Getting Data In

Blacklist Windows security event log with system account

s0mar
Explorer

I am trying to filter out noise before it is sent to the indexer. We were using Windows Event Forwarding previously, that was able to filter but now I am trying to create the same filter. I am modifying inputs.conf on the server running a Universal Forwarder.

So, we are trying to filter out:
Event ID = 4688
SubjectLogonId = 0x3e7 (the local system account)

AND a list of processes that includes the full path, for example:

C:\Windows\System32\SearchFilterHost.exe
C:\Windows\SysWOW64\SearchProtocolHost.exe

I believe there are 12 or so in total.

It seems like this is doable, but it is recommended? If so, how?

I have not tested and will have to verify the variable names.

blacklist3 = EventCode="4688" SubjectLogonId="0x3e7" NewProcessName="C:\Windows\System32\SearchFilterHost.exe" | "C:\Windows\SysWOW64\SearchProtocolHost.exe"

I am thinking it will not be that simple and will need regex for SubjectLogonId AND NewProcessName. I am not sure if that is possible.

Thanks in advance for any guidance.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The Universal Forwarder (UF) does not have the ability to filter data. Only heavy forwarders (HF) and indexers can do that. If you're set on not sending the events to your indexers then replace the UF with a HF. You'll probably get better performance, however, by keeping the UF and doing the filtering on the indexers (at the expense of network traffic, of course).

That said, your proposed blacklist will not work because it uses keys that are not supported in blacklists. Supported keys are: Category, CategoryString, ComputerName, EventCode, EventType, Keywords, LogName, Message, OpCode, RecordNumber, Sid, SidType, SourceName, TaskCategory, Type, User.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Build the Future of Agentic AI: Join the Splunk Agentic Ops Hackathon

AI is changing how teams investigate incidents, detect threats, automate workflows, and build intelligent ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...