Getting Data In

Blacklist Windows Event ID 4769

Yadukrishnan
Explorer

Hi,

 

I am trying to blacklist Windows Event ID 4769 from a particular User ID. Is this possible to be implemented. 

 

I already added the following Blacklist but it didnt seem to work. 

blacklist = EventCode="4769" User="Account Name"

Tags (2)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

1. Where are you putting those settings to?

2. What format are you ingesting your eventlogs in?

 

0 Karma

Yadukrishnan
Explorer

I am making changes on  opt splunk etc apps splunk_ta_win local  inputs.conf. The Windows Event IDs are collected using Universal Forwarder. There is one another blacklist in the same configuration file which is working fine with out any issues.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

OK.

How are you ingesting your events? key/value or XML?

Does the other (working) blacklist entry specify just the event code?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

"Seem"?  Either it worked or it didn't.

In which file did you add that line?  On which Splunk instance?  Did you restart Splunk after making the change?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Yadukrishnan
Explorer

Didnt work. Yes, I have restarted the services after making the changes. 

0 Karma
Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...