<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Match 2 Windows Events around the same time in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Match-2-Windows-Events-around-the-same-time/m-p/405227#M71950</link>
    <description>&lt;P&gt;I am trying to write a simple rule that correlates 2 events that would occur at the same time. For example an account that is disabled would have the following 2 events logged, 4625 and 4768. 4768 would have the type (i.e. transaction type 0x12) where 4625 woild have a failure also loogged saying "account is disabled"). I can find both of these as seperate events but how do I correlate them.&lt;/P&gt;

&lt;P&gt;For example if I did say &lt;CODE&gt;sourcetype="winseclogs" Eventcode=4768&lt;/CODE&gt; I would get the info for that search and that showed Account_Name=test _time=20190101 0600. If I then did say &lt;CODE&gt;sourcetype="winseclogs" Eventcode=4625&lt;/CODE&gt; I would get the info for that search and that showed Account_Name=test Failure Reason="Account is disabled" _time=20190101 0600 (or even to account for slightl drift). How would I correlate these into a single search? &lt;/P&gt;

&lt;P&gt;I tried this and it looks like it should work but not too sure &lt;CODE&gt;sourcetype=winseclogs Eventcode=4768 [search sourcetype=winseclogs Eventcode=4625 | fields Account_Name _time]&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 01:26:43 GMT</pubDate>
    <dc:creator>willadams</dc:creator>
    <dc:date>2020-09-30T01:26:43Z</dc:date>
    <item>
      <title>Match 2 Windows Events around the same time</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Match-2-Windows-Events-around-the-same-time/m-p/405227#M71950</link>
      <description>&lt;P&gt;I am trying to write a simple rule that correlates 2 events that would occur at the same time. For example an account that is disabled would have the following 2 events logged, 4625 and 4768. 4768 would have the type (i.e. transaction type 0x12) where 4625 woild have a failure also loogged saying "account is disabled"). I can find both of these as seperate events but how do I correlate them.&lt;/P&gt;

&lt;P&gt;For example if I did say &lt;CODE&gt;sourcetype="winseclogs" Eventcode=4768&lt;/CODE&gt; I would get the info for that search and that showed Account_Name=test _time=20190101 0600. If I then did say &lt;CODE&gt;sourcetype="winseclogs" Eventcode=4625&lt;/CODE&gt; I would get the info for that search and that showed Account_Name=test Failure Reason="Account is disabled" _time=20190101 0600 (or even to account for slightl drift). How would I correlate these into a single search? &lt;/P&gt;

&lt;P&gt;I tried this and it looks like it should work but not too sure &lt;CODE&gt;sourcetype=winseclogs Eventcode=4768 [search sourcetype=winseclogs Eventcode=4625 | fields Account_Name _time]&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:26:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Match-2-Windows-Events-around-the-same-time/m-p/405227#M71950</guid>
      <dc:creator>willadams</dc:creator>
      <dc:date>2020-09-30T01:26:43Z</dc:date>
    </item>
    <item>
      <title>Re: Match 2 Windows Events around the same time</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Match-2-Windows-Events-around-the-same-time/m-p/405228#M71951</link>
      <description>&lt;P&gt;You can create a transaction that will accomplish this with the Account_Name as your field you join on:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="winseclogs" (Eventcode=4625 OR Eventcode=4768)
| transaction Account_Name maxspan=5s
| search Eventcode=4625 Eventcode=4768
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That will join the events together if they happen within 5 seconds of each other.  If they truly always occur at the same exact time then you can drop that down to 1s.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 14:48:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Match-2-Windows-Events-around-the-same-time/m-p/405228#M71951</guid>
      <dc:creator>dmarling</dc:creator>
      <dc:date>2019-07-24T14:48:58Z</dc:date>
    </item>
  </channel>
</rss>

