## windows system sub-sourcetyping [source::WinEventLog:System] TRANSFORMS-force_source_system_ias_for_wineventlog = force_source_system_ias_for_wineventlog ###### All Windows Event Log ###### ## Apply the following properties to all Windows events [source::(WinEventLog|XmlWinEventLog|WMI:WinEventLog)...] LOOKUP-CategoryString_for_windows = windows_signature_lookup signature_id OUTPUTNEW CategoryString FIELDALIAS-dvc_for_windows = host as dvc_nt_host,host as dvc FIELDALIAS-event_id_for_windows = RecordNumber as event_id REPORT-file_path-file_name_for_windows = file_path-file_name_for_windows ## Attempt to map EventCodes that have sub statii ( i.e. EventCode=4625 + SubStatus=0xC0000064 = "User name does not exist" ) LOOKUP-signature_for_windows = windows_signature_lookup2 signature_id,Sub_Status OUTPUTNEW signature,signature as name ## Default lookup for EventCode->signature mapping ( i.e. EventCode=4625 + SubStaus=null() = "An account failed to log on" ) LOOKUP-signature_for_windows3 = windows_signature_lookup signature_id OUTPUTNEW signature,signature as name FIELDALIAS-signature_id_for_windows = EventCode as signature_id FIELDALIAS-user_group_id_for_windows = Primary_Group_ID as user_group_id ###### Add Windows Event Code Description Lookup Using LogName, EventCode ###### LOOKUP-EventCodeDescription_for_windows = windows_event_descriptions LogName,EventCode OUTPUTNEW EventCodeDescription ###### Add an Alias for TaskCategory and CategoryString from the Windows Events ##### #FIELDALIAS-CategoryString_for_windows = CategoryString as TaskCategory ###### Add Host value for Standard Windows Performance Counter Information ###### [source::(Perfmon|WMI:Perfmon)...] FIELDALIAS-Host_for_windows_perfmon = host as Host ###### Windows Application Event Log ###### [source::WinEventLog:Application] FIELDALIAS-dest_for_wineventlog_application = ComputerName as dest FIELDALIAS-msgid = Message_ID AS message_id ###### Windows System Event Log ###### ## All Windows System [source::*:System] REPORT-bestmatch_for_windows_system = ComputerName_as_dest,ComputerName_as_src REPORT-package_for_windows_system_update = package_title_for_windows_system_update,package_for_windowsupdatelog LOOKUP-status_for_windows_system_update = windows_update_status_lookup EventCode OUTPUTNEW status REPORT-user_for_windows_system = user_for_windows_system_ias EVAL-vendor = "Microsoft" EVAL-product = "Windows" ## IAS (Currently WinEventLog Support Only) [source::WinEventLog:System:IAS] REPORT-0auto_kv_for_windows_system_ias = auto_kv_for_windows_system_ias EVAL-app = "ias" ###### WindowsUpdateLog ###### [source::*WindowsUpdateLog] sourcetype = WindowsUpdateLog [source::*WindowsUpdate.Log] sourcetype = WindowsUpdateLog [WindowsUpdateLog] FIELDALIAS-dest_for_windowsupdatelog = host as dest REPORT-0package_message_for_windowsupdatelog = package_message_for_windowsupdatelog REPORT-1package_title_for_windowsupdatelog = package_title_for_windowsupdatelog,package_title_for_windowsupdatelog_restartrequired,package_title_for_windowsupdatelog_package_message REPORT-package_for_windowsupdatelog = package_for_windowsupdatelog REPORT-pid-tid-component_for_windowsupdatelog = pid-tid-component_for_windowsupdatelog LOOKUP-status_for_windowsupdatelog = windows_update_status_lookup vendor_status OUTPUTNEW status ###### WindowsFirewallLog ###### [Windows_FW] pulldown_type = true MAX_TIMESTAMP_LOOKAHEAD = 32 SHOULD_LINEMERGE = False REPORT-Windows_FW = Transform_Windows_FW [source::Splunk_Data_Collect] EXTRACT-remote_data_host = host\=\"(?[^\"]+) [source::WinEventLog:Security] EXTRACT-4625-fields = (?ms)EventCode=4625.*?Message=.*?\n.*?Subject\s*:.*?Account Name:\s*(?.*?)\n.*?Account Domain:\s*(?.*?)\n.*?Logon ID:\s*(?.*?)\n.*?\nLogon Type:.*?\n.*?Account For Which Logon Failed.*?\n.*?Security ID:(?.*?)\n.*?Account Name:(?.*?)\n.*?Account Domain:(?.*?)\n EXTRACT-4624-srcip = (?ms)EventCode=4624\n.*?Source Network Address:\s+?(?[^\n]+) EXTRACT-4624-user = (?ms)New Logon:\n*?.*?Security ID:\s*?(?[^\\]+)\\(?.*?)\n.*?Account Name:(?.*?)\s*\n.*?Account Domain:\s+(?[^\n]+).*?Logon ID:\s+(?[^\n]+) EXTRACT-group_changes = (?ms)EventCode=(4727|4730|4731|4734|4735|4737|4744|4745|4748|4749|4750|4753|4754|4755|4758|4759|4760|4763|4764).*Message=A (?.*)\-(?(enabled|disabled))\s(?.*)\sgroup\swas\s(?[^\.]+).*Subject:.*Security ID:\s*(?.*)\\(?.*)\s*\n.*Account Name:.*Group:.*Security ID:\s*(?.*)\s*\n.*Group Name:.*Group Domain:(?[^(\r|\n)]+).*Attributes: EXTRACT-group_change_4764 = (?ms)EventCode=(4764)(\n|\r).*Message\=A group’s type was (?[^\.]+) EXTRACT-groupmembership_changes = (?ms)EventCode=(4728|4729|4732|4733|4746|4747|4751|4752|4756|4757|4761|4762).*Message=A member was (?.*) (to|from) a (?.*)\-(?(enabled|disabled)) (?.*) group.*Subject:.*Security ID:\s*(?.*)\\(?.*)\n.*Account Name:.*Account Domain:.*Member:.*Security ID:\s*.*\\(?.*)\n.*Account Name:.*Group:.* EXTRACT-dest_nt_domain_for_4756 = (?msi)EventCode=4756.*(?:Account Domain.*Account Domain|Account Domain(?!(Account Domain)))\:\s+(?[a-zA-Z0-9._[\S\-\S]+)$ EXTRACT-group_changes_event_4756 = (?ms)EventCode\=4756\s*\n.*Member\:.*CN\=(?[^\,]+),CN.*Group\:.*Account\sName\:\s+(?[^(\n|\r|\s)]+).*Account\sDomain\:\s+(?[^(\n|\r|\s)]+).* EXTRACT-group_change_groupname = (?ms)EventCode=(4756)(\n|\r).*Group:(\n|\r).*Security ID:(?.*)\\(?[^(\n|\r)]+)(\r|\n).*Account Name: EXTRACT-4662-fields = (?ms)EventCode=4662\s*\n.*Message=.*?\n.*?Subject\s*:.*?Account Name:\s*(?.*?)\s*\n.*?Account Domain:\s*(?.*?)\s*\n.*?Logon ID:\s*(?.*?)\s*\n EXTRACT-ObjectNameGuid = (?ms)EventCode=4662\s*\n.*Message=.*?Object\s*:.*?Object\sName:\s*(CN=|%)*{*(?[0-9a-fA-F]{8}-([0-9a-fA-F]{4}-){3}[0-9a-fA-F]{12})}*.* LOOKUP-msadgroupclass = GroupType MSADGroupClassID OUTPUTNEW MSADGroupClass EXTRACT-gpo_changes = (?ms)Object Type\:\s+groupPolicyContainer(\n|\r).*Object\sName\:\s+CN(=|=\")(?\{.*\}) EXTRACT-msad_changes_oldevents = (?ms)EventCode=(624|628)(\n|\r).*Message\=(?[^\:]+) EXTRACT-msad_action_oldevents = (?ms)EventCode=(624|628|642)(\n|\r).*Message\=User\sAccount\s(?[^\:]+) EXTRACT-unlocked_accounts = (?msi)Message\=A\suser\saccount\swas\s(?[^\.]+)\.(\s+|\n+|\r+).*Subject\:(\s+|\n+|\r+).*Account\sName\:\s+(?[^(\s+|\n+|\r+)]+)(\s+|\n+|\r+).*Logon\sID\:\s+(?[^(\s+|\n+|\r+)]+)(\s+|\n+|\r+).*Target\sAccount\:(\s+|\n+|\r+).*?Account Name\:\s+(?[^(\s+|\n+|\r+)]+) EXTRACT-locked_accounts = (?msi)Message\=A\suser\saccount\swas\s(?[^(\.|\s)]+)(\.|\s+|\n+|\r+).*Subject\:(\s+|\n+|\r+).*Account\sName\:\s+(?[^(\s+|\n+|\r+)]+)(\s+|\n+|\r+).*Logon\sID\:\s+(?[^(\s+|\n+|\r+)]+)(\s+|\n+|\r+).*(Account\sThat\sWas\sLocked\sOut|Target\sAccount)\:(\s+|\n+|\r+).*?Account Name\:\s+(?[^(\s+|\n+|\r+)]+) EXTRACT-group_changes_srcuser = (?ms)Account Name\:\s+(?[^\n\r\s]+)[\r\n\s].*Account\sDomain\:\s+(?[^\n\r\s]+)[\r\n\s].*Logon\sID\:\s+(?[^\n\r\s]+)(\r|\n|\s).*Group\: EXTRACT-PSN=Process Name:.*Microsoft\.Exchange\.(?[^\.]+)\.exe