Getting Data In

Why is blacklist with filter on windows event logs not working?

catchvjay
New Member

Hi,

I have a requirement to blacklist all  computer accounts (ending with $) in Security Event Code 4769. So far I have created following filter in inputs.conf but it is not working.

 

 

[WinEventLog://Security]
disabled = 0
renderXml = 1
source = XmlWinEventLog:Security
blacklist1 = EventCode="4769" Message="(?:<Data Name='ServiceName'>).+\$"

 

 

 I checked regex and it is working on regex builder App but filtering is not working. I am still receiving events with computer accounts.

I referred and tried out various splunk forum questions on the same but no luck. Any help will be appreciated.

Thanks for your time.

Labels (1)
0 Karma

kknair007
Observer

@catchvjay You may try this  :
blacklist1 = EventCode="4769"  Message="Account Name:(\W+\w+$)"

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...