Hi Everyone,
I am trying to concoct a regular expression in the Splunk App for Enterprise Security to find all SCCM logs that contain dest_name="CN . The results of the search will be sent to an alternate SIEM solution.
The search criteria will begin with dest_name="CN
The characters after CN can be any character, any case, and numeral. For example: dest_name="CNWSNCHHHD001" or dest_name="CNWSEC91CD199".
The remaining characters can be any character or number
Log example:
"09-01-2015 11:18:59" timestamp=1441120739267, vendor_product="SystemCenterEndpointProtection", type="SecurityIncident", resourceid=67132131, dest_name="CNWSNCHHHD001", dest_nt_domain="REDACTED", detectiontime=1441120739267, actiontime=1441120750000, product_version="4.5.0216.0", detectionid="{REDACTED}", detection_source="realtime", user="REDACTED", target_process="REDACTED", file_path="REDACTED", signature="Virus:DOS/JackTheRipper", severity="Severe", category="Virus", action_type="quarantine", action="deferred", action_result="false", action_error_code=-2147024846, pending_action="noaction"
(Also, sourcetype should be from sccm:malware)
Any assistance to what I may be doing wrong would be greatly appreciated.
Thanks,
Al Wever
... View more