<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Extract  Fields from McAfee Vulnerability Manager in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129402#M35186</link>
    <description>&lt;P&gt;have you tried it from props.conf? I have two different results between rex search command and props.conf&lt;/P&gt;</description>
    <pubDate>Tue, 07 Apr 2015 13:55:04 GMT</pubDate>
    <dc:creator>mzorzi</dc:creator>
    <dc:date>2015-04-07T13:55:04Z</dc:date>
    <item>
      <title>How to Extract  Fields from McAfee Vulnerability Manager</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129399#M35183</link>
      <description>&lt;P&gt;The events collected from the MVM have multiline fields, I would like to extract vendor_description,vendor_observation and vendor_recommendation.&lt;/P&gt;

&lt;P&gt;What is the best props.conf configuration?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Apr 06 2015 08:22:41
TicketID=11674520
category_id=29
vendor_category=Security Policy/Options
cve=CVE-MAP-NOMATCH
msft=
mskb=
dest_ip=196.68.23.14
dest_name=SRVUDG987
dest_host=SRVUDG987.VGR.ATTGR.NET
signature=User Rights Restore Files And Directories Policy
vendor_severity=0
vendor_description=The User Rights "Restore files and directories" policy does not match the recommended compliance value.
vendor_observation=The User Rights "Restore files and directories" policy specifies which accounts may restore files and directories from a backup.

        NOTE: This check requires at least Foundstone version 4.0.6.
vendor_recommendation=Foundstone recommends the User Rights "Restore files and directories" be set via either a group policy INF file or by manually navigating to:

        Control Panel - Administrative Tools - Local Security Policy - Local Policies - User Rights Assignment

        Set the "Restore files and directories" policy to Administrators
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:26:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129399#M35183</guid>
      <dc:creator>mzorzi</dc:creator>
      <dc:date>2020-09-28T19:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to Extract  Fields from McAfee Vulnerability Manager</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129400#M35184</link>
      <description>&lt;P&gt;This works for me, but it is a bit random. Maybe you have better suggestion?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[vmdata]
SHOULD_LINEMERGE = true
BREAK_ONLY_BEFORE_DATE = true
KV_MODE = none
EXTRACT-vall = (?mis)vendor_description=(?&amp;lt;vendor_descrition&amp;gt;.*)[\r\n]+vendor_observation=(?&amp;lt;vendor_observation&amp;gt;.*(?!vendor))[\r\n]+vendor_recommendation=(?&amp;lt;vendor_recommendation&amp;gt;.*)[\r\n]+
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 07 Apr 2015 13:30:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129400#M35184</guid>
      <dc:creator>mzorzi</dc:creator>
      <dc:date>2015-04-07T13:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to Extract  Fields from McAfee Vulnerability Manager</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129401#M35185</link>
      <description>&lt;P&gt;Why not this straightforward rex:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;vendor_description=(?&amp;lt;description&amp;gt;.*)vendor_observation=(?&amp;lt;observation&amp;gt;.*)vendor_recommendation=(?&amp;lt;recommendation&amp;gt;.*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;When I use it with the &lt;CODE&gt;s&lt;/CODE&gt; modifier (so that . includes newline) on your sample, I get exactly the entire text until the next vendor_ (with the first two entries at least, the last one just captures until the end of the event I guess).&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2015 13:52:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129401#M35185</guid>
      <dc:creator>jeffland</dc:creator>
      <dc:date>2015-04-07T13:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to Extract  Fields from McAfee Vulnerability Manager</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129402#M35186</link>
      <description>&lt;P&gt;have you tried it from props.conf? I have two different results between rex search command and props.conf&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2015 13:55:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129402#M35186</guid>
      <dc:creator>mzorzi</dc:creator>
      <dc:date>2015-04-07T13:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to Extract  Fields from McAfee Vulnerability Manager</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129403#M35187</link>
      <description>&lt;P&gt;Unfortunately this is only rex-tested, sorry. I am not yet proficient with that sort of low-level setup. Why don't you try the expression in your props.conf, the modifier should work by prepending &lt;CODE&gt;(?m)^&lt;/CODE&gt; to your expression.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2015 14:01:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-Extract-Fields-from-McAfee-Vulnerability-Manager/m-p/129403#M35187</guid>
      <dc:creator>jeffland</dc:creator>
      <dc:date>2015-04-07T14:01:07Z</dc:date>
    </item>
  </channel>
</rss>

