critical&lt;BR /&gt;| stats count as event_count by CVE, extracted_Host&lt;BR /&gt;| where event_count=1&lt;BR /&gt;| rename extracted_Host as Host&lt;BR /&gt;| table CVE, Host&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks for the Help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 07:43:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661146#M228263</guid>
      <dc:creator>LionSplunk</dc:creator>
      <dc:date>2023-10-18T07:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude Equal Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661148#M228264</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/261345"&gt;@LionSplunk&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you should identify the period, using eval.&lt;/P&gt;&lt;P&gt;so if you run the scan every day, you could try something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nessus Risk=Critical
| eval period=if(_time&amp;lt;now()-86400,"Last","Previous")
| stats 
   dc(period) AS period_count 
   values(period) AS period
   BY CVE extracted_Host
| where period_count=1 AND period="Last"
| rename extracted_Host as Host
| table CVE Host&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 08:00:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661148#M228264</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-10-18T08:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude Equal Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661151#M228265</link>
      <description>&lt;P&gt;Here is an event log output. Its both the same log only with an other date. I see both event logs in the output in splunk but i dont want see one of them if in the search are two same event logs. Means if i filter for 7 days and there is only one event log with CVE-2023-21554 then i want to see this because its "new" but when i filter for 30 days and then i find two equal eventlogs i dont want to see it in the output because its not new - right now i see it&lt;BR /&gt;&lt;BR /&gt;16/10/2023&lt;BR /&gt;04:00:03.000&lt;BR /&gt;"175373","CVE-2023-21554","10.0","Critical","10.56.93.133","tcp","1801","Microsoft Message Queuing RCE (CVE-2023-21554, QueueJumper)","A message queuing application is affected a remote code execution vulnerability.","The Microsoft Message Queuing running on the remote host is affected&lt;BR /&gt;by a remote code execution vulnerability. An unauthenticated remote&lt;BR /&gt;attacker can exploit this, via a specially crafted message, to&lt;BR /&gt;execute arbitrary code on the remote host.","Apply updates in accordance with the vendor advisory.","&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" target="_blank"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.nessus.org/u?383fb650" target="_blank"&gt;http://www.nessus.org/u?383fb650&lt;/A&gt;","Nessus was able to detect the issue by sending a specially crafted message to remote TCP port 1801."&lt;BR /&gt;CVE = CVE-2023-21554 Risk = Critical extracted_Host = 192.168.0.1 sourcetype = csv&lt;BR /&gt;&lt;BR /&gt;09/10/2023&lt;BR /&gt;04:00:03.000&lt;BR /&gt;"175373","CVE-2023-21554","10.0","Critical","10.56.93.133","tcp","1801","Microsoft Message Queuing RCE (CVE-2023-21554, QueueJumper)","A message queuing application is affected a remote code execution vulnerability.","The Microsoft Message Queuing running on the remote host is affected&lt;BR /&gt;by a remote code execution vulnerability. An unauthenticated remote&lt;BR /&gt;attacker can exploit this, via a specially crafted message, to&lt;BR /&gt;execute arbitrary code on the remote host.","Apply updates in accordance with the vendor advisory.","&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554" target="_blank"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.nessus.org/u?383fb650" target="_blank"&gt;http://www.nessus.org/u?383fb650&lt;/A&gt;","Nessus was able to detect the issue by sending a specially crafted message to remote TCP port 1801."&lt;BR /&gt;CVE = CVE-2023-21554 Risk = Critical extracted_Host = 192.168.0.1 sourcetype = csv&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 08:11:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661151#M228265</guid>
      <dc:creator>LionSplunk</dc:creator>
      <dc:date>2023-10-18T08:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude Equal Value</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661180#M228277</link>
      <description>&lt;P&gt;Thats my filter now and it seems working&lt;BR /&gt;index=nessus Risk=Critical&lt;BR /&gt;| transaction CVE, extracted_Host&lt;BR /&gt;| table CVE, extracted_Host&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 11:41:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Exclude-Equal-Value/m-p/661180#M228277</guid>
      <dc:creator>LionSplunk</dc:creator>
      <dc:date>2023-10-18T11:41:24Z</dc:date>
    </item>
  </channel>
</rss>

