Hello,
I am currently performing a task to extract the fields related to the NTLM protocol to determine if this protocol is being used in my network.
With the security, system and application logs that are collected from windows with elastic agent I already filter according to the information I need.
What brings me to the forum today is that I realize that there is a field called “message” and another “event.original” and I realize that the field “workstation_name” is not within the available fields.
After reading a bit I found that you can add new fields and extract them through regular expressions but I have not been able to get it to work.
if (params._source.containsKey('event.original')) {
def m = /Workstation Name:\s*([^\r\n]+)/.matcher(params._source['event.original']);
if (m.find()) {
emit(m.group(1));
}
}