<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is there a better way of searching across a range of EventCodes? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Is-there-a-better-way-of-searching-across-a-range-of-EventCodes/m-p/279600#M84496</link>
    <description>&lt;P&gt;if it is always going to be those eventcodes, &lt;CODE&gt;host=domaincontrollers* EventCode=&amp;gt;4944 EventCode&amp;lt;=4945&lt;/CODE&gt;should be fine, you shouldn't have to list out all of the other codes.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Oct 2016 12:12:17 GMT</pubDate>
    <dc:creator>cmerriman</dc:creator>
    <dc:date>2016-10-25T12:12:17Z</dc:date>
    <item>
      <title>Is there a better way of searching across a range of EventCodes?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Is-there-a-better-way-of-searching-across-a-range-of-EventCodes/m-p/279598#M84494</link>
      <description>&lt;P&gt;Good morning.&lt;/P&gt;

&lt;P&gt;I am currently constructing a number of reports showing information relating to our domain controllers.&lt;/P&gt;

&lt;P&gt;E.g.&lt;BR /&gt;
host=domaincontrollers* EventCode=&amp;gt;4944 OR EventCode&amp;lt;=4945 OR EventCode=4946 OR EventCode=4947 OR EventCode=4948 OR EventCode=4949 OR EventCode=4950 OR EventCode=4951 OR EventCode=4952 OR EventCode=4953 OR EventCode=4954 OR EventCode=4957 OR EventCode=4958&lt;/P&gt;

&lt;P&gt;This report should list MPSSVC Rule-Level Policy Changes for the Windows Firewall on the domain controllers.&lt;/P&gt;

&lt;P&gt;When there are ranges of event codes available (as above with EventCode 4944-4954) is there a better way to capture all events in a more efficient way?&lt;/P&gt;

&lt;P&gt;Many thanks in advance for any help you can offer.&lt;/P&gt;

&lt;P&gt;Kind regards,&lt;/P&gt;

&lt;P&gt;Rob.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2016 07:38:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Is-there-a-better-way-of-searching-across-a-range-of-EventCodes/m-p/279598#M84494</guid>
      <dc:creator>soniquella</dc:creator>
      <dc:date>2016-10-25T07:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a better way of searching across a range of EventCodes?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Is-there-a-better-way-of-searching-across-a-range-of-EventCodes/m-p/279599#M84495</link>
      <description>&lt;P&gt;Hi soniquella,&lt;/P&gt;

&lt;P&gt;For me, the best way to manage situations like yours is to use a lookup table so you can change also in a second time the list of your eventcodes:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;create a lookup, e.g.: "eventcodes.csv" with one or two columns (two if you need also a description of EventCode) with attention to use the same name of the field (EventCode);&lt;/LI&gt;
&lt;LI&gt;modify your search  &lt;CODE&gt;host=domaincontrollers* [ | inputlookup eventcodes.csv | fields EventCode ] | ...&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;In this way you have in your search all the EventCodes of your lookup with an OR condition.&lt;/P&gt;

&lt;P&gt;Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2016 08:30:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Is-there-a-better-way-of-searching-across-a-range-of-EventCodes/m-p/279599#M84495</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2016-10-25T08:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Is there a better way of searching across a range of EventCodes?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Is-there-a-better-way-of-searching-across-a-range-of-EventCodes/m-p/279600#M84496</link>
      <description>&lt;P&gt;if it is always going to be those eventcodes, &lt;CODE&gt;host=domaincontrollers* EventCode=&amp;gt;4944 EventCode&amp;lt;=4945&lt;/CODE&gt;should be fine, you shouldn't have to list out all of the other codes.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2016 12:12:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Is-there-a-better-way-of-searching-across-a-range-of-EventCodes/m-p/279600#M84496</guid>
      <dc:creator>cmerriman</dc:creator>
      <dc:date>2016-10-25T12:12:17Z</dc:date>
    </item>
  </channel>
</rss>

