Getting Data In

Prevent ingestion of "NT AUTHORITY\SYSTEM" EventCode 4663

sswigart
Explorer

I am exceeding my 5GB license. I have determine the problem by doing a 24 hour search using the following:

index="winlogs" host=filesvr souce="WinEventLog:Security" EventCode=4663 Accesses="ReadData (or ListDirectory) Security_ID="NT AUTHORITY\SYSTEM"

The above search returns 4.5 million plus records.

My question is how do I stop Splunk from ingesting     Security_ID="NT AUTHORITY\SYSTEM" of EventCode 4663?

Would appreciate any assistance\suggestions given.

Labels (3)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @sswigart ,

as you can read at https://docs.splunk.com/Documentation/Splunk/9.2.2/Admin/Inputsconf#Event_Log_filtering,

if the logs you indicated aren't relevant for your searches, you can follow the instructons in the above link, adding a blacklist to your inputs.conf in the WinEventLog:Security stanza.

Only one attention point: in the blacklist you must use a regex, not a string to search.

Ciao.

Giuseppe

0 Karma

PickleRick
SplunkTrust
SplunkTrust

Actually, you can blacklist by eventcodes or by regex. (and with a caveat that if you use renderXml=true, you have to specify blacklist differently).

0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...