Splunk Enterprise

Denylisting events for windows

lclayton95
Loves-to-Learn Everything

I am current denying chrome and edge processes from being indexed with the following regex

 

blacklist7 = EventCode="4673" Message="Audit\sFailure[\W\w]+Process\sName:[^\n]+(chrome.exe|msedge.exe)"

 

 This works on majority of the forwarders. However some stragglers still send these events in event though they have the updated inputs deploy on their systems. My work around is to nullqueue the events in transforms.conf in the /etc/system/local directory. I believe this should be working at the forwarder level. Any ideas as to why this is happening. 

 

Some perspective is i have 400 windows machines and only 5 of the systems still send in the events even after a deploy server reload.

 

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I suspect two possibilities, although there may be others.

1) The five UFs do not have the right settings.  Confirm using btool.

2) The regex is failing to match on the five UFs because of some difference(s) in the event log.

---
If this reply helps you, Karma would be appreciated.
0 Karma

lclayton95
Loves-to-Learn Everything

looks like they all have the same settings as the others. The logs look identical to the already ones that are blacklisted.

0 Karma
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...