<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Account Activity_Add/Del/Modify in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380411#M11578</link>
    <description>&lt;P&gt;Thanks Koshyk for helping me. &lt;/P&gt;

&lt;P&gt;No Result yet found for below code, &lt;/P&gt;

&lt;P&gt;index=* sourcetype=WinEventLog:*&lt;BR /&gt;&lt;BR /&gt;
 | lookup winEventCodes_custom EventID OUTPUT EventIDDescription&lt;BR /&gt;
 | stats count by EventID,EventIDDescription&lt;/P&gt;

&lt;P&gt;But, i am able to see the failed logs, If i run below code. &lt;/P&gt;

&lt;P&gt;sourcetype=WinEventLog:Security EventCode=4625 &lt;BR /&gt;
| Stats count by Account_Name, EventCode, Workstation_Name &lt;BR /&gt;
| Sort - count &lt;/P&gt;

&lt;P&gt;Why i am not getting same entries for lookup code?&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 00:41:53 GMT</pubDate>
    <dc:creator>brpsingara</dc:creator>
    <dc:date>2020-09-30T00:41:53Z</dc:date>
    <item>
      <title>User Account Activity_Add/Del/Modify</title>
      <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380407#M11574</link>
      <description>&lt;P&gt;Is possible to single report for below ?  if possible, could you please help me.&lt;/P&gt;

&lt;P&gt;4625    An account failed to log on&lt;/P&gt;

&lt;P&gt;4720    A user account was created&lt;/P&gt;

&lt;P&gt;4722    A user account was enabled&lt;/P&gt;

&lt;P&gt;4723    An attempt was made to change an account's password&lt;/P&gt;

&lt;P&gt;4724    An attempt was made to reset an accounts password&lt;/P&gt;

&lt;P&gt;4725    A user account was disabled&lt;/P&gt;

&lt;P&gt;4726    A user account was deleted&lt;/P&gt;

&lt;P&gt;4738    A user account was changed&lt;/P&gt;

&lt;P&gt;4727    A security-enabled global group was created&lt;/P&gt;

&lt;P&gt;4731    A security-enabled local group was created&lt;/P&gt;

&lt;P&gt;thanks in advance. &lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 14:19:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380407#M11574</guid>
      <dc:creator>brpsingara</dc:creator>
      <dc:date>2019-05-21T14:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Activity_Add/Del/Modify</title>
      <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380408#M11575</link>
      <description>&lt;P&gt;The best way to handle this is to install Splunk_TA_windows addon on your Search Heads. this should already have quite lot of logic to extract fields and identify the user actions. I'm expecting the tags like "add", &lt;BR /&gt;
Please see the code sample from the TA&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;## EventCodes 4720, 4741, 624, 645
[windows_account_created]
search = sourcetype=*:Security (EventCode=4720 OR EventCode=4741 OR EventCode=624 OR EventCode=645)
#tags = add
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then you just need to query : &lt;CODE&gt;index=* tag=add&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;After you put the TA and still if you haven't extracted, you need to extract the fields/eventtypes yourself&lt;BR /&gt;
for instances, create an TA of your own and put line in eventtypes.conf and create all your eventcodes into single tag. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[windows_custom_my_eventcodes]
search = sourcetype=*:Security (EventCode=4720 OR xxxxx)
#tags = custom_tag_1
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and in tags.conf, just add the &lt;CODE&gt;custom_tag_1&lt;/CODE&gt;&lt;BR /&gt;
and in final report you just need to do  &lt;CODE&gt;index=* tag=custom_tag_1&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:37:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380408#M11575</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2020-09-30T00:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Activity_Add/Del/Modify</title>
      <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380409#M11576</link>
      <description>&lt;P&gt;This is looks like out of my knowledge in Splunk, could you please share any videos or demo for this.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 17:44:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380409#M11576</guid>
      <dc:creator>brpsingara</dc:creator>
      <dc:date>2019-05-21T17:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Activity_Add/Del/Modify</title>
      <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380410#M11577</link>
      <description>&lt;P&gt;A cheaper and easier solution (quick solution), would be&lt;/P&gt;

&lt;P&gt;Put the above list into a csv e.g. &lt;CODE&gt;winEventCodes_custom.csv&lt;/CODE&gt; with headers (EventID,EventIDDescription) .So it looks like&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventID,EventIDDescription
4625,"An account failed to log on"
4720,"A user account was created"
4722 ,"A user account was enabled"
...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Then do a lookup in your search something like (to get a count)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; index=* sourcetype=WinEventLog:*   
| lookup winEventCodes_custom.csv EventID OUTPUT EventIDDescription
| stats count by EventID,EventIDDescription
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You can do any type of analysis based on above query. (like get users, like SecurityID etc.)&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 19:29:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380410#M11577</guid>
      <dc:creator>koshyk</dc:creator>
      <dc:date>2019-05-21T19:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Activity_Add/Del/Modify</title>
      <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380411#M11578</link>
      <description>&lt;P&gt;Thanks Koshyk for helping me. &lt;/P&gt;

&lt;P&gt;No Result yet found for below code, &lt;/P&gt;

&lt;P&gt;index=* sourcetype=WinEventLog:*&lt;BR /&gt;&lt;BR /&gt;
 | lookup winEventCodes_custom EventID OUTPUT EventIDDescription&lt;BR /&gt;
 | stats count by EventID,EventIDDescription&lt;/P&gt;

&lt;P&gt;But, i am able to see the failed logs, If i run below code. &lt;/P&gt;

&lt;P&gt;sourcetype=WinEventLog:Security EventCode=4625 &lt;BR /&gt;
| Stats count by Account_Name, EventCode, Workstation_Name &lt;BR /&gt;
| Sort - count &lt;/P&gt;

&lt;P&gt;Why i am not getting same entries for lookup code?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:41:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380411#M11578</guid>
      <dc:creator>brpsingara</dc:creator>
      <dc:date>2020-09-30T00:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Activity_Add/Del/Modify</title>
      <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380412#M11579</link>
      <description>&lt;P&gt;Thanks, its working ..... &lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 15:23:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380412#M11579</guid>
      <dc:creator>brpsingara</dc:creator>
      <dc:date>2019-05-22T15:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Activity_Add/Del/Modify</title>
      <link>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380413#M11580</link>
      <description>&lt;P&gt;created csv file "winEventCodes_custom.csv"&lt;/P&gt;

&lt;P&gt;EventCode,EventCodeDescription&lt;BR /&gt;
 4625,"An account failed to log on"&lt;BR /&gt;
 4720,"A user account was created"&lt;/P&gt;

&lt;H2&gt; 4722 ,"A user account was enabled" &lt;/H2&gt;

&lt;P&gt;index=* sourcetype=WinEventLog:*&lt;BR /&gt;&lt;BR /&gt;
 | lookup winEventCodes_custom EventCode OUTPUT EventCodeDescription&lt;BR /&gt;
 | stats count by EventCode,EventCodeDescription&lt;/P&gt;

&lt;P&gt;--------  this is working for me. &lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 15:33:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/User-Account-Activity-Add-Del-Modify/m-p/380413#M11580</guid>
      <dc:creator>brpsingara</dc:creator>
      <dc:date>2019-05-22T15:33:09Z</dc:date>
    </item>
  </channel>
</rss>

