Quantcast
Channel: Questions in topic: "universal-forwarder"
Viewing all articles
Browse latest Browse all 1551

Collecting Windows eventlogs with whitelist based on word

$
0
0
Hi I need to collect all Windows security logs from my infrastructure with Splunk UF installed which include specific Keyword I'm using following config for Splunk add-on for Windows, but this results in collecting all logs from server. [WinEventLog://Security] disabled = 0 start_from = oldest current_only = 0 checkpointInterval = 5 whitelist1 = (?msi)^Workstation\s+Name\:\s+KEYWORD index = wineventlog renderXml=false How can I do this correctly?

Viewing all articles
Browse latest Browse all 1551

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>