Getting Data In

WMI Filter event log security Category string

android_74
New Member

Hi,

Running a trial of splunk 4.2 on windows 2008, attempting to filter before entering the index queue. Objective to "account management" security events and drop all other events.

The only data to enter index is

source="WMI:WinEventLog:Security" CategoryString="Account Management"

I have created props.conf and transforms.conf in C:\Program Files\Splunk\etc\system\local tried a few different combinations, but so far no progress.

props.conf

[WinEventLog:Security]

TRANSFORMS-evtlog = wmi-filter,wmi-null`

transforms.conf

[wmi-null]

REGEX = .

DEST_KEY = queue

FORMAT = nullQueue

[wmi-filter]

REGEX=(?msi)^(CategoryString=Account Management)

DEST_KEY = queue

FORMAT = indexQueue

welcome some guidance, thanks

0 Karma
1 Solution

hazekamp
Builder

Android,

The issue could be with props.conf above. If your data is being indexed as WMI:WinEventLog:Security, your <spec> stanza within props.conf should reflect:

## props.conf
[WMI:WinEventLog:Security]
TRANSFORMS-evtlog = wmi-null,wmi-filter

UPDATE: For TRANSFORMS you want to place your catch all as the first property to run.

View solution in original post

0 Karma

android_74
New Member

[wmi-filter28SecGrp]

REGEX=(?msi)^(CategoryString=Security Group Management)

DEST_KEY = queue

FORMAT = indexQueue

[wmi-filter28DlGrp]

REGEX=(?msi)^(CategoryString=Distribution Group Management)

DEST_KEY = queue

FORMAT = indexQueue

0 Karma

android_74
New Member

If it helps, this is pretty much my final for auditing changes to active directory

props.conf

[WMI:WinEventLog:Security]

TRANSFORMS-evtlog = wmi-null,wmi-filter,wmi-filter28user,wmi-filter28SecGrp,wmi-filter28DlGrp

transforms.conf

[wmi-null]

REGEX = .

DEST_KEY = queue

FORMAT = nullQueue

[wmi-filter]

REGEX=(?msi)^(CategoryString=Account Management)

DEST_KEY = queue

FORMAT = indexQueue

[wmi-filter28user]

REGEX=(?msi)^(CategoryString=User Account Management)

DEST_KEY = queue

FORMAT = indexQueue

0 Karma

android_74
New Member

trying out

[source::(?-i)WMI:WinEventLog:Security]

TRANSFORMS-evtlog = wmi-filter,wmi-null

0 Karma

hazekamp
Builder

Android,

The issue could be with props.conf above. If your data is being indexed as WMI:WinEventLog:Security, your <spec> stanza within props.conf should reflect:

## props.conf
[WMI:WinEventLog:Security]
TRANSFORMS-evtlog = wmi-null,wmi-filter

UPDATE: For TRANSFORMS you want to place your catch all as the first property to run.

0 Karma

android_74
New Member

okay... just tried:

props.conf

[WMI:WinEventLog:Security]

TRANSFORMS-evtlog = wmi-null,wmi-filter

and it is working!.. which is very confusing. I did swap the tranforms around, but still.

thank you.

0 Karma

android_74
New Member

unfortunately this change has still has not had the desired outcome, all of the eventlog is till coming thru. Thanks for your assistance.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...