Getting Data In

What Windows Event Codes are generally acceptable to filter out?

jones4bob
Explorer

Is there a good reference list or someone that can post what ways Windows Event Logs are being filtered? I'm particularly interested in those from a security perspective. For example, I get a flood of successful logins on an IIS web server from the IUSR account, which is of little value to me.

1 Solution

BunnyHop
Contributor

You can filter using multiple values or one value.

See this answer for an example: http://answers.splunk.com/questions/577/how-do-you-filter-windows-event-log

I filter out EventCodes that are irrelevant. This site gives you a down and dirty look at WindowsEventLog:

http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx

The webinars in the site are pretty helpful as well. Once you've built your list of events to filter, apply them on your splunk instance.

View solution in original post

chaker
Contributor

Splunk 6 makes this easier now with blacklists for windows inputs.

[WinEventLog:Security]
disabled = false
blacklist = 5156-5157

It also makes suppressing the message payload much easier.

[WinEventLog:Security]
disabled = 0
suppress_text = 1

http://blogs.splunk.com/2013/10/14/windows-event-logs-in-splunk-6/

0 Karma

denisevw
Path Finder

This does not work on Universal Forwarders, correct?

0 Karma

BunnyHop
Contributor

You can filter using multiple values or one value.

See this answer for an example: http://answers.splunk.com/questions/577/how-do-you-filter-windows-event-log

I filter out EventCodes that are irrelevant. This site gives you a down and dirty look at WindowsEventLog:

http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx

The webinars in the site are pretty helpful as well. Once you've built your list of events to filter, apply them on your splunk instance.

Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...