Hello,
I would like to set up sensors for various Event IDs in the System log. The problem is that Windows is using the same IDs for different messages.
How can I exactly filter out events with a specific string in them?
I noticed there is a hint in the sensor settings (Filter by Message > Exclude Filter > Match String (Event Message) that a % character should be used in this case.
Can you provide some examples of how to use this? In my case, I need to discard all Events with the following text in them: "Login failed for user".
Thank you
Add comment