<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Security Log Formatting in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66201#M13300</link>
    <description>&lt;P&gt;Account Name is, but with this particular event there are multiples of that, the first one is the account name used to create the second account name &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; so, I would like pull in SAM Account Name, that doesn't appear to be a thing.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jul 2013 18:46:52 GMT</pubDate>
    <dc:creator>jspatton</dc:creator>
    <dc:date>2013-07-11T18:46:52Z</dc:date>
    <item>
      <title>Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66190#M13289</link>
      <description>&lt;P&gt;I'm looking to create a view of the number of user accounts that have been created in the domain in the past 24 hours. Here is my query, and my timeframe is last 24hrs.&lt;/P&gt;

&lt;P&gt;sourcetype="WinEventLog:Security" AND EventCode=4720&lt;/P&gt;

&lt;P&gt;The view that comes back is very abbreviated, I have to click show all 50 lines to get at the info I need. What I would like to see is the date, time, server, the user who created the account, and the created account name. This is trivial for me to do in powershell, but I'd like to have a nice dashboard that shows this for more users than just myself.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2013 19:58:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66190#M13289</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-06-17T19:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66191#M13290</link>
      <description>&lt;P&gt;you are aware of the &lt;CODE&gt;table&lt;/CODE&gt; search command?&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;sourcetype=WinEventLog:Security EventCode=4720 | table _time host field1 field2 field3&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;The AND is implicated, and not needed in the search.&lt;/P&gt;

&lt;P&gt;/K&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2013 20:27:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66191#M13290</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-17T20:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66192#M13291</link>
      <description>&lt;P&gt;I get that, but I think the disconnect is that field1-3 only appear to live in the _raw data of the event. If you open up an event in the eventviewer, this is the data contained in the window that describes the event, such as a new user was created...does that make sense?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2013 20:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66192#M13291</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-06-17T20:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66193#M13292</link>
      <description>&lt;P&gt;Sorry, I don't use eventviewer much. Do you mean that the information you want is not being extracted into fields?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2013 21:39:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66193#M13292</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-17T21:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66194#M13293</link>
      <description>&lt;P&gt;correct. its also not formatted terribly well either...sigh&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2013 21:42:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66194#M13293</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-06-17T21:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66195#M13294</link>
      <description>&lt;P&gt;That's weird. Normally Windows events are extracted nicely. Is it not extracted at all or is it a multivalued field (i.e. there are two fields in _raw that are called "Account Name" or something similar)?&lt;/P&gt;

&lt;P&gt;Please update your original question with a sample event. mask ip-addresses, hostnames etc as needed.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2013 21:48:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66195#M13294</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-17T21:48:44Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66196#M13295</link>
      <description>&lt;P&gt;Sorry it's been so long since I've gotten back to this, but here is an example of what this event looks like.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://social.technet.microsoft.com/wiki/contents/articles/17055.event-ids-when-a-new-user-account-is-created-on-active-directory.aspx"&gt;http://social.technet.microsoft.com/wiki/contents/articles/17055.event-ids-when-a-new-user-account-is-created-on-active-directory.aspx&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;4720 is the first example and you can see how it looks, when I click show the next 50 lines, basically that is what I see. I'm trying to extract just the pertinent information that I specified in the original post.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 17:59:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66196#M13295</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-07-11T17:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66197#M13296</link>
      <description>&lt;P&gt;You can grab whatever fields you want to see and create a table of that. Is that what you want?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:13:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66197#M13296</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-07-11T18:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66198#M13297</link>
      <description>&lt;P&gt;That sounds right, but when I try to do that, it doesn't work, or more likely I don't know what I'm doing wrong. How would I do that?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:19:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66198#M13297</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-07-11T18:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66199#M13298</link>
      <description>&lt;P&gt;I think what I want is to do field extraction, and ideally I would like to extract SAM Account Name, but when I do that in the field extraction page, it tells me that, "No regex could be learned. Try providing different examples or restriction"&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:36:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66199#M13298</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-07-11T18:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66200#M13299</link>
      <description>&lt;P&gt;Right. You might need to learn some regex-fu in order to be able to tell Splunk how to recognize your fields properly. For Windows event logs though, there's a bunch of extractions already in there that should be applied. Such as Account_Name for instance.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:45:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66200#M13299</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-07-11T18:45:03Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66201#M13300</link>
      <description>&lt;P&gt;Account Name is, but with this particular event there are multiples of that, the first one is the account name used to create the second account name &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; so, I would like pull in SAM Account Name, that doesn't appear to be a thing.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:46:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66201#M13300</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-07-11T18:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66202#M13301</link>
      <description>&lt;P&gt;So I went to an online regex checker, pasted in the contents of the event, and just typed in SAM Account Name: as the search, and that worked.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:50:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66202#M13301</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-07-11T18:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66203#M13302</link>
      <description>&lt;P&gt;Here is where I went.&lt;BR /&gt;
&lt;A href="http://regexhero.net/tester/"&gt;http://regexhero.net/tester/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:50:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66203#M13302</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-07-11T18:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66204#M13303</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;sourcetype="WinEventLog:Security" AND EventCode=4720 | eval AccountCreator=mvindex(Account_Name,0) | eval AccountCreated=mvindex(Account_Name,1)| table _time, host, AccountCreator, AccountCreated
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The mvindex command will pull the values out for you into a new field name you create.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 19:09:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66204#M13303</guid>
      <dc:creator>antlefebvre</dc:creator>
      <dc:date>2013-07-11T19:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66205#M13304</link>
      <description>&lt;P&gt;That is pretty awesome thanks! I also spoke with Darryl Burns from Splunk and his solution was to pipe the query through xmlkv, this maps out the underlying XML from Windows so Splunk can see those sub fields.&lt;/P&gt;

&lt;P&gt;sourcetype="WinEventLog:Security" AND EventCode=4720| xmlkv&lt;/P&gt;

&lt;P&gt;But I really like how you laid that out in table format!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 19:15:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66205#M13304</guid>
      <dc:creator>jspatton</dc:creator>
      <dc:date>2013-07-11T19:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66206#M13305</link>
      <description>&lt;P&gt;Your question gave me the excuse to actually reprogram one of my dashes to correctly view authentications on a windows NPS server.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 20:27:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66206#M13305</guid>
      <dc:creator>antlefebvre</dc:creator>
      <dc:date>2013-07-11T20:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Security Log Formatting</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66207#M13306</link>
      <description>&lt;P&gt;this was driving me crazy. thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2016 14:36:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Security-Log-Formatting/m-p/66207#M13306</guid>
      <dc:creator>mjkenney</dc:creator>
      <dc:date>2016-03-11T14:36:03Z</dc:date>
    </item>
  </channel>
</rss>

