Splunk Cloud Platform

Whitelisting windows eventlog for event code 4662 in inputs.conf?

somdatta1001
Observer

[WinEventLog:Security]

disabled = 0

index= win*

blacklist1=EventCode="4662" Message=”Accesses:\t\t+(?!Create\sChild)”

Is this correct way to filter out event which only have "Create Child" as field value under access?

Please let me know if there is any syntax error or any other solution that I can try.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

If you're looking for specific text in an event, don't use a negative lookahead for that text as that will find events without the specified text.  Also, it's not clear if the white space in the event is tabs, spaces, or both so it's better to use \s than \t.    Try these settings.

[WinEventLog:Security]
disabled = 0
index= win*
blacklist1=EventCode="4662" Message=”Accesses:\s+Create\sChild"

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...