<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise Security: How to retrieve ldap assets information? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/567552#M10302</link>
    <description>&lt;P&gt;I used the below query but not searched the computer assets its through the below error message please advise ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"Error in 'rex' command: Encountered the following error while compiling the regex '(OU|CN)\=(?.+)': Regex: unrecognized character after (? or (?-.&amp;nbsp;"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;|ldapsearch domain=XXX search="(&amp;amp;(objectClass=computer))"
|eval city=""
|eval country=""
|eval priority="medium"
|eval category="normal"
|eval dns=dNSHostName
|eval owner=managedBy
|rex field=sAMAccountName mode=sed "s/\$//g"
|eval nt_host=sAMAccountName |search nt_host=segurinfo 
|makemv delim="," dn
|rex field=dn "(OU|CN)\=(?.+)"
|table Source_Address,mac,nt_host,dns,owner,priority,lat,long,city,country,bunit,category,pci_domain,is_expected,should_timesync,should_update,requires_av&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 19 Sep 2021 16:11:36 GMT</pubDate>
    <dc:creator>kagamalai</dc:creator>
    <dc:date>2021-09-19T16:11:36Z</dc:date>
    <item>
      <title>Splunk Enterprise Security: How to retrieve ldap assets information?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252564#M1827</link>
      <description>&lt;P&gt;I tried to retrieve assets information of ldap so I used the search (I know that I must not to use search nt_host...) &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"|ldapsearch domain=XXX search="(&amp;amp;(objectClass=computer))"
|eval city=""
|eval country=""
|eval priority="medium"
|eval category="normal"
|eval dns=dNSHostName
|eval owner=managedBy
|rex field=sAMAccountName mode=sed "s/\$//g"
|eval nt_host=sAMAccountName |search nt_host=segurinfo 
|makemv delim="," dn
|rex field=dn "(OU|CN)\=(?.+)"
|table Source_Address,mac,nt_host,dns,owner,priority,lat,long,city,country,bunit,category,pci_domain,is_expected,should_timesync,should_update,requires_av" 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and I have the table but I the IP is not because I do not use static IP so I think is possible to use the security logs that I have but I do not how can i correlate it.&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://community.splunk.com/storage/temp/178189-query.png" alt="alt text" /&gt;&lt;/P&gt;

&lt;P&gt;I used the next search for nt_host=segurinfo: &lt;CODE&gt;index="wineventlog" Workstation_Name=segurinfo&lt;/CODE&gt; and I see in the logs the information that I need.&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://community.splunk.com/storage/temp/178190-segur-infor.png" alt="alt text" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:32:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252564#M1827</guid>
      <dc:creator>paola92</dc:creator>
      <dc:date>2020-09-29T12:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to retrieve ldap assets information?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252565#M1828</link>
      <description>&lt;P&gt;You should output your ldap search to a csv lookup table then tell ES that is a new assets lookup table. It will then consume it on changes and keep the auto lookups that exist within ES populated and working. You can find the instructions on using asset tables and a macro to ensure they have gotten ingested at &lt;A href="http://docs.splunk.com/Documentation/ES/4.6.0/User/AssetandIdentityLookupReference"&gt;http://docs.splunk.com/Documentation/ES/4.6.0/User/AssetandIdentityLookupReference&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2017 14:49:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252565#M1828</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2017-02-08T14:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to retrieve ldap assets information?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252566#M1829</link>
      <description>&lt;P&gt;I just re-read your post. I am sorry I missed the DHCP reference. I would not write the table with IP if you use DHCP. I would write only with the computer names. Then additionally make an asset table with the DHCP ranges but without computer name information. Then at least if the data is IP you will get a category displayed like DHCP-Workstation or however you tag that ip range asset object. And if the match is by name you get the more precise asset information based on your ldap info.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Feb 2017 12:44:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252566#M1829</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2017-02-11T12:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to retrieve ldap assets information?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252567#M1830</link>
      <description>&lt;P&gt;@paola92 - Did the answer provided by starcher help provide a working solution to your question? If yes, please don't forget to resolve this post by clicking "Accept". If no, please leave a comment with more feedback. Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2017 18:12:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/252567#M1830</guid>
      <dc:creator>aaraneta_splunk</dc:creator>
      <dc:date>2017-03-11T18:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security: How to retrieve ldap assets information?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/567552#M10302</link>
      <description>&lt;P&gt;I used the below query but not searched the computer assets its through the below error message please advise ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"Error in 'rex' command: Encountered the following error while compiling the regex '(OU|CN)\=(?.+)': Regex: unrecognized character after (? or (?-.&amp;nbsp;"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;|ldapsearch domain=XXX search="(&amp;amp;(objectClass=computer))"
|eval city=""
|eval country=""
|eval priority="medium"
|eval category="normal"
|eval dns=dNSHostName
|eval owner=managedBy
|rex field=sAMAccountName mode=sed "s/\$//g"
|eval nt_host=sAMAccountName |search nt_host=segurinfo 
|makemv delim="," dn
|rex field=dn "(OU|CN)\=(?.+)"
|table Source_Address,mac,nt_host,dns,owner,priority,lat,long,city,country,bunit,category,pci_domain,is_expected,should_timesync,should_update,requires_av&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Sep 2021 16:11:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Enterprise-Security-How-to-retrieve-ldap-assets/m-p/567552#M10302</guid>
      <dc:creator>kagamalai</dc:creator>
      <dc:date>2021-09-19T16:11:36Z</dc:date>
    </item>
  </channel>
</rss>

