Getting Data In

Windows TA not extracting key_path as registry_path from registry_type="baseline"

bowesmana
SplunkTrust
SplunkTrust

Is it an omission that the latest Windows TA will only extract registry_path if the registry_type field contains "\w+Key". As a result, registry_path is not set to key_path and therefore in the Endpoint.Registry datamodel, there is no value stored for registry_path in the datamodel and the path comes out as unknown.

Has anyone come across a good reason NOT to add the additional mapping, so that it will pass through the DM correctly.

The consequence is that you can't use tstats on an accelerated DM

Labels (3)
0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...