<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Last Logon in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198545#M39351</link>
    <description>&lt;P&gt;Maybe you should take a look on this:&lt;BR /&gt;
&lt;A href="https://apps.splunk.com/app/1448/"&gt;https://apps.splunk.com/app/1448/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I think this App fits for you.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Jun 2014 09:39:39 GMT</pubDate>
    <dc:creator>PPape</dc:creator>
    <dc:date>2014-06-16T09:39:39Z</dc:date>
    <item>
      <title>Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198544#M39350</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;

&lt;P&gt;i'm trying to make a request to get the last logon for each users in my windows infrastructure; &lt;/P&gt;

&lt;P&gt;i have a simple request for now : &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;host=* EventCode=4624&lt;/CODE&gt; &lt;/P&gt;

&lt;P&gt;i can't find a time stamp for events, how do i get event time  ?&lt;/P&gt;

&lt;P&gt;a second need would be to only keep in report the last "time" &lt;/P&gt;

&lt;P&gt;Thanks for comunity advises &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2014 08:41:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198544#M39350</guid>
      <dc:creator>Ed_Alias</dc:creator>
      <dc:date>2014-06-16T08:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198545#M39351</link>
      <description>&lt;P&gt;Maybe you should take a look on this:&lt;BR /&gt;
&lt;A href="https://apps.splunk.com/app/1448/"&gt;https://apps.splunk.com/app/1448/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I think this App fits for you.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2014 09:39:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198545#M39351</guid>
      <dc:creator>PPape</dc:creator>
      <dc:date>2014-06-16T09:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198546#M39352</link>
      <description>&lt;P&gt;thanks i'll check that app &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt; &lt;/P&gt;

&lt;P&gt;but i still would like to have a request to do that&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2014 11:36:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198546#M39352</guid>
      <dc:creator>Ed_Alias</dc:creator>
      <dc:date>2014-06-16T11:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198547#M39353</link>
      <description>&lt;P&gt;This should give you something more along the lines of what you were looking for:&lt;BR /&gt;
EventCode=4624  | dedup ComputerName | table ComputerName _time&lt;/P&gt;

&lt;P&gt;Not exactly what you asked for but to get more useful results you might want to also examine the Account_Name, Security_ID  and Logon_Type fields.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:51:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198547#M39353</guid>
      <dc:creator>alterdego</dc:creator>
      <dc:date>2020-09-28T16:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198548#M39354</link>
      <description>&lt;P&gt;That seems to be what i'm looking for : ) &lt;/P&gt;

&lt;P&gt;what does the "_time" stands for ? it takes a timestamp of field ?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2014 11:58:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198548#M39354</guid>
      <dc:creator>Ed_Alias</dc:creator>
      <dc:date>2014-06-16T11:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198549#M39355</link>
      <description>&lt;P&gt;The _time field is the internal time stamp that Splunk assigns to an event.&lt;BR /&gt;
This should provide more insight: &lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Usedefaultfields"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Usedefaultfields&lt;/A&gt;&lt;BR /&gt;
Good Luck!&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2014 12:03:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198549#M39355</guid>
      <dc:creator>alterdego</dc:creator>
      <dc:date>2014-06-16T12:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198550#M39356</link>
      <description>&lt;P&gt;hey, i'm almost getting the report as i want : ) &lt;/P&gt;

&lt;P&gt;when i extract as a CSV i only get _time field, here is my request : &lt;/P&gt;

&lt;P&gt;EventCode=4624 sourcetype="WinEventLog:Security" NOT "Nom du compte&amp;nbsp;"="*$"   | dedup "Nom du compte&amp;nbsp;" | table "Nom du compte&amp;nbsp;" _time&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2014 08:17:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198550#M39356</guid>
      <dc:creator>Ed_Alias</dc:creator>
      <dc:date>2014-06-18T08:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198551#M39357</link>
      <description>&lt;P&gt;As I read it "Nom du compte " is being passed to the table command as a string and not a field.&lt;/P&gt;

&lt;P&gt;If I wasn't getting the fields in the table I wanted I would try something like: &lt;BR /&gt;
EventCode=4624 sourcetype="WinEventLog:Security" ComputerName!="*$"   | dedup ComputerName | table *&lt;BR /&gt;
which should create a table with all the fields. From that I would identify the columns I wanted to keep and use the filed values after the table command to create the final version.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2014 12:00:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198551#M39357</guid>
      <dc:creator>alterdego</dc:creator>
      <dc:date>2014-06-18T12:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Last Logon</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198552#M39358</link>
      <description>&lt;P&gt;i guess you are right i already red that splunk is not very friendly to non english logs ... i 'll try your workaround&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2014 13:50:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198552#M39358</guid>
      <dc:creator>Ed_Alias</dc:creator>
      <dc:date>2014-06-18T13:50:20Z</dc:date>
    </item>
  </channel>
</rss>

