<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Query in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437248#M53777</link>
    <description>&lt;P&gt;windows server ? Linux Server ? Splunk Server ? Could you please give some details ? &lt;/P&gt;</description>
    <pubDate>Thu, 02 May 2019 13:01:55 GMT</pubDate>
    <dc:creator>DavidHourani</dc:creator>
    <dc:date>2019-05-02T13:01:55Z</dc:date>
    <item>
      <title>Splunk Query</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437247#M53776</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;

&lt;P&gt;In one of my server the access has been given to Adam, Brian and Charlie on the host "xyxxac.bus.com".&lt;/P&gt;

&lt;P&gt;I need to know who have added these members into that server, Please let me know the exact Splunk query.&lt;/P&gt;

&lt;P&gt;Also i have installed Splunk UF software on this server last week only, is it possible to pull the logs from this server for last month ??&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Ramu.R&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 12:58:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437247#M53776</guid>
      <dc:creator>mailmetoramu</dc:creator>
      <dc:date>2019-05-02T12:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Query</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437248#M53777</link>
      <description>&lt;P&gt;windows server ? Linux Server ? Splunk Server ? Could you please give some details ? &lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 13:01:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437248#M53777</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-05-02T13:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Query</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437249#M53778</link>
      <description>&lt;P&gt;Windows Server actually ..!!&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 14:55:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437249#M53778</guid>
      <dc:creator>mailmetoramu</dc:creator>
      <dc:date>2019-05-02T14:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Query</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437250#M53779</link>
      <description>&lt;P&gt;Hey @mailmetoramu,&lt;/P&gt;

&lt;P&gt;You can check who added the users by collecting windows logs of the servers. If you have AD running then you'll have to collect logs from there to get that information.&lt;/P&gt;

&lt;P&gt;More info on collecting windows logs here :&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.6/Data/MonitorWindowseventlogdata"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.6/Data/MonitorWindowseventlogdata&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;More info on collecting AD logs here :&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.6/Data/MonitorActiveDirectory"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.6/Data/MonitorActiveDirectory&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 19:23:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Query/m-p/437250#M53779</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-05-02T19:23:07Z</dc:date>
    </item>
  </channel>
</rss>

