Skip to main content

SCOM ACS Query to reduce Noise Events

When we enable ACS on the in SCOM environment , after a couple of days we can see what all is being collected.

For us we were seeing a lot of events being collected and most of them were not useful for us to monitor:

the final NOT Query filter i applied was:

AdtAdmin /setquery /query:"SELECT * FROM AdtsEvent WHERE NOT (EventId=4776 OR EventId=4689 OR EventId=4688 OR EventId=4768 OR EventId=4769 OR EventId=4770 OR EventId=4771 OR EventId=4772 OR EventId=4696 OR EventId=5159 OR EventId=5152 OR EventId=5157 OR  PRIMARYUSER LIKE '%SVC%' OR PRIMARYUSER LIKE '%$%' OR TARGETUSER LIKE '%$%')"

This reduced a lot of Noise in our environment.

In order to enable this filter what we need to do is .

Login to the ACS collector:

Open command prompt

Browse to the following directory:

C:\Windows\System32\Security\AdtServer>

Then Run the Query that i mentioned above.


In the query i used PrimaryUser and TargetUser as filter


PrimaryUser = Primary User Name in Header of Event
TargetUser = Target Name in details of Event

This is how an event form Windows Security log is saved in the the tables of ACS Database, you may need to know how the Event log entries are mapped to entries in the ACS database.


For us I wanted to avoid events generated by service accounts and computer account so i used


PRIMARYUSER LIKE '%SVC%' OR PRIMARYUSER LIKE '%$%' OR TARGETUSER LIKE '%$%'

Depending on what you need to achieve you can modify the query as you like:


In case if you need to look for what is being saved in the database , following Query may be helpful.
this has to be ran against the ACS database in SQL


select Eventid,PrimaryUser as Who_Changed,TargetUser as Added_To,CreationTime as [When],String01 as who
from adtserver.dvall5
where CreationTime between '2013-02-01' and '2013-02-10'


Hope this helps.

Comments

Popular posts from this blog

Group Policy Object did not apply because it failed with error code '0x80070534 No mapping between account names and security IDs was done

One of our servers was losing the Local Admin settings as we control them using GPO (restricted Groups) We were receiving the following event on this particular server : Event ID 4098 Application Event Log The computer 'Administrators (built-in)' preference item in the 'Servers Local Admins {odjd9DBD-22AF-48EA-ADF5-F42ADE4182hst}' Group Policy Object did not apply because it failed with error code '0x80070534 No mapping between account names and security IDs was done.' This error was suppressed. To fix the issue we deleted all the folders from the following location and rebooted the server C:\ProgramData\Microsoft\Group Policy\History Hope this helps.

iDRAC 7 Shows no Signal in Virtual Console Preview

Recently i logged on to iDRAC for one of our Dell R720 servers,however somehow the console redirection did not work at all. I kept on seeing No Signal on the Virtual console Preview. I tried Rebooting the server but that did not help. Finally i clicked on Reset iDRAC and this did the trick. It may take around 2 -5 minutes before you can access iDRAC page again. I had to power on the server through iDRAC before anything showed up on console. Hope this Helps.

Close Open Files in Isilon

To close Open files in Isilon Sometimes we may have to Close open files on Isilon , This is how we can accomplish it First find all the Open Files using the Following Command: isi_for_array  "isi smb openfiles list" To Narrow the search  we can grep the result  as an example isi_for_array  "isi smb openfiles list" | grep -i abc Once you find the files the 6 digit number is the id for that open file. To close the open file run the following command isi_for_array isi smb openfiles close "123456" -f Hope this helps