<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic A call for collaboration!  Windows Security Logs Parsing in Log Analytics</title>
    <link>https://community.dynatrace.com/t5/Log-Analytics/A-call-for-collaboration-Windows-Security-Logs-Parsing/m-p/280733#M1394</link>
    <description>&lt;P&gt;So, we need to start parsing Windows Security logs and, boy oh boy, are they all over the place...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since Microsoft doesn't seem to stick with dedicated field names and log formats between the various event types, this is a daunting task...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This means that we will basically need to setup custom processors in our OpenPipeline pipeline for each event ID we are interested in parsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just built one for 4740 (Account Lockout), and, before I start building pipelines for each ID we're interested in, I was hoping somebody has already done some of this work and would be willing to share!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To kickstart the party, I'll share my parser for 4740 events here:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;parse content, """LD:winlog.message EOLWIN
EOLWIN?
'Subject:' EOLWIN
LD 'Security ID:' SPACE LD:winlog.subject.sid EOLWIN
LD 'Account Name:' SPACE LD:winlog.subject.account.name EOLWIN
LD 'Account Domain:' SPACE LD:winlog.subject.account.domain EOLWIN
LD 'Logon ID:' SPACE LD:winlog.subject.logon.id EOLWIN
EOLWIN?
'Account That Was Locked Out:' EOLWIN
LD 'Security ID:' SPACE LD:winlog.account.sid EOLWIN
LD 'Account Name:' SPACE LD:winlog.account.name EOLWIN
EOLWIN?
'Additional Information:' EOLWIN
LD 'Caller Computer Name:' SPACE LD:winlog.account.computer_name"""&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even if you just have one or two parsers for Windows Security events, please feel free to share!&amp;nbsp; Hopefully we can make a nice little "repository" of helpful Windows Security parsers here for people to use!&lt;/P&gt;
&lt;P&gt;And please share classic parsers too!&amp;nbsp; They usually work perfectly with OpenPipeline or can be made to work with very little modification.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jul 2025 06:58:05 GMT</pubDate>
    <dc:creator>36Krazyfists</dc:creator>
    <dc:date>2025-07-04T06:58:05Z</dc:date>
    <item>
      <title>A call for collaboration!  Windows Security Logs Parsing</title>
      <link>https://community.dynatrace.com/t5/Log-Analytics/A-call-for-collaboration-Windows-Security-Logs-Parsing/m-p/280733#M1394</link>
      <description>&lt;P&gt;So, we need to start parsing Windows Security logs and, boy oh boy, are they all over the place...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since Microsoft doesn't seem to stick with dedicated field names and log formats between the various event types, this is a daunting task...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This means that we will basically need to setup custom processors in our OpenPipeline pipeline for each event ID we are interested in parsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just built one for 4740 (Account Lockout), and, before I start building pipelines for each ID we're interested in, I was hoping somebody has already done some of this work and would be willing to share!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To kickstart the party, I'll share my parser for 4740 events here:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;parse content, """LD:winlog.message EOLWIN
EOLWIN?
'Subject:' EOLWIN
LD 'Security ID:' SPACE LD:winlog.subject.sid EOLWIN
LD 'Account Name:' SPACE LD:winlog.subject.account.name EOLWIN
LD 'Account Domain:' SPACE LD:winlog.subject.account.domain EOLWIN
LD 'Logon ID:' SPACE LD:winlog.subject.logon.id EOLWIN
EOLWIN?
'Account That Was Locked Out:' EOLWIN
LD 'Security ID:' SPACE LD:winlog.account.sid EOLWIN
LD 'Account Name:' SPACE LD:winlog.account.name EOLWIN
EOLWIN?
'Additional Information:' EOLWIN
LD 'Caller Computer Name:' SPACE LD:winlog.account.computer_name"""&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even if you just have one or two parsers for Windows Security events, please feel free to share!&amp;nbsp; Hopefully we can make a nice little "repository" of helpful Windows Security parsers here for people to use!&lt;/P&gt;
&lt;P&gt;And please share classic parsers too!&amp;nbsp; They usually work perfectly with OpenPipeline or can be made to work with very little modification.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jul 2025 06:58:05 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Log-Analytics/A-call-for-collaboration-Windows-Security-Logs-Parsing/m-p/280733#M1394</guid>
      <dc:creator>36Krazyfists</dc:creator>
      <dc:date>2025-07-04T06:58:05Z</dc:date>
    </item>
  </channel>
</rss>

