I got closer.....In further investigation, it tags if the case is the same. 
but not if it comes in all lower case for example

On Friday, February 10, 2017 at 3:54:01 PM UTC-6, Tom Powers wrote:
>
> Looking to do a Regex for a string in full_message
>
> I have the first stream rule tagging EventID:4688   (works great)
>
> Trying to then do a second rule where it will match any .exe that ran out 
> of any user appdata folder.
>
> For example...   (AppData\\Local\\Temp\\.+.exe)   works for my powershell 
> queries but not for Graylog.
>
> What am I missing here?  I have other Regexes working fine, searching for 
> different keywords, but this one eludes me
>
> The goal is to tag into the stream any Event 4688 with any exe that ran 
> out of any users appdata\local\temp folder
>
> All insight is appreciated
>
> Thanks
> TP
>

-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to graylog2+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/5fdd9e5f-450a-4635-af2b-9765a3e6c24f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to