Dashboards & Visualizations

XML - WinEvent Whitelist

cstewart28
New Member

I have see other example, but non using XML for the whitelist. I only have a 2GB license and I have to go very slow at what I collect and add in event ID until I reach close to the max. I look at my index and I see a bunch of other event ids, what did I do wrong?

[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
whitelist= $XmlRegex= EventCode="106, 4624, 4625"
renderXml = true
index = xmlwineventlog

0 Karma

BDein
Explorer

@richgalloway  your whitelist = 106,4624,4625 will not work as long renderXml = true according to the documentation.

With renderXml = true you need to use: $XmlRegex

woodcock
Esteemed Legend

Here are the docs:
https://docs.splunk.com/Documentation/Splunk/latest/Data/MonitorWindowseventlogdata#Use_blacklists_a...
Try this (assuming the events have the strings Eventcode=106, Eventcode=4624, andEventcode=4625.

whitelist= $XmlRegex= EventCode=(106|4624|4625)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Not sure, but I think whitelist = 106,4624,4625 should work.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...