Getting Data In

Windows Events filtering

only4luca
New Member

Hi All,

Trying to filter on Win Sec events, dropping events that don't have particular eventids and Account Name contains $ (computer accounts)
Currently I have something like this in my transforms.conf:

[eventsallowed]
... = (?m)^EventCode=(4624|4625).Account Name:^((?!\$).)*$

this doesn't work. Dropping the Account Name: ... forwards the events correctly. The reg also seems to be fine for the account name, so not sure what i'm doing wrong.
Any ideas?

Thanks,
Luca

Tags (1)
0 Karma

Lord_Middleton
New Member

Nope- trying to get it running on the main Splunk instance- sorry for the delay... been busy on other projects.

0 Karma

Ayn
Legend

If you're trying to do this on a Universal Forwarder, that won't work. Filtering can only be performed on Splunk instances that perform parsing (basically, most instances except Universal Forwarders).

0 Karma

Lord_Middleton
New Member

Did you end up figuring out what the issue was? I am working on the same task and have been bashing my head against it for a little while now...

0 Karma

MarioM
Motivator

have you tried with (?msi) instead of (?m) ?

0 Karma
Get Updates on the Splunk Community!

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer at Splunk .conf24 ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...