Skip to content

Remove missing fields in Windows Event Log Cleared detection#4001

Open
AndreiBanaru wants to merge 2 commits intosplunk:developfrom
AndreiBanaru:fix-Windows-Event-Log-Cleared
Open

Remove missing fields in Windows Event Log Cleared detection#4001
AndreiBanaru wants to merge 2 commits intosplunk:developfrom
AndreiBanaru:fix-Windows-Event-Log-Cleared

Conversation

@AndreiBanaru
Copy link
Copy Markdown
Contributor

As described in #4000, I believe these fields should be removed since the aggregation will miss results for EventCode=104.

@AndreiBanaru
Copy link
Copy Markdown
Contributor Author

Bummer, I see the build failed since Windows Event Log Security 1102 data source expects these fields:

Value error, Data source 'Windows Event Log Security 1102' has output fields ['app', 'name', 'object_attrs', 'src_user', 'subject'] that are not present in the search for detection 'Windows Event Log Cleared'

@AndreiBanaru
Copy link
Copy Markdown
Contributor Author

I could do a:

| fillnull app name object_attrs signature src_user subject value=unknown

right before the stats , but in my opinion maybe you guys would want to reconsider updating contentctl to just throw a warning if the output_fields aren't all present in the query.

@nasbench
Copy link
Copy Markdown
Contributor

nasbench commented Apr 9, 2026

Bummer, I see the build failed since Windows Event Log Security 1102 data source expects these fields:

Value error, Data source 'Windows Event Log Security 1102' has output fields ['app', 'name', 'object_attrs', 'src_user', 'subject'] that are not present in the search for detection 'Windows Event Log Cleared'

This is not an issue, we could remove these from the required fields, if they are not filled. I will investigate and apply the changes accordingly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants