Improving visibility into critical Windows security and system events
Filter and parse Windows event logs to reduce log noise and speed up issue identification with BMC Helix Log Analytics and achieve the following goals for your Windows environment:
- Improved operational efficiency by ingesting only actionable Windows event logs
- Faster root cause analysis through structured, searchable event data
Customer success: Apex Global improves operational visibility into Windows environments
Apex Global used filtering and parsing rules in its Windows event logs collection policy. This helped them collect and refine Windows event logs. As a result, they improved visibility into their Windows environment. The operations and security teams can now focus on actionable events by performing targeted searches more effectively. This leads to faster response to system and security issues.
Scenario
Workflow for filtering and parsing Windows event logs

Task 1: Downloading and installing the Windows connector
Install the Windows connector to collect data from the Windows-based application log files, Windows Events, and Amazon Web Services.
Before you begin
Before you start downloading and installing the Windows connector, make sure to perform the following actions:
- Download and install the connector on a Windows Server Standard Edition with version 2012 or later.
- Have the privileges to execute a batch file and install an application as a service.
- Port 24444 is available on the Windows server from which logs will be collected.
- Have the Visual Studio C++ Redistributable package installed in your environment.
To download and install a connector
- Log in to BMC Helix Log Analytics.
- From the Collection menu, select Connectors.
- On the Connectors page, click Create.
- In the Connector Name field, enter a unique connector name.
- From the Select Connector Type list, select Windows Connector.
- In the Description field, enter the connector description.
- In the Download Connector step, click Download.
The connector is downloaded in the tdc-connector-windows-<build_number>.zip file. - In the Tags step, add tags as key-value pairs to identify the connector.
For example:
name-windows
location-Pune - Click + to add the tag.
Even if you add only one tag, make sure that you click +. - In the Download Install Script step, click Download.
The format of the .bat file name is install-connector-<connector name>.bat.
For example, if you entered the connector name as my-bmc, the file name is install-connector-my-bmc.bat - On the Windows server from which logs will be collected, create a new folder and copy the downloaded .zip and .bat files into it.
Make sure that there are no spaces in the folder names or in the entire path that you provide. - Extract the .zip file by using the Extract here option.
You can see the BMC-DevTools folder. Make sure that the BMC-DevTools folder and the .bat file are at the same level in the folder hierarchy. - Open the command prompt with administrator privileges.
- Run the .bat file.
You can see the computer name with a Fully Qualified Domain Name (FQDN). - Perform one of the following options to complete the connector installation:
- If you do not want to modify the computer name with FQDN, enter N.
- If you want to change the computer name with FQDN, enter Y and perform the following actions:
- Enter the computer name with the FQDN.
For example, xyz.bmc.com. - Enter Y to confirm the computer name.
- Enter the computer name with the FQDN.
The Windows connector is installed and starts as a Windows service. Access the connector logs at the following location:
<Folder where the zip file is extracted>\BMC-DevTools\opt\fluent\fluentd.log.
Task 2: Creating a log pre-filtering rule
Configure a pre-filtering rule to achieve one of the following goals:
- Filter and skip unwanted logs during ingestion.
- Ingest only important logs to BMC Log Analytics.
For this use case, let's create a pre-filtering rule to exclude all Information-type logs at the log source, so the logs are not ingested into BMC Helix Log Analytics.
To create a pre-filtering rule
- Click the Collection menu and select Filtering Rules.
- On the Filtering Rules page, click Create.

- In the Rule Information section, perform the following actions:
- Enter Windows_Events_pre-filtering_rule as the name for the rule.
- In the Collection Type field, select Windows Events.
- In the Rule Configuration section, perform the following actions:
- From the Log Filter list, select Grep.
- From the Directive list, select Exclude.
- In the Key field, enter Level as the key.
- In the Pattern field, enter Information.
- Click Save.
Task 3: Creating a log parsing rule
A parsing rule converts raw log data into key-value pairs, making it convenient for BMC Helix Log Analytics to search, query, and analyze logs. Log records are generated as single-line or multiline texts. Use the parsing rule to further extract the specific fields from the logs and break them into meaningful multiple fields that can be used to derive insights for the
For the use case, let's create a parsing rule to perform field extraction on the Description field data by specifying a regex parser. This rule extracts content into new fields, such as security_id, account_domain, and account_name, as defined by the parsing rule's regex.
To create a log parsing rule
- Click the Collection menu and select Parsing Rules.
- On the Parsing Rules page, click Create.

- In the Rule Information section, perform the following steps:
- Enter Windows_Events_parsing_rule as the name for the rule.
- From the Collection Type list, select Windows Events.
- In the Rule Configuration section, in the Format field, select Field Extraction.
- In Log Field, specify the description to extract the data from the log description.
- In Regular Expression, specify the fields to be extracted.
The expression must be compliant with the Ruby syntax with values specified within slashes. - Click Save.
Task 4: Configuring a Windows event logs collection policy
Windows event logs include actions taken by users and processes running on the computer. These logs provide crucial context that helps in faster issue resolution.
To collect Windows events
- Click the Collection menu and select Collection Policies.
- Click Create.
Enter a unique name and description for the policy to be created.
- From the Collection Type list, select Windows Events.
- In the Connector configurations section, perform the following steps:
- From the Connector Type list, select Windows Connector.
- In Connector Selection Criteria, create the connector selection criteria to identify connectors for collection.
The following fields are available to create the selection criteria:- Status
- Name
- Version
- Host_name
- ip
- Tags
- In the Configuration section, perform the following steps:
- Click Configure.

- In the Customize Logs Data panel, select the Default option.
This collects Windows events from the following channels:- Application
- Security
- Setup
- System
- In the Collection Interval field, enter 120 to collect logs every 2 minutes.
- Select the Collect Existing Events check box to collect the existing events.
- Click Save.
- Click Configure.
- In the Configuration section, add the appropriate Tags.
- In Pre-filtering Rule, select Windows_Events_pre-filtering_rule from the list.
- In Log Parsing, select Windows_Events_parsing_rule from the list.
- In User Group, select Administrators and Operator from the list.
- Click Enable Collection Policy.
- Click Save.
Results
The pre-filtering rule excludes Information-type event logs from being ingested to BMC Helix Log Analytics. This reduces the log volume.
The parsing rule extracts information from the Description field. It displays this information in organized and searchable fields in the Explorer tab of BMC Helix Log Analytics. This setup makes it easier for operators to analyze the data.
- Security teams can quickly identify failed login attempts and audit-related events.
- Operations teams focus on system errors that affect service stability.
Related topics


