<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to monitor user activity (logon and logoff) in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473984#M81405</link>
    <description>&lt;P&gt;how about &lt;A href="https://splunkbase.splunk.com/app/3435/"&gt;security essentials&lt;/A&gt;?&lt;/P&gt;</description>
    <pubDate>Thu, 09 Apr 2020 08:23:32 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2020-04-09T08:23:32Z</dc:date>
    <item>
      <title>How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473979#M81400</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;Excuse my lack of expertise with Splunk. Could you please let me know how i can track when a specific user logon and logoff from the computer? I am using a universal forwarder to the dc only for the security logs. I can see that i have inside splunk server a lot of events. So it must be working. &lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:20:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473979#M81400</guid>
      <dc:creator>gntavelis</dc:creator>
      <dc:date>2020-04-08T17:20:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473980#M81401</link>
      <description>&lt;P&gt;Hi @gntavelis,&lt;BR /&gt;
if you have DC logs, surely you have the following EventCodes that are related to Login, Logout and LogFail:&lt;BR /&gt;
Login 4624, logFail 4625, LogOut 4634.&lt;BR /&gt;
So you can search something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=wineventlog (EventCode=4625 OR EventCode=4625 OR EventCode=4634
| table _time user EventCode EventCodeDescription
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:52:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473980#M81401</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-04-08T17:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473981#M81402</link>
      <description>&lt;P&gt;Giuseppe thank you very much for your reply.&lt;/P&gt;

&lt;P&gt;Where i must copy paste the SPL statement? On the search box? &lt;BR /&gt;
if yes i am getting the following errors:&lt;/P&gt;

&lt;P&gt;Error in 'search' command: Unable to parse the search: unbalanced parentheses.&lt;BR /&gt;
The search job has failed due to an error. You may be able view the job in the Job Inspector.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 19:18:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473981#M81402</guid>
      <dc:creator>gntavelis</dc:creator>
      <dc:date>2020-04-08T19:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473982#M81403</link>
      <description>&lt;P&gt;Hi gntavelis,&lt;/P&gt;

&lt;P&gt;try this on your search head:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=wineventlog (EventCode=4625 OR EventCode=4625 OR EventCode=4634)
 | table _time user EventCode EventCodeDescription
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;the original post was missing a &lt;CODE&gt;)&lt;/CODE&gt; in the SPL.&lt;/P&gt;

&lt;P&gt;cheers, MuS&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 20:42:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473982#M81403</guid>
      <dc:creator>MuS</dc:creator>
      <dc:date>2020-04-08T20:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473983#M81404</link>
      <description>&lt;P&gt;Hi @gntavelis,&lt;BR /&gt;
Sorry! I forgot the second parenthesis!&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=wineventlog (EventCode=4625 OR EventCode=4625 OR EventCode=4634)
| table _time user EventCode EventCodeDescription
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then you can save this search in a report or in a dashboard panel.&lt;/P&gt;

&lt;P&gt;Only one attention: in Windows an access to the system generates many login events, so this could seem that your user accessed the system many times more than the reality, you should filter events dedupping the events for _time user and host.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 06:49:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473983#M81404</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-04-09T06:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473984#M81405</link>
      <description>&lt;P&gt;how about &lt;A href="https://splunkbase.splunk.com/app/3435/"&gt;security essentials&lt;/A&gt;?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 08:23:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473984#M81405</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-04-09T08:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473985#M81406</link>
      <description>&lt;P&gt;Problems...&lt;/P&gt;

&lt;P&gt;I am using the trial (free) version of splunk and due to the number of events i think i violated the license.&lt;BR /&gt;
Is there a way to forward specific events from the domain controller to splunk? Maybe by using a subscription on the event viewer? Now  i am using splunk universal forwarder that is installed on the domain controller and i do have the option to select only the security logs but i dont have the option to select specific events....&lt;/P&gt;

&lt;P&gt;Please help&lt;BR /&gt;
Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2020 12:37:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473985#M81406</guid>
      <dc:creator>gntavelis</dc:creator>
      <dc:date>2020-04-14T12:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473986#M81407</link>
      <description>&lt;P&gt;Hi @gntavelis,&lt;BR /&gt;
you can filter events in the Universal Forwarder.&lt;BR /&gt;
In inputs.con on the Domain Controller:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[WinEventLog://Security]
disabled = 0
start_from = oldest
current_only = 0
evt_resolve_ad_obj = 1
checkpointInterval = 5
whitelist = EventCode\=4624|4634|4625
index = wineventlog
renderXml=false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2020 14:14:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473986#M81407</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-04-14T14:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473987#M81408</link>
      <description>&lt;P&gt;Hello Giuseppe! Thank you for your answer...&lt;/P&gt;

&lt;P&gt;I searched inside the splunk universal forwarder directory and there is a directory with name input and lets say 6 or 7 inputs.conf files. could you please tell me which conf file i have to edit?&lt;/P&gt;

&lt;P&gt;image: &lt;A href="https://imgur.com/XynPDRa"&gt;https://imgur.com/XynPDRa&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 13:44:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473987#M81408</guid>
      <dc:creator>gntavelis</dc:creator>
      <dc:date>2020-04-15T13:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to monitor user activity (logon and logoff)</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473988#M81409</link>
      <description>&lt;P&gt;Hi @gntavelis,&lt;BR /&gt;
inputs.conf usually is in &lt;CODE&gt;$SPLUNK_HOME/etc/apps/your_TA/local&lt;/CODE&gt;&lt;BR /&gt;
probably, the TA's name is &lt;CODE&gt;TA_Windows&lt;/CODE&gt;, so open your &lt;CODE&gt;$SPLUNK_HOME/etc/apps/TA_Windows/local/inputs.conf&lt;/CODE&gt;;&lt;BR /&gt;
you should find the stanza  &lt;CODE&gt;[WinEventLog://Security]&lt;/CODE&gt;;&lt;BR /&gt;
in this stanza add the &lt;CODE&gt;whitelist = EventCode\=4624|4634|4625&lt;/CODE&gt; row and restart Splunk.&lt;/P&gt;

&lt;P&gt;If you have many Universal Forwarder, probably you're managing them using a Deployment Server, in this case, you have to modify the TA_Windows on Deployment Server, not directly on Universal Forwarders.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 14:56:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-monitor-user-activity-logon-and-logoff/m-p/473988#M81409</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-04-15T14:56:45Z</dc:date>
    </item>
  </channel>
</rss>

