<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Confusing in Windows Export Certificate Rule in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Confusing-in-Windows-Export-Certificate-Rule/m-p/697449#M236926</link>
    <description>&lt;P&gt;"I only know in SPL we can't get result if write query with source in the first position"&lt;/P&gt;&lt;P&gt;It is not true. If you don't specify index conditions explicitly, Splunk uses default indexes for your user's role (which might be an empty set). Conditions in a search are _not_ positional.&lt;/P&gt;&lt;P&gt;OK, having that out of the way...&lt;/P&gt;&lt;P&gt;1) metasearch is an old command, rarely used nowadays since most use cases can be more effectively covered with other methods. In your case it would be&lt;/P&gt;&lt;PRE&gt;| tstats count where index=* source IN ("XmlWinEventLog:Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational")&lt;/PRE&gt;&lt;P&gt;2) Well, do you _have_ any data of this kind? If you haven't ingested it from the endpoint, you can't search from it. That's what the search result tells you. (I assume you're searching over decently wide time range and you have access to relevant indexes)&lt;/P&gt;</description>
    <pubDate>Tue, 27 Aug 2024 11:50:47 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2024-08-27T11:50:47Z</dc:date>
    <item>
      <title>Confusing in Windows Export Certificate Rule</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Confusing-in-Windows-Export-Certificate-Rule/m-p/697434#M236923</link>
      <description>&lt;P&gt;According to&amp;nbsp;&lt;A href="https://research.splunk.com/endpoint/d8ddfa9b-b724-4df9-9dbe-f34cc0936714/" target="_blank" rel="noopener"&gt;Windows Export Certificate - Splunk Security Content&lt;/A&gt;&amp;nbsp;it using macros in the first query&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;`certificateservices_lifecycle` EventCode=1007 
| xmlkv UserData_Xml 
| stats count min(_time) as firstTime max(_time) as lastTime by Computer, SubjectName, UserData_Xml 
| rename Computer as dest 
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)` 
| `windows_export_certificate_filter`&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And in `certificateservices_lifecycle` macros is&amp;nbsp;&lt;SPAN&gt;(source=XmlWinEventLog:Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational OR source=XmlWinEventLog:Microsoft-Windows-CertificateServicesClient-Lifecycle-User/Operational)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zksvc_0-1724752713713.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/32423i5E28F1FCDC76C02E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="zksvc_0-1724752713713.png" alt="zksvc_0-1724752713713.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I only know in SPL we can't get result if write query with source in the first position, so i add index=* before&amp;nbsp;`certificateservices_lifecycle` but unfortunately i don't get any result.&lt;BR /&gt;&lt;BR /&gt;Then i'm using metasearch for check it available or not with this query&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;First query :&lt;BR /&gt;| metasearch index=* source IN ("XmlWinEventLog:Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational")&lt;BR /&gt;&lt;BR /&gt;Second query : &lt;BR /&gt;| metasearch index=* source IN ("XmlWinEventLog:Microsoft-Windows-CertificateServicesClient-Lifecycle-User/Operational")&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and then i only got 0 result.&lt;BR /&gt;&lt;BR /&gt;The question is if i want to get data from source="XmlWinEventLog:Microsoft-Windows-CertificateServicesClient-Lifecycle-User/Operational" did i need setting it in Endpoints or can solved it in Splunk ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 10:09:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Confusing-in-Windows-Export-Certificate-Rule/m-p/697434#M236923</guid>
      <dc:creator>zksvc</dc:creator>
      <dc:date>2024-08-27T10:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing in Windows Export Certificate Rule</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Confusing-in-Windows-Export-Certificate-Rule/m-p/697449#M236926</link>
      <description>&lt;P&gt;"I only know in SPL we can't get result if write query with source in the first position"&lt;/P&gt;&lt;P&gt;It is not true. If you don't specify index conditions explicitly, Splunk uses default indexes for your user's role (which might be an empty set). Conditions in a search are _not_ positional.&lt;/P&gt;&lt;P&gt;OK, having that out of the way...&lt;/P&gt;&lt;P&gt;1) metasearch is an old command, rarely used nowadays since most use cases can be more effectively covered with other methods. In your case it would be&lt;/P&gt;&lt;PRE&gt;| tstats count where index=* source IN ("XmlWinEventLog:Microsoft-Windows-CertificateServicesClient-Lifecycle-System/Operational")&lt;/PRE&gt;&lt;P&gt;2) Well, do you _have_ any data of this kind? If you haven't ingested it from the endpoint, you can't search from it. That's what the search result tells you. (I assume you're searching over decently wide time range and you have access to relevant indexes)&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 11:50:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Confusing-in-Windows-Export-Certificate-Rule/m-p/697449#M236926</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-08-27T11:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing in Windows Export Certificate Rule</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Confusing-in-Windows-Export-Certificate-Rule/m-p/697465#M236932</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Thanks for your reply, and knowledge about source can called in the first position.&lt;/P&gt;&lt;P&gt;Sorry i don't know that because in many case i got it always solved when i add index=* before the source.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zksvc_0-1724764160097.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/32426i3540F2CE7A5119A6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="zksvc_0-1724764160097.png" alt="zksvc_0-1724764160097.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And with your query i only get 0 count, so i think it because my client don't ingest in the Endpoint.&lt;/P&gt;&lt;P&gt;Thankyou for your reply and your information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Danke &lt;span class="lia-unicode-emoji" title=":clinking_beer_mugs:"&gt;🍻&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 13:10:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Confusing-in-Windows-Export-Certificate-Rule/m-p/697465#M236932</guid>
      <dc:creator>zksvc</dc:creator>
      <dc:date>2024-08-27T13:10:18Z</dc:date>
    </item>
  </channel>
</rss>

