<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Clarification on eventtypes when using the Splunk App for Windows Infrastructure in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Clarification-on-eventtypes-when-using-the-Splunk-App-for/m-p/351073#M42396</link>
    <description>&lt;P&gt;The eventtype here is not the field EventType in your data but Splunk's eventtype which in simple word is an alias to a base search or search term. Often for ease of reading and maintenance, we save commonly used search terms as eventtype instead of full search terms. ( see more about eventtype &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.1/Knowledge/Abouteventtypes"&gt;here&lt;/A&gt;). &lt;/P&gt;

&lt;P&gt;To see what's the actual search being run when you run &lt;CODE&gt;eventtype=msad-failed-user-logons&lt;/CODE&gt;, you can&lt;BR /&gt;
1. In the Job dropdown below the search bar, click on Inspect job. On that Job inspector page, look for value in attribute "normalizedSearch". That would give you expanded eventtype.&lt;BR /&gt;
2. Go to Settings-&amp;gt;Event types and look for msad-failed-user-logons. You may have to change the app context or select All apps. The search string column will give you the underline search.&lt;/P&gt;</description>
    <pubDate>Wed, 20 Sep 2017 02:46:56 GMT</pubDate>
    <dc:creator>somesoni2</dc:creator>
    <dc:date>2017-09-20T02:46:56Z</dc:date>
    <item>
      <title>Clarification on eventtypes when using the Splunk App for Windows Infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Clarification-on-eventtypes-when-using-the-Splunk-App-for/m-p/351072#M42395</link>
      <description>&lt;P&gt;I have the Splunk Windows Infrastructure app installed and when I run this search below:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;eventtype=msad-failed-user-logons host="*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I get this returned below, but I'm not understanding how the search result is associated to eventtype=msad-failed-user-logons.  The below shows EventType=0.  What does msad-failed-user-logons mean and how come it doesn't show that in the search result?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;09/19/2017 03:42:13 PM
LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4776
EventType=0
Type=Information
ComputerName=xxxxx.domain.local
TaskCategory=Credential Validation
OpCode=Info
RecordNumber=9555000
Keywords=Audit Failure
Message=The computer attempted to validate the credentials for an account.

Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account:  someuser1
Source Workstation: WORKSTATION
Error Code: 0xC0000071
Collapse
host=somehost   source=WinEventLog:Security    sourcetype=WinEventLog:Security
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 19 Sep 2017 22:56:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Clarification-on-eventtypes-when-using-the-Splunk-App-for/m-p/351072#M42395</guid>
      <dc:creator>bayman</dc:creator>
      <dc:date>2017-09-19T22:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on eventtypes when using the Splunk App for Windows Infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Clarification-on-eventtypes-when-using-the-Splunk-App-for/m-p/351073#M42396</link>
      <description>&lt;P&gt;The eventtype here is not the field EventType in your data but Splunk's eventtype which in simple word is an alias to a base search or search term. Often for ease of reading and maintenance, we save commonly used search terms as eventtype instead of full search terms. ( see more about eventtype &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.6.1/Knowledge/Abouteventtypes"&gt;here&lt;/A&gt;). &lt;/P&gt;

&lt;P&gt;To see what's the actual search being run when you run &lt;CODE&gt;eventtype=msad-failed-user-logons&lt;/CODE&gt;, you can&lt;BR /&gt;
1. In the Job dropdown below the search bar, click on Inspect job. On that Job inspector page, look for value in attribute "normalizedSearch". That would give you expanded eventtype.&lt;BR /&gt;
2. Go to Settings-&amp;gt;Event types and look for msad-failed-user-logons. You may have to change the app context or select All apps. The search string column will give you the underline search.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 02:46:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Clarification-on-eventtypes-when-using-the-Splunk-App-for/m-p/351073#M42396</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-09-20T02:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on eventtypes when using the Splunk App for Windows Infrastructure</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Clarification-on-eventtypes-when-using-the-Splunk-App-for/m-p/701268#M81144</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/15147"&gt;@somesoni2&lt;/a&gt;&amp;nbsp;what a great idea to name it same way and using upper/lower case to make them different between eventtype &amp;amp; EventType...&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_without_mouth:"&gt;😶&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2024 08:17:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Clarification-on-eventtypes-when-using-the-Splunk-App-for/m-p/701268#M81144</guid>
      <dc:creator>splunkreal</dc:creator>
      <dc:date>2024-10-08T08:17:21Z</dc:date>
    </item>
  </channel>
</rss>

