Getting Data In

WMI Filter event log security Category string

android_74
New Member

Hi,

Running a trial of splunk 4.2 on windows 2008, attempting to filter before entering the index queue. Objective to "account management" security events and drop all other events.

The only data to enter index is

source="WMI:WinEventLog:Security" CategoryString="Account Management"

I have created props.conf and transforms.conf in C:\Program Files\Splunk\etc\system\local tried a few different combinations, but so far no progress.

props.conf

[WinEventLog:Security]

TRANSFORMS-evtlog = wmi-filter,wmi-null`

transforms.conf

[wmi-null]

REGEX = .

DEST_KEY = queue

FORMAT = nullQueue

[wmi-filter]

REGEX=(?msi)^(CategoryString=Account Management)

DEST_KEY = queue

FORMAT = indexQueue

welcome some guidance, thanks

0 Karma
1 Solution

hazekamp
Builder

Android,

The issue could be with props.conf above. If your data is being indexed as WMI:WinEventLog:Security, your <spec> stanza within props.conf should reflect:

## props.conf
[WMI:WinEventLog:Security]
TRANSFORMS-evtlog = wmi-null,wmi-filter

UPDATE: For TRANSFORMS you want to place your catch all as the first property to run.

View solution in original post

0 Karma

android_74
New Member

[wmi-filter28SecGrp]

REGEX=(?msi)^(CategoryString=Security Group Management)

DEST_KEY = queue

FORMAT = indexQueue

[wmi-filter28DlGrp]

REGEX=(?msi)^(CategoryString=Distribution Group Management)

DEST_KEY = queue

FORMAT = indexQueue

0 Karma

android_74
New Member

If it helps, this is pretty much my final for auditing changes to active directory

props.conf

[WMI:WinEventLog:Security]

TRANSFORMS-evtlog = wmi-null,wmi-filter,wmi-filter28user,wmi-filter28SecGrp,wmi-filter28DlGrp

transforms.conf

[wmi-null]

REGEX = .

DEST_KEY = queue

FORMAT = nullQueue

[wmi-filter]

REGEX=(?msi)^(CategoryString=Account Management)

DEST_KEY = queue

FORMAT = indexQueue

[wmi-filter28user]

REGEX=(?msi)^(CategoryString=User Account Management)

DEST_KEY = queue

FORMAT = indexQueue

0 Karma

android_74
New Member

trying out

[source::(?-i)WMI:WinEventLog:Security]

TRANSFORMS-evtlog = wmi-filter,wmi-null

0 Karma

hazekamp
Builder

Android,

The issue could be with props.conf above. If your data is being indexed as WMI:WinEventLog:Security, your <spec> stanza within props.conf should reflect:

## props.conf
[WMI:WinEventLog:Security]
TRANSFORMS-evtlog = wmi-null,wmi-filter

UPDATE: For TRANSFORMS you want to place your catch all as the first property to run.

0 Karma

android_74
New Member

okay... just tried:

props.conf

[WMI:WinEventLog:Security]

TRANSFORMS-evtlog = wmi-null,wmi-filter

and it is working!.. which is very confusing. I did swap the tranforms around, but still.

thank you.

0 Karma

android_74
New Member

unfortunately this change has still has not had the desired outcome, all of the eventlog is till coming thru. Thanks for your assistance.

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...