Hi
I am testing the eventlog beat for file / folder auditing. There seems to be a problem with pulling out the Access request Information of the message.
The error I am getting on the client side is
2016-05-24T20:20:17+01:00 ERR WinEventLog[Security] Dropping event. Failed to unmarshal XML='4663101281200x80200000000000006207564170SecurityFP03.domain.localS-1-5-21-4095959057-3655770624-506157572-11219suresyncDOMAIN0x2ed81b88SecurityFileH:\Data\Data\Hosting\FrankSociety\Users\Frank.Bowman_S\Scanned Documents\Welcome Scan.jpg:3or4kl4x13tuuug3Byamue2s4b0x3854%%4416
0x10x13f0C:\Program Files (x86)\Software Pursuits\SureSync 8\SPIComService451.exeAn attempt was made to access an object.
Subject:
Security ID: S-1-5-21-4095959057-3655770624-506157572-11219
Account Name: suresync
Account Domain: DOMAIN
Logon ID: 0x2ED81B88
Object:
Object Server: Security
Object Type: File
Object Name: H:\Data\Hosting\FrankSociety\Users\Frank.Bowman_S\Scanned Documents\Welcome Scan.jpg:3or4kl4x13tuuug3Byamue2s4b
Handle ID: 0x3854
Resource Attributes:
Process Information:
Process ID: 0x13f0
Process Name: C:\Program Files (x86)\Software Pursuits\SureSync 8\SPIComService451.exe
Access Request Information:
Accesses: ReadData (or ListDirectory)
Access Mask: 0x1</Message><Level>Information</Level><Task>Removable Storage</Task><Opcode>Info</Opcode><Channel>Security</Channel><Provider>Microsoft Windows security auditing.</Provider><Keywords><Keyword>Audit Success</Keyword></Keywords></RenderingInfo></Event>'. XML syntax error on line 1: illegal character code U+0005
2016-05-24T20:20:17+01:00 INFO EventLog[Security] Successfully published 99 events
Which ultimately leads to the following in Kibana: event_data.AccessList %%4416
This seems to be happening for every message of this type (I cant find one that isn't like this)
Any ideas?
Thanks