Deployment Architecture

Whitelist for WinEventLog does not filter with two fields EventCode and Logon_Type

gerdhuber
Explorer

Hallo,

i need help for this stanza. I want only Events for "EventCode=4624 and Logon_Type=10" .
Whitelist2 works fine.

[WinEventLog://Security]
disabled = false
start_from = oldest
evt_resolve_ad_obj = 0
checkpointInterval = 5
whitelist1 = EventCode=%^(4624)$% Logon_Type=%^10$%
whitelist2 = EventCode=%^(4625|4647|4720|4722|4724|4725|4726|4738|4781)$%
index = infrastrukturlog_windows

Thank you

Gerd

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi gerdhuber,
the easiest way is to filter events before indexing on Indexers, see http://docs.splunk.com/Documentation/Splunk/6.6.2/Forwarding/Routeandfilterdatad

Bye.
Giuseppe

0 Karma

gerdhuber
Explorer

This works for me:

whitelist1 = EventCode=%^(4624)$% Message="Logon\sType:\t+10"
whitelist2 = EventCode=%^(4625|4647|4720|4722|4724|4725|4726|4738|4781)$%

0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...