<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authenication datamodel to identify when a 'breakglass' accounts has been successfully authenticated in Security</title>
    <link>https://community.splunk.com/t5/Security/Authenication-datamodel-to-identify-when-a-breakglass-accounts/m-p/509516#M11618</link>
    <description>&lt;P&gt;Hi Rich - Hope all is well? Many thanks for getting back to me and providing a solution on the SPL query for the Notable. Already tested it this morning against certain user accounts and it is working fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for responding, it pointed me in the right direction to get this set up correctly.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jul 2020 13:29:00 GMT</pubDate>
    <dc:creator>Thundercat</dc:creator>
    <dc:date>2020-07-16T13:29:00Z</dc:date>
    <item>
      <title>Authenication datamodel to identify when a 'breakglass' accounts has been successfully authenticated</title>
      <link>https://community.splunk.com/t5/Security/Authenication-datamodel-to-identify-when-a-breakglass-accounts/m-p/509324#M11616</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Thanks for taking the time to review this message.&lt;/P&gt;&lt;P&gt;I attempting to create a Splunk notable that will allow me to detect if our organisation 'breakglass' accounts have been successfully authenticated. The existing notable uses the Authentication Data Model and this has been disable in the past for some reason.&lt;BR /&gt;&lt;BR /&gt;I am attempting to revise this query to search not on one break glass account but for a few. The exist query looks something like this, as shown below.&lt;/P&gt;&lt;P&gt;| datamodel Authentication Successful_Authentication search | search Authentication.signature_id=4624 Authentication.user=Administrator NOT (host=AWD* OR ComputerName=EC2* OR ComputerName=WIN*)&lt;BR /&gt;| rename Authentication.user as user&lt;BR /&gt;| table src_ip, user, host&lt;BR /&gt;| eval urgency="critical"&lt;/P&gt;&lt;P&gt;I have change the&amp;nbsp;Authentication.user=Administrator specifically to the userid of the one of the breakglass account, how do I include in the search for the other accounts, by using a OR operator?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Appreciate any guidance anyone can offer and refining this SPL query.&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 14:44:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenication-datamodel-to-identify-when-a-breakglass-accounts/m-p/509324#M11616</guid>
      <dc:creator>Thundercat</dc:creator>
      <dc:date>2020-07-15T14:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: Authenication datamodel to identify when a 'breakglass' accounts has been successfully authenticated</title>
      <link>https://community.splunk.com/t5/Security/Authenication-datamodel-to-identify-when-a-breakglass-accounts/m-p/509362#M11617</link>
      <description>&lt;P&gt;Yes, you can use &lt;FONT face="courier new,courier"&gt;OR&lt;/FONT&gt;.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| datamodel Authentication Successful_Authentication search | search Authentication.signature_id=4624 (Authentication.user=Administrator OR Authentication.user=foo OR Authentication.user=bar) NOT (host=AWD* OR ComputerName=EC2* OR ComputerName=WIN*)
...&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2020 17:48:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenication-datamodel-to-identify-when-a-breakglass-accounts/m-p/509362#M11617</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-07-15T17:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: Authenication datamodel to identify when a 'breakglass' accounts has been successfully authenticated</title>
      <link>https://community.splunk.com/t5/Security/Authenication-datamodel-to-identify-when-a-breakglass-accounts/m-p/509516#M11618</link>
      <description>&lt;P&gt;Hi Rich - Hope all is well? Many thanks for getting back to me and providing a solution on the SPL query for the Notable. Already tested it this morning against certain user accounts and it is working fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for responding, it pointed me in the right direction to get this set up correctly.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 13:29:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Authenication-datamodel-to-identify-when-a-breakglass-accounts/m-p/509516#M11618</guid>
      <dc:creator>Thundercat</dc:creator>
      <dc:date>2020-07-16T13:29:00Z</dc:date>
    </item>
  </channel>
</rss>

