<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Account lockout in Security</title>
    <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491170#M15347</link>
    <description>&lt;P&gt;Hi @risingflight143,&lt;BR /&gt;
probably it's a problem of visualization, but earliest is a little different:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=winevenlog sourcetype=wineventlog:security EventCode=4740 earliest=-h  (host="dc01*" OR host="dc02*") 
| table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;P.S.: use always index as search parameter, you'll have faster searches.&lt;/P&gt;

&lt;P&gt;I didn't understand if this search works for you or not.&lt;BR /&gt;
If not, what's the message or the wrong result?&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2020 07:57:55 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-01-27T07:57:55Z</dc:date>
    <item>
      <title>Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491163#M15340</link>
      <description>&lt;P&gt;Hi Experts&lt;BR /&gt;
I am completely new to spunk, I have a two requirements.&lt;BR /&gt;
1. One of my user is getting locked and how can check in splunk lets say user1 is getting locked i know event id 4740 but how can i check in splunk using this eventid&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;One of my user is removed from an AD group, how can i check who has removed it.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Fri, 24 Jan 2020 15:57:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491163#M15340</guid>
      <dc:creator>risingflight143</dc:creator>
      <dc:date>2020-01-24T15:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491164#M15341</link>
      <description>&lt;P&gt;Try this for lockouts:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(sourcetype="WinEventLog:Security" EventCode=4740 src_ip!="127.0.0.1")
| stats  count by src_ip,user, user_email, dest, subject
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 24 Jan 2020 16:36:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491164#M15341</guid>
      <dc:creator>jscraig2006</dc:creator>
      <dc:date>2020-01-24T16:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491165#M15342</link>
      <description>&lt;P&gt;Hi @risingflight143,&lt;BR /&gt;
I think that you're already ingesting WinEventLog:Security logs.&lt;/P&gt;

&lt;P&gt;First question is easy:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=wineventlog EventCode=4740
| dedup Account_name
| sort Account_name
| table Account_name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;(please check if the user field name is Account_name in your servers.&lt;/P&gt;

&lt;P&gt;The second one is more complex because, you have to enable your Domain Controller to log these events (by default they aren't) and then run a search as above using &lt;CODE&gt;EventCode=4729 OR EventCode=4757 OR EventCode=4733&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 16:43:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491165#M15342</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-01-24T16:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491166#M15343</link>
      <description>&lt;P&gt;will the below syntax work for all users whose accounts were locked out in last 1 hour.&lt;BR /&gt;
is host=* does it search for all domain controllers.&lt;/P&gt;

&lt;P&gt;for all users&lt;BR /&gt;
index=wineventlog Account_Name= EventCode=4740 earliest=&amp;lt;-1h&amp;gt; host=* | table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name&lt;/P&gt;

&lt;P&gt;for single user&lt;BR /&gt;
index=wineventlog Account_Name=user1 EventCode=4740 earliest=&amp;lt;-1h&amp;gt; host=* | table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name&lt;/P&gt;

&lt;P&gt;Logging is enabled on all my domain controllers, i have security group by name group1 and how i use these event ids to see who has removed or added users from this group&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:55:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491166#M15343</guid>
      <dc:creator>risingflight143</dc:creator>
      <dc:date>2020-09-30T03:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491167#M15344</link>
      <description>&lt;P&gt;will the below syntax work for all users whose accounts were locked out in last 1 hour.&lt;BR /&gt;
is host=* does it search for all domain controllers.&lt;/P&gt;

&lt;P&gt;for all users&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=wineventlog:security EventCode=4740 earliest=&amp;lt;-1h&amp;gt; (host="dc01*" OR host="dc02*") | table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;for single user&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=wineventlog:security Account_Name=user1 EventCode=4740 earliest=&amp;lt;-1h&amp;gt; (host="dc01*" OR host="dc02*") | table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Logging is enabled on all my domain controllers, i have security group by name group1 and how i use these event ids to see who has removed or added users from this group&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2020 13:05:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491167#M15344</guid>
      <dc:creator>risingflight143</dc:creator>
      <dc:date>2020-01-26T13:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491168#M15345</link>
      <description>&lt;P&gt;Hi @risingflight143,&lt;BR /&gt;
the condition host=* isn't important because by default host=*, it could ve useful the condition host= if you want to limit the search only to Domain Controllers.&lt;/P&gt;

&lt;P&gt;About the time limits, you can insert in the search using earliest or managing them in the time picker and the alert scheduling.&lt;/P&gt;

&lt;P&gt;About the second question, if logging is enabled, the above EventCodes identify the events you want.&lt;/P&gt;

&lt;P&gt;If my answer solves your question, please accept and/or upvote it (for the use of other people), otherwise, how can I help you?&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2020 16:21:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491168#M15345</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-01-26T16:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491169#M15346</link>
      <description>&lt;P&gt;Will the below syntax work for all usres&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=wineventlog:security EventCode=4740 earliest=&amp;lt;-1h&amp;gt;  (host="dc01*" OR host="dc02*") | table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Will the below syntax work for single user&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=wineventlog:security Account_Name=user1 EventCode=4740 earliest=&amp;lt;-1h&amp;gt; (host="dc01*" OR host="dc02*") | table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 26 Jan 2020 17:16:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491169#M15346</guid>
      <dc:creator>risingflight143</dc:creator>
      <dc:date>2020-01-26T17:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/491170#M15347</link>
      <description>&lt;P&gt;Hi @risingflight143,&lt;BR /&gt;
probably it's a problem of visualization, but earliest is a little different:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=winevenlog sourcetype=wineventlog:security EventCode=4740 earliest=-h  (host="dc01*" OR host="dc02*") 
| table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;P.S.: use always index as search parameter, you'll have faster searches.&lt;/P&gt;

&lt;P&gt;I didn't understand if this search works for you or not.&lt;BR /&gt;
If not, what's the message or the wrong result?&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 07:57:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/491170#M15347</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-01-27T07:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Account lockout</title>
      <link>https://community.splunk.com/t5/Security/Account-lockout/m-p/689181#M17911</link>
      <description>&lt;P&gt;You can use below splunk to check locked out accounts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;sourcetype="wineventlog" EventCode=4740 OR EventCode=644 
|eval src_nt_host=if(isnull(src_nt_host),host,src_nt_host) 
|stats latest(_time) AS time latest(src_nt_host) AS host BY dest_nt_domain user 
|eval ltime=strftime(time,"%c") 
|table ltime,dest_nt_domain user host 
|rename ltime AS "Lockout Time",dest_nt_domain AS Domain,user AS "Account Locked Out", host AS "Workstation"&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 09:36:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Account-lockout/m-p/689181#M17911</guid>
      <dc:creator>RaviNandasana0</dc:creator>
      <dc:date>2024-05-31T09:36:22Z</dc:date>
    </item>
  </channel>
</rss>

