Splunk Search

Trouble Blacklisting Windows Event

OpeKush
New Member

Hi I was wondering if there was a way I could blacklist the following event based on the event code and the account name under the Subject field. So I want to blacklist events of code 4663 with a subject name of COMPUTER8-55$. What would the regex for that look like?

05/10/2024 01:05:35 PM
LogName=Sec
EventCode=4670
EventType=0
ComputerName=myComputer.net
SourceName=Microsoft Windows security auditing.
Type=Information
RecordNumber=10000000
Keywords=Audit Success
TaskCategory=Authorization Policy Change
OpCode=Info
Message=Permissions on an object were changed.
 
Subject:
Security ID: S-0-20-35
Account Name: COMPUTER8-55$
Account Domain: myDomain
Logon ID: 0x3E7
 
Object:
Object Server: Security
Object Type: Token
Object Name: -
Handle ID: 0x1718
 
Process:
Process ID: 0x35c
Process Name: C:\Windows\System32\svchost.exe

 

Labels (2)
0 Karma

deepakc
Builder

Try this for starters 

blacklist1 = EventCode="4663" Message="Account Name:\s+COMPUTER8-55\$"

 

0 Karma

OpeKush
New Member

Tried that already, no dice.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...