<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Account Lockout in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Account-Lockout/m-p/672913#M18214</link>
    <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;One of my user lets say maxwell is getting locked frequently. i want to check logs for last 7 days. i am using the below query but i am not getting any output.&lt;BR /&gt;i have 4 domain controllers(dctr01,dctr02,dctr03,dctr04).&lt;/P&gt;&lt;P&gt;index=winevenlog sourcetype=wineventlog:security Account_Name=maxwell EventCode=4740 earliest=-h (host="dctr01*" OR host="dctr02*" OR host="dctr03*" OR host="dctr04*")&lt;BR /&gt;| table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name&lt;/P&gt;</description>
    <pubDate>Sun, 31 Dec 2023 12:21:25 GMT</pubDate>
    <dc:creator>maxwell2k19</dc:creator>
    <dc:date>2023-12-31T12:21:25Z</dc:date>
    <item>
      <title>Account Lockout</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Account-Lockout/m-p/672913#M18214</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;One of my user lets say maxwell is getting locked frequently. i want to check logs for last 7 days. i am using the below query but i am not getting any output.&lt;BR /&gt;i have 4 domain controllers(dctr01,dctr02,dctr03,dctr04).&lt;/P&gt;&lt;P&gt;index=winevenlog sourcetype=wineventlog:security Account_Name=maxwell EventCode=4740 earliest=-h (host="dctr01*" OR host="dctr02*" OR host="dctr03*" OR host="dctr04*")&lt;BR /&gt;| table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 12:21:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Account-Lockout/m-p/672913#M18214</guid>
      <dc:creator>maxwell2k19</dc:creator>
      <dc:date>2023-12-31T12:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Account Lockout</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Account-Lockout/m-p/672915#M18215</link>
      <description>&lt;P&gt;If we assume that the Windows Event logs including EventCode 4740 are indeed being indexed into index=winevenlog and sourcetype wineventlog:security (double-check those names!) and that maxwell was indeed locked out within the past 1 hour, then try doing a keyword search for maxwell to see if you can get the raw log:&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;index=wineventlog sourcetype=wineventlog:security maxwell 4740&lt;/P&gt;&lt;P&gt;(Hopefully the logs that match the literal words maxwell and 4740 will be the EventCode=4740 for Maxwell, or at least small enough to comb through)&lt;/P&gt;&lt;P&gt;After that, progressively re-add those search filters until one of them removes the entry for maxwell, then you can troubleshoot why that search filter is not working. (e.g. field extraction error?)&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 14:23:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Account-Lockout/m-p/672915#M18215</guid>
      <dc:creator>marnall</dc:creator>
      <dc:date>2023-12-31T14:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Account Lockout</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Account-Lockout/m-p/672930#M18218</link>
      <description>&lt;P&gt;I see in your original post that you mention searching over the last 7 days but your SPL has hardcoded "earliest=-1h" in it. This will override the timerange input into the time selector.&lt;BR /&gt;I also have some Windows event logs indexing in my local instance and by default, it looks like it is the source=WinEventLog:Security and sourcetype=WinEventLog&lt;BR /&gt;&lt;BR /&gt;So maybe try updating your search to something like this and see if you get expected results.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your_index&amp;gt; sourcetype=WinEventLog source="WinEventLog:Security" Account_Name=maxwell EventCode=4740 host IN ("dctr01*", "dctr02*", "dctr03*", "dctr04*") earliest=-7d@d latest=now
    | table _time Caller_Computer_Name Account_Name EventCode Source_Network_Address Workstation_Name&lt;/LI-CODE&gt;</description>
      <pubDate>Sun, 31 Dec 2023 20:00:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Account-Lockout/m-p/672930#M18218</guid>
      <dc:creator>dtburrows3</dc:creator>
      <dc:date>2023-12-31T20:00:46Z</dc:date>
    </item>
  </channel>
</rss>

