<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can you help me create a dashboard based on a number of Windows events? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452796#M78439</link>
    <description>&lt;P&gt;Hi @gopenshaw,&lt;/P&gt;

&lt;P&gt;It looks like this user mdelwaide provided the answer you were looking for. I converted their comment to an answer so that you could approve it.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Fri, 02 Nov 2018 16:24:46 GMT</pubDate>
    <dc:creator>mstjohn_splunk</dc:creator>
    <dc:date>2018-11-02T16:24:46Z</dc:date>
    <item>
      <title>Can you help me create a dashboard based on a number of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452792#M78435</link>
      <description>&lt;P&gt;I'm trying to create a dashboard based on a number of Windows events and I have been banging my head up against this one all day.&lt;BR /&gt;
The event structure is always similar to:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4624
EventType=0
Type=Information
ComputerName=$computername
TaskCategory=Logon
OpCode=Info
RecordNumber=299255
Keywords=Audit Success
Message=An account was successfully logged on.

Subject:
    Security ID:        NULL SID
    Account Name:       -
    Account Domain:     -
    Logon ID:       0x0

Logon Information:
    Logon Type:     3
    Restricted Admin Mode:  -
    Virtual Account:        No
    Elevated Token:     No

Impersonation Level:        Impersonation

New Logon:
    Security ID:        $DOMAIN\$username
    Account Name:       $username
    Account Domain:     $FQDN
    Logon ID:       $LOGON_ID
    Linked Logon ID:        0x0
    Network Account Name:   -
    Network Account Domain: -
    Logon GUID:     $LOGON_GUID
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've been trying to extract the Security IDs as two separate fields and so far, in this particular context, I have failed. I've tried a number of things. The closest i've gotten is using a field transformation to combine the two and then splitting. However, the split is not always on the same delimiter, e.g. some Security IDs have a space between, so I can't split on that.&lt;/P&gt;

&lt;P&gt;I actually have this working for a different check using the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=wineventlog EventCode=4740 | eval temp=split(member_id,"$DOMAIN\\") | eval "Locked Account"=mvindex(temp,1) | rename Caller_Computer_Name as "Lockout Source",_time as "Lockout Event Time" | convert ctime("Lockout Event Time") | table "Lockout Event Time", "Locked Account", "Lockout Source"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;(member_id is a concatenation of both Security_IDs)&lt;BR /&gt;
However, this doesn't work for the above example because the 2nd Security ID is not always $DOMAIN\$username. &lt;/P&gt;

&lt;P&gt;Hope this makes sense!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:48:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452792#M78435</guid>
      <dc:creator>gopenshaw</dc:creator>
      <dc:date>2020-09-29T21:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me create a dashboard based on a number of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452793#M78436</link>
      <description>&lt;P&gt;Have you tried extracting the Security IDs by creating a new field representing the parent? We had the same problem, users wanted to have a distinct field for each Security IDs and we used an extract in Props.conf to do it&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog:Security]
EXTRACT-SUBJECT_SUB_Extract = Subject\s?:\s+Security ID:\s*(?P&amp;lt;Subject_Security_ID&amp;gt;(.*?))\s*Account Name:\s*(?P&amp;lt;Subject_Account_Name&amp;gt;(.*?))\s*Account Domain:\s*(?P&amp;lt;Subject_Account_Domain&amp;gt;.*?)\s*Logon ID:\s*(?P&amp;lt;Subject_Logon_ID&amp;gt;\S*?)
EXTRACT-GROUP_SUB_Extract = Group\s?:\s+Security ID:\s*(?P&amp;lt;Group_Security_ID&amp;gt;(.*?))\s*Group Name:\s*(?P&amp;lt;Group_Group_Name&amp;gt;(.*?))\s*Group Domain:\s*(?P&amp;lt;Group_Group_Domain&amp;gt;(\S*?))\s
EXTRACT-NEWLOGON_SUB_Extract = New Logon:\s+Security ID:\s*(?P&amp;lt;NLogon_Security_ID&amp;gt;(.*?))\s*Account Name:\s*(?P&amp;lt;NLogon_Account_Name&amp;gt;(.*?))\s*Account Domain:\s*(?P&amp;lt;NLogon_Account_Domain&amp;gt;(\S*?))\s+Logon ID:\s*(?P&amp;lt;NLogon_Logon_ID&amp;gt;\S*?)\s
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;M.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 20:24:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452793#M78436</guid>
      <dc:creator>mdelwaide</dc:creator>
      <dc:date>2018-10-25T20:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me create a dashboard based on a number of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452794#M78437</link>
      <description>&lt;P&gt;Thanks mdelwaide, this is exactly what I was looking for. I have applied this to our props.conf however the results from a sourcetype="WinEventLog:Security" don't bring up these additional fields.&lt;/P&gt;

&lt;P&gt;I have added this to /opt/splunk/etc/apps/Splunk_TA_windows/local/props.conf, and I can see using btool that it has been loaded:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;[splunk@ Splunk_TA_windows]$ /opt/splunk/bin/splunk cmd btool props list WinEventLog:Security | grep -i extract&lt;BR /&gt;
EXTRACT-ACCLOCKOUT_SUB_Extract = Account That Was Locked Out:\s+Security ID:\s*(?P(.&lt;EM&gt;?))\s*Account Name:\s&lt;/EM&gt;(?P(.&lt;EM&gt;))&lt;BR /&gt;
EXTRACT-Account_Creator,Account_Created = (?m)(?s)Account\sName+?:\s+(?[a-zA-Z0-9-_]+).*Account\sName:\s+(?[a-zA-Z0-9-_]+)&lt;BR /&gt;
EXTRACT-GROUP_SUB_Extract = Group\s?:\s+Security ID:\s&lt;/EM&gt;(?P(.&lt;EM&gt;?))\s*Group Name:\s&lt;/EM&gt;(?P(.&lt;EM&gt;?))\s*Group Domain:\s&lt;/EM&gt;(?P(\S*?))\s&lt;BR /&gt;
EXTRACT-NEWACCOUNT_SUB_Extract = New Account:\s+Security ID:\s*(?P(.&lt;EM&gt;?))\s*Account Name:\s&lt;/EM&gt;(?P(.&lt;EM&gt;?))\s*Account Domain:\s&lt;/EM&gt;(?P(\S*))&lt;BR /&gt;
EXTRACT-NEWLOGON_SUB_Extract = New Logon:\s+Security ID:\s*(?P(.&lt;EM&gt;?))\s*Account Name:\s&lt;/EM&gt;(?P(.&lt;EM&gt;?))\s*Account Domain:\s&lt;/EM&gt;(?P(\S*?))\s+Logon ID:\s*(?P\S*?)\s&lt;BR /&gt;
EXTRACT-SUBJECT_SUB_Extract = Subject\s?:\s+Security ID:\s*(?P(.&lt;EM&gt;?))\s*Account Name:\s&lt;/EM&gt;(?P(.&lt;EM&gt;?))\s*Account Domain:\s&lt;/EM&gt;(?P.&lt;EM&gt;?)\s*Logon ID:\s&lt;/EM&gt;(?P\S*?)&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:48:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452794#M78437</guid>
      <dc:creator>gopenshaw</dc:creator>
      <dc:date>2020-09-29T21:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me create a dashboard based on a number of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452795#M78438</link>
      <description>&lt;P&gt;Oddly if I create these from the WebUI the exact same config in put into props.conf but it seems to be working fine. Thanks for your help&lt;/P&gt;</description>
      <pubDate>Fri, 26 Oct 2018 09:50:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452795#M78438</guid>
      <dc:creator>gopenshaw</dc:creator>
      <dc:date>2018-10-26T09:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me create a dashboard based on a number of Windows events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452796#M78439</link>
      <description>&lt;P&gt;Hi @gopenshaw,&lt;/P&gt;

&lt;P&gt;It looks like this user mdelwaide provided the answer you were looking for. I converted their comment to an answer so that you could approve it.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 16:24:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Can-you-help-me-create-a-dashboard-based-on-a-number-of-Windows/m-p/452796#M78439</guid>
      <dc:creator>mstjohn_splunk</dc:creator>
      <dc:date>2018-11-02T16:24:46Z</dc:date>
    </item>
  </channel>
</rss>

