<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active Directory activity carried out in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600684#M11469</link>
    <description>&lt;P&gt;Sorry, never used it before... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; will know from now on.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jun 2022 12:17:17 GMT</pubDate>
    <dc:creator>DanAlexander</dc:creator>
    <dc:date>2022-06-06T12:17:17Z</dc:date>
    <item>
      <title>How to create a report that shows Active Directory activity carried out?</title>
      <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600664#M11463</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I need some assistance please,&lt;/P&gt;
&lt;P&gt;I am trying to create a report which shows all Active Directory activities carried out. Should contain columns as follows: Login, Account, Domain, Group, iHost and Date. The Group column shows the name of the Add group which has been added or removed and the Host is the Domain Controler. The Account column is the asset number of the machine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 20:51:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600664#M11463</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2022-06-06T20:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory activity carried out</title>
      <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600665#M11464</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;some little question to better understand your needs?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;did you already ingested logs from your Domain Controllers?&lt;/LI&gt;&lt;LI&gt;do you know that in Windows each login activity generates more than 10 login events?&lt;/LI&gt;&lt;LI&gt;you want to register each login event log or only the real accesses?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;the first question is the most important, if you didn't&amp;nbsp; do it, see at:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.6/Data/HowtogetWindowsdataintoSplunk" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.6/Data/HowtogetWindowsdataintoSplunk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.splunk.com/en_us/resources/videos/getting-data-in-to-splunk-enterprise-windows.html" target="_blank"&gt;https://www.splunk.com/en_us/resources/videos/getting-data-in-to-splunk-enterprise-windows.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If you already have them in you Splunk pass to the other question.&lt;/P&gt;&lt;P&gt;The second question is related to the target of your question: do need to gegister each login event for compliance scopes or you want the real accesses to you systems?&lt;/P&gt;&lt;P&gt;If you need to register all events, it's easy, you have to run a simple search like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog EventCode=4624
| table _time Account_name Domain_name Computername&lt;/LI-CODE&gt;&lt;P&gt;check if the field names are correct on your windows.&lt;/P&gt;&lt;P&gt;If instead you want the real accesses to your systems, you have to filter your results excluding many events:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Account_name="*$"&lt;/LI&gt;&lt;LI&gt;Account_name="SYSTEM"&lt;/LI&gt;&lt;LI&gt;Account_name="-"&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;than you have top dedup your events using something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog EventCode=4624 (Logon_Type=2 OR Logon_Type=10) NOT Account_name IN ("*$","SYSTEM","-")
| dedup _time host NOMEUTENTE
| table _time Account_name Domain_name Computername &lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 10:44:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600665#M11464</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-06-06T10:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory activity carried out</title>
      <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600669#M11465</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have index=windows_server sourcetype=XmlWinEventLog&lt;/P&gt;&lt;P&gt;I need the output for the following:&lt;/P&gt;&lt;P&gt;1. Account Granted (Account Added to Group)&lt;/P&gt;&lt;P&gt;2. Account Revoked (Account Removed from Group)&lt;/P&gt;&lt;P&gt;1. Account Deleted (Group Deleted)&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 11:14:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600669#M11465</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2022-06-06T11:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory activity carried out</title>
      <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600678#M11466</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;this is a different question and not related to Splunk because you need to know which are the EventCodes related to the events you want to monitor.&lt;/P&gt;&lt;P&gt;Anyway, here you can find all the Windows EventCodes:&amp;nbsp;&lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/" target="_blank"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/&lt;/A&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;1. Account Granted (Account Added to Group):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;4732&lt;/LI&gt;&lt;LI&gt;4746&lt;/LI&gt;&lt;LI&gt;4751&lt;/LI&gt;&lt;LI&gt;4756&lt;/LI&gt;&lt;LI&gt;4761&lt;/LI&gt;&lt;LI&gt;4785&lt;/LI&gt;&lt;LI&gt;4787&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Account Revoked (Account Removed from Group)&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;4733&lt;/LI&gt;&lt;LI&gt;4747&lt;/LI&gt;&lt;LI&gt;4752&lt;/LI&gt;&lt;LI&gt;4757&lt;/LI&gt;&lt;LI&gt;4762&lt;/LI&gt;&lt;LI&gt;4786&lt;/LI&gt;&lt;LI&gt;4788&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Account Deleted (Group Deleted)&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;do you mean account Deleted by a Group or Group deletion?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Anyway in the above url you can find all the needed EventCodes.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 12:01:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600678#M11466</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-06-06T12:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory activity carried out</title>
      <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600682#M11467</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240690"&gt;@DanAlexander&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 12:16:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600682#M11467</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-06-06T12:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory activity carried out</title>
      <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600683#M11468</link>
      <description>&lt;P&gt;Thanks for the guidance,&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 12:16:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600683#M11468</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2022-06-06T12:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory activity carried out</title>
      <link>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600684#M11469</link>
      <description>&lt;P&gt;Sorry, never used it before... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; will know from now on.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 12:17:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/How-to-create-a-report-that-shows-Active-Directory-activity/m-p/600684#M11469</guid>
      <dc:creator>DanAlexander</dc:creator>
      <dc:date>2022-06-06T12:17:17Z</dc:date>
    </item>
  </channel>
</rss>

