Monitoring Splunk

Windows Security logs and USB Monitoring

rduro
New Member

Dear All,

I'm trying to find a way to catch the number 0018F3D97D02BBA0517E001A&0 which before the last backslash.

I put an extract of the line I want to a reg on it.

Object Name:    \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\USBSTOR\Disk&Ven_Kingston&Prod_DT_R500&Rev_PMAP\0018F3D97D02BBA0517E001A&0

The reg command I used is the following:

| rex field=_raw "USBSTOR.*_(?<USBID>......?)"|

I just want to extract all data after the last backslash.

Please help,

Best regards,

Raph

Tags (2)
0 Karma

Ayn
Legend

If that code is the last text in the event, how about:

| rex "(?<USBID>[^\\]+)$"
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...