Getting Data In

Whitelist Query

ryanadamski
Engager

Hello,

I am ingesting file auditing logs to monitor changes to certain files. I am monitoring events 4663 and 4656 which have an Object Name that lists the file path of the accessed file. We are only concerned about .pdf, .doc, and .docx files and would like to filter out any other file type.

Currently I have the below whitelist in place but I am getting stuck trying to figure out how to only ingest certain file types (.pdf, .doc, and .docx) under the Object Name field within the log. 

whitelist = 4663,4656

Here is a log 4663 example (I bolded the part we want to filter): 

 An attempt was made to access an object.

Subject:
Security ID: Test User
Account Name: Test User
Account Domain: Test
Logon ID: 12345567

Object:
Object Server: Security
Object Type: File
Object Name: D:\Data\Test\Test.pdf
Handle ID: 0x0552

Any help would be great. Thank you.

Labels (3)
0 Karma

ericjorgensenjr
Path Finder

You can send events that don't match one of those document types to the nullQueue using props/transforms like these:

props.conf

[<name of relevant sourcetype>]
TRANSFORMS-nullobject=nullobject

transforms.conf

[nullobject]
REGEX=Object\sName:\s+[^\.]+\.(?:(?i)(?:pdf)|(?:doc)|(?:docx))$
DEST_KEY=queue
FORMAT=nullQueue

 

0 Karma
Get Updates on the Splunk Community!

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...