Getting Data In

Why is blacklist with filter on windows event logs not working?

catchvjay
New Member

Hi,

I have a requirement to blacklist all  computer accounts (ending with $) in Security Event Code 4769. So far I have created following filter in inputs.conf but it is not working.

 

 

[WinEventLog://Security]
disabled = 0
renderXml = 1
source = XmlWinEventLog:Security
blacklist1 = EventCode="4769" Message="(?:<Data Name='ServiceName'>).+\$"

 

 

 I checked regex and it is working on regex builder App but filtering is not working. I am still receiving events with computer accounts.

I referred and tried out various splunk forum questions on the same but no luck. Any help will be appreciated.

Thanks for your time.

Labels (1)
0 Karma

kknair007
Observer

@catchvjay You may try this  :
blacklist1 = EventCode="4769"  Message="Account Name:(\W+\w+$)"

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...