<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filtering WinEventLog:Security in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170460#M48770</link>
    <description>&lt;P&gt;Thanks Luke!  I will test this and get back to you.&lt;/P&gt;</description>
    <pubDate>Tue, 20 May 2014 08:29:05 GMT</pubDate>
    <dc:creator>denisevw</dc:creator>
    <dc:date>2014-05-20T08:29:05Z</dc:date>
    <item>
      <title>Filtering WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170457#M48767</link>
      <description>&lt;P&gt;Good day&lt;/P&gt;

&lt;P&gt;I read a few answers on the WinEventLog:Security filtering but it does not cover the answers I'm looking for.&lt;/P&gt;

&lt;P&gt;I need to filter out event codes but only the ones that contain an Account_Name: Local Service entry.&lt;/P&gt;

&lt;P&gt;The regex that I'm using in transforms.conf on the Indexers does not work:&lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
[WinEventLog:Security]&lt;BR /&gt;
TRANSFORMS-evtlog = eventnull&lt;BR /&gt;
TRANSFORMS-wfevtlog = wfeventnull&lt;/P&gt;

&lt;P&gt;transforms.conf&lt;BR /&gt;
&lt;A href="https://community.splunk.com/?m"&gt;eventnull&lt;/A&gt;^EventCode=(560|562|4656|4658|4663)[\s\S]+?^Account\sName:\s+(?:(?:LOCAL\sSERVICE)|(?:.*?\$$))&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;[wfeventnull]&lt;BR /&gt;
REGEX=(?m)^EventCode=(5152|5156|5157|5158)&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;Here is an example of the event I'm try to filter out:&lt;BR /&gt;
05/18/2014 10:11:31 PM &lt;BR /&gt;
LogName=Security &lt;BR /&gt;
SourceName=Microsoft Windows security auditing. &lt;BR /&gt;
EventCode=4656 &lt;BR /&gt;
EventType=0 &lt;BR /&gt;
Type=Information &lt;BR /&gt;
ComputerName=server.domain.local &lt;BR /&gt;
TaskCategory=File System &lt;BR /&gt;
OpCode=Info &lt;BR /&gt;
RecordNumber=123456789 &lt;BR /&gt;
Keywords=Audit Success &lt;BR /&gt;
Message=A handle to an object was requested. &lt;/P&gt;

&lt;P&gt;Subject: &lt;BR /&gt;
Security ID:                NT AUTHORITY\LOCAL SERVICE &lt;BR /&gt;
Account Name:               LOCAL SERVICE &lt;BR /&gt;
Account Domain:             NT AUTHORITY &lt;BR /&gt;
Logon ID:                   0x3e5 &lt;/P&gt;

&lt;P&gt;Object: &lt;BR /&gt;
Object Server:              Security &lt;BR /&gt;
Object Type:                File &lt;BR /&gt;
Object Name:                \Device\Udp6 &lt;BR /&gt;
Handle ID:                  0xc930 &lt;/P&gt;

&lt;P&gt;Process Information: &lt;BR /&gt;
Process ID:                 0x1ac &lt;BR /&gt;
Process Name:               C:\Windows\System32\svchost.exe &lt;/P&gt;

&lt;P&gt;Access Request Information: &lt;BR /&gt;
Transaction ID:             {00000000-0000-0000-0000-000000000000} &lt;BR /&gt;
Accesses:                   READ_CONTROL &lt;BR /&gt;
                            SYNCHRONIZE &lt;BR /&gt;
                            Execute/Traverse &lt;BR /&gt;
                            ReadAttributes &lt;BR /&gt;
Access Reasons:             - &lt;BR /&gt;
Access Mask:                0x1200a0 &lt;BR /&gt;
Privileges Used for Access Check:  - &lt;BR /&gt;
Restricted SID Count:       0&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2014 20:02:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170457#M48767</guid>
      <dc:creator>denisevw</dc:creator>
      <dc:date>2014-05-19T20:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170458#M48768</link>
      <description>&lt;P&gt;(?m)^EventCode=(560|562|4656|4658|4663)[\s\S]+?^Account\sName:\s+(?:(?:LOCAL\sSERVICE)|(?:.&lt;EM&gt;?\$$))&lt;BR /&gt;
should be:&lt;BR /&gt;
REGEX=(?m)^EventCode=(560|562|4656|4658|4663)[\s\S]+?^Account\sName:\s+(?:(?:LOCAL\sSERVICE)|(?:.&lt;/EM&gt;?\$$))&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2014 20:20:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170458#M48768</guid>
      <dc:creator>denisevw</dc:creator>
      <dc:date>2014-05-19T20:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170459#M48769</link>
      <description>&lt;P&gt;I've seen similar things with Account name extractions... Believe it or not, Account Name is not the start of a line, so you need to remove the &lt;CODE&gt;^&lt;/CODE&gt;.&lt;/P&gt;

&lt;P&gt;Test the regex in the search bar, and if you want to see the structure look a the event punctuation I think.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;(?m)^EventCode=(560|562|4656|4658|4663)[sS]+?AccountsName:s+(?:(?:LOCALsSERVICE)|(?:.*?$$))&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2014 20:28:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170459#M48769</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-05-19T20:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170460#M48770</link>
      <description>&lt;P&gt;Thanks Luke!  I will test this and get back to you.&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2014 08:29:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170460#M48770</guid>
      <dc:creator>denisevw</dc:creator>
      <dc:date>2014-05-20T08:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Filtering WinEventLog:Security</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170461#M48771</link>
      <description>&lt;P&gt;This worked perfectly.  Thank you very much!&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2014 10:14:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Filtering-WinEventLog-Security/m-p/170461#M48771</guid>
      <dc:creator>denisevw</dc:creator>
      <dc:date>2014-05-20T10:14:04Z</dc:date>
    </item>
  </channel>
</rss>

