<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows security logs-user account for code 4740 in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182800#M72862</link>
    <description>&lt;P&gt;Splunk_TA_Windows should be on all the tiers of Splunk, and then also windows forwarders.,Splunk_TA_Windows on the Indexer and Search Head is fine as well as Windows Forwarders.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 17:44:55 GMT</pubDate>
    <dc:creator>mcronkrite</dc:creator>
    <dc:date>2020-09-28T17:44:55Z</dc:date>
    <item>
      <title>Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182791#M72853</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;I have a universal forwarder that is forwarding Windows security logs to my Splunk instance on a linux machine. The logs are being written to a folder on a Windows 2008R2 server that the universal forwarder is installed on.&lt;/P&gt;

&lt;P&gt;For Windows event code 4740 (user account locked out), I would like to get the user name for the account that was locked out. However, that information does not seem to be in the log.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Does anyone know how or where I could get the user name information?&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;This is the info I'm currently getting from a typical security log:&lt;/P&gt;

&lt;P&gt;03/11/2014 11:19:15 AM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4740&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=USWV-DC1.XXX-inc.local&lt;BR /&gt;
TaskCategory=User Account Management&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=608568744&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2014 22:14:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182791#M72853</guid>
      <dc:creator>Bill_B</dc:creator>
      <dc:date>2014-03-11T22:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182792#M72854</link>
      <description>&lt;P&gt;The information you seek is in the Message field.&lt;BR /&gt;
&lt;CODE&gt;EventCode=4740 |table Message&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2014 22:45:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182792#M72854</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2014-03-11T22:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182793#M72855</link>
      <description>&lt;P&gt;Thanks. That gave me a lot more info including the account names.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2014 23:21:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182793#M72855</guid>
      <dc:creator>Bill_B</dc:creator>
      <dc:date>2014-03-11T23:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182794#M72856</link>
      <description>&lt;P&gt;You want the second account_name.&lt;BR /&gt;
&lt;CODE&gt;EventCode=4740 | eval Account_Name2=mvindex(Account_Name,1) |table Account_Name2&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:05:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182794#M72856</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2020-09-28T16:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182795#M72857</link>
      <description>&lt;P&gt;Event 4740 is recorded by the [Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit account management] policy. Please enable it and audit Success. You can create a new GPO, enable this policy and link it to domain.&lt;/P&gt;

&lt;P&gt;After that, you will see this events in Splunk, attribute is Account_Name&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2014 11:49:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182795#M72857</guid>
      <dc:creator>afabijan</dc:creator>
      <dc:date>2014-09-22T11:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182796#M72858</link>
      <description>&lt;P&gt;Can you tell me why I am getting no information in the "Message" part of the event? The actual Windows log has message information including account name, but that info is not being displayed in the Splunk event.&lt;BR /&gt;
Example of my Splunk event:&lt;BR /&gt;
09/22/2014  03:31:01  PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4740&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName= XXX.xxxxx.XXX&lt;BR /&gt;
TaskCategory=User Account Management&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=346165397&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2014 23:25:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182796#M72858</guid>
      <dc:creator>Bill_B</dc:creator>
      <dc:date>2014-09-22T23:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182797#M72859</link>
      <description>&lt;P&gt;Do you have Splunk_TA_Windows installed on your Indexer, and Search Head?&lt;BR /&gt;
You need the search time extractions for the fields.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:43:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182797#M72859</guid>
      <dc:creator>mcronkrite</dc:creator>
      <dc:date>2020-09-28T17:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182798#M72860</link>
      <description>&lt;P&gt;If you are using the Splunk Windows Infrastructure App then you can run this search:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;search eventtype=msad-nt6-account-lockout OR eventtype=msad-nt5-account-lockout&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Sun, 28 Sep 2014 17:41:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182798#M72860</guid>
      <dc:creator>mcronkrite</dc:creator>
      <dc:date>2014-09-28T17:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182799#M72861</link>
      <description>&lt;P&gt;I have the Splunk App for Windows Infrastructure installed on the Indexer/Search Head and on the Heavy Forwarder. Do I also need Splunk Add-on for Microsoft Windows installed on the Indexer/Search Head?&lt;BR /&gt;
Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 17:34:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182799#M72861</guid>
      <dc:creator>Bill_B</dc:creator>
      <dc:date>2014-09-29T17:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182800#M72862</link>
      <description>&lt;P&gt;Splunk_TA_Windows should be on all the tiers of Splunk, and then also windows forwarders.,Splunk_TA_Windows on the Indexer and Search Head is fine as well as Windows Forwarders.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 17:44:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182800#M72862</guid>
      <dc:creator>mcronkrite</dc:creator>
      <dc:date>2020-09-28T17:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Windows security logs-user account for code 4740</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182801#M72863</link>
      <description>&lt;P&gt;Thanks mcronkrite. I'll install the TA_Windows and see if it makes a difference.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 16:49:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-security-logs-user-account-for-code-4740/m-p/182801#M72863</guid>
      <dc:creator>Bill_B</dc:creator>
      <dc:date>2014-09-30T16:49:10Z</dc:date>
    </item>
  </channel>
</rss>

