Hi, I would like to monitor the login in some windows servers with the event viewer, so I created a new item:
Type: zabbix agent (active)
Key: eventlog[Security,,,,4624|4647,,skip]
I only need the "2" "7" and "10" logon type, and I cannot find a regex to insert into the key to filter the entries.
All the old discussions I've found have expression that are not working with my item.
I'm on zabbix docker 5.4.5
Thanks in advance!
Type: zabbix agent (active)
Key: eventlog[Security,,,,4624|4647,,skip]
I only need the "2" "7" and "10" logon type, and I cannot find a regex to insert into the key to filter the entries.
All the old discussions I've found have expression that are not working with my item.
I'm on zabbix docker 5.4.5
Thanks in advance!