Getting Data In

Blacklist Windows Event ID 4769

Yadukrishnan
Explorer

Hi,

 

I am trying to blacklist Windows Event ID 4769 from a particular User ID. Is this possible to be implemented. 

 

I already added the following Blacklist but it didnt seem to work. 

blacklist = EventCode="4769" User="Account Name"

Tags (2)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

1. Where are you putting those settings to?

2. What format are you ingesting your eventlogs in?

 

0 Karma

Yadukrishnan
Explorer

I am making changes on  opt splunk etc apps splunk_ta_win local  inputs.conf. The Windows Event IDs are collected using Universal Forwarder. There is one another blacklist in the same configuration file which is working fine with out any issues.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

OK.

How are you ingesting your events? key/value or XML?

Does the other (working) blacklist entry specify just the event code?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

"Seem"?  Either it worked or it didn't.

In which file did you add that line?  On which Splunk instance?  Did you restart Splunk after making the change?

---
If this reply helps you, Karma would be appreciated.
0 Karma

Yadukrishnan
Explorer

Didnt work. Yes, I have restarted the services after making the changes. 

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...