<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Expired account activity in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234555#M1540</link>
    <description>&lt;P&gt;I had a similar issue where accounts set to "never" expire generated an expired account activity alert because as illustrated by jstoner above, the Expired Identities object matches all values.&lt;/P&gt;

&lt;P&gt;Instead of changing the data model I set endDate to a null value where accountExpires=(never)&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| eval endDate=if(accountExpires="(never)","",accountExpires)&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;rich7177 has a good example of an &lt;A href="https://answers.splunk.com/answers/400373/how-to-speed-up-ldap-active-directory-searches-spe.html"&gt;ldap search that exports nicely to ES here&lt;/A&gt;.&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/400373/how-to-speed-up-ldap-active-directory-searches-spe.html"&gt;https://answers.splunk.com/answers/400373/how-to-speed-up-ldap-active-directory-searches-spe.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Sep 2016 02:01:58 GMT</pubDate>
    <dc:creator>simon_lavigne</dc:creator>
    <dc:date>2016-09-19T02:01:58Z</dc:date>
    <item>
      <title>Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234547#M1532</link>
      <description>&lt;P&gt;Hi &lt;/P&gt;

&lt;P&gt;What should be defined in Assets &amp;amp; identities data model for the expired accounts, right now in the data model its is defined as endDate=*, its considering all as expired accounts.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2016 17:00:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234547#M1532</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-08-22T17:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234548#M1533</link>
      <description>&lt;P&gt;The way the Expired Identities object works in the Asset &amp;amp; Identities data model really looks like this:&lt;/P&gt;

&lt;P&gt;|&lt;CODE&gt;identities&lt;/CODE&gt; |search endDate=*&lt;/P&gt;

&lt;P&gt;The identity returns a list of identities, but the endDate=* will just return individuals who have a value in the end date.  The expected value for end date is a time and would generally be a time that has already passed.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 15:51:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234548#M1533</guid>
      <dc:creator>jstoner_splunk</dc:creator>
      <dc:date>2016-08-25T15:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234549#M1534</link>
      <description>&lt;P&gt;What should be changed to make this work as expected? so the Correlation search "Account activity for expired accounts" will work.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 20:19:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234549#M1534</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-08-29T20:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234550#M1535</link>
      <description>&lt;P&gt;Do all of your identities of end dates in them?  If an identity endDate value is null, these identities don't get returned in the above search.  &lt;/P&gt;

&lt;P&gt;The way I would interpret the search is that the only people who should have end dates would be people who have left the organization and I put the end date in at their termination/departure.  At that point, I can then search for folks who have an end date and this would allow me to trigger on expired accounts in that manner.&lt;/P&gt;

&lt;P&gt;If all your identities have end dates, some in the past, some in the future, we might have to look at changing things a bit to accommodate the data already populated.  You could make that change at the data model level and say something like |&lt;CODE&gt;identities&lt;/CODE&gt; |search endDate&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2016 00:45:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234550#M1535</guid>
      <dc:creator>jstoner_splunk</dc:creator>
      <dc:date>2016-08-30T00:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234551#M1536</link>
      <description>&lt;P&gt;Not all Identities has End dates.But we do have some identities having end dates(past&amp;amp;future). Right now it is considering all as expired accounts event the end date is in future.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 15:28:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234551#M1536</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-08-31T15:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234552#M1537</link>
      <description>&lt;P&gt;Right, I suspected that based on your comments.  Based on that, you may want to look at modifying the data model that treats expired identities as endDate=* and instead change this to be endDate&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 15:31:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234552#M1537</guid>
      <dc:creator>jstoner_splunk</dc:creator>
      <dc:date>2016-08-31T15:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234553#M1538</link>
      <description>&lt;P&gt;Yes, I have to change the Data model. What should Place in there instead of endDate=*&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 15:49:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234553#M1538</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-08-31T15:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234554#M1539</link>
      <description>&lt;P&gt;sorry it cut it off in my response.  Can you try endDate 'less than sign' time&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 15:51:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234554#M1539</guid>
      <dc:creator>jstoner_splunk</dc:creator>
      <dc:date>2016-08-31T15:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Expired account activity</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234555#M1540</link>
      <description>&lt;P&gt;I had a similar issue where accounts set to "never" expire generated an expired account activity alert because as illustrated by jstoner above, the Expired Identities object matches all values.&lt;/P&gt;

&lt;P&gt;Instead of changing the data model I set endDate to a null value where accountExpires=(never)&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| eval endDate=if(accountExpires="(never)","",accountExpires)&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;rich7177 has a good example of an &lt;A href="https://answers.splunk.com/answers/400373/how-to-speed-up-ldap-active-directory-searches-spe.html"&gt;ldap search that exports nicely to ES here&lt;/A&gt;.&lt;BR /&gt;
&lt;A href="https://answers.splunk.com/answers/400373/how-to-speed-up-ldap-active-directory-searches-spe.html"&gt;https://answers.splunk.com/answers/400373/how-to-speed-up-ldap-active-directory-searches-spe.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 02:01:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Splunk-Expired-account-activity/m-p/234555#M1540</guid>
      <dc:creator>simon_lavigne</dc:creator>
      <dc:date>2016-09-19T02:01:58Z</dc:date>
    </item>
  </channel>
</rss>

