SecurityEvent Table Transformation DCR not working

Greg Sneed 20 Reputation points
2024-08-09T18:36:16.23+00:00

I'm having an issue with ingestion on to a Workspace that is connected to Microsoft Sentinel. I have created a Transformation DCR / Ingestion Time Filter on the SecurityEvents table, but am still seeing events in the logs that should have been filtered out.

I ran into almost the exact same issue with the Syslog table a few months ago and got a workaround from Microsoft support. However, I don't see how to use the same workaround here.

Ultimately, the SecurityEvent transformation is in place, and I can see that it filters out logs in the wizard. But I also still get all of the logs showing up in the SecurityEvents table.

The current transformation rule is this:

source
| where EventID != 4663 or (EventID == 4663 and (ObjectName !startswith "C:\\" and ObjectName !startswith "\\Device"))

But again, I continue to get all instances of event ID 4663, even where ObjectName does start with "C:"

Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,123 questions
{count} votes

2 answers

Sort by: Most helpful
  1. James Hamil 24,311 Reputation points Microsoft Employee
    2024-08-13T22:41:24.8133333+00:00

    Hi @Greg Sneed , if you are trying to use Event collection using DCR - XPath could be used to filter the events - XPath queries for Windows Event Collection

    For Microsoft Sentinel based security event collection XPath queries are used too as shown below:

    image

    You may have to use the XPath queries and not KQL to filter in events which need to be ingested. 

    Please let me know if you have any questions and I can help you further.

    If this answer helps you please mark "Accept Answer" so other users can reference it.

    Thank you,

    James


  2. Andrew Blumhardt 9,856 Reputation points Microsoft Employee
    2024-08-22T13:07:35.4866667+00:00

    I think we are getting a bit off track.

    You are using the default DCR rule "Common". The associated events can be seen in the Azrue Monitor documentation. Technically you could modify the DCR rule to filter out unwanted events. Though in this case, your filter would require a complex XPATH query. This sees overly complicated.

    You could also look at your local audit policy. That determines the volume and type of security events. If you are seeing too many 4663, maybe your audit policy is too aggressive.

    Your ingestion filter should work. The problem is either a bug or a limitation of the filter. You may consider opening a support case. You can also try alterative queries to produce the same or similar results. See the example below.

    | where EventID != 4663 or (EventID == 4663 and ObjectName !startswith "C:\\") or (EventID == 4663 and ObjectName !startswith "\\Device")
    

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.