<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tracking User Activity Across applications without matching sourcetypes or Fields in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356210#M105429</link>
    <description>&lt;P&gt;Samples events are below:&lt;/P&gt;

&lt;P&gt;VDI logon events:&lt;BR /&gt;
"An account was successfully logged on.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
Security ID: NULL SID&lt;BR /&gt;
Account Name: -&lt;BR /&gt;
Account Domain: -&lt;BR /&gt;
Logon ID: 0x0&lt;BR /&gt;
Logon Type: 3&lt;/P&gt;

&lt;P&gt;Impersonation Level: Impersonation&lt;/P&gt;

&lt;P&gt;New Logon:&lt;BR /&gt;
Security ID: LB\DEV1$&lt;BR /&gt;
Account Name: DEV1$&lt;BR /&gt;
Account Domain: LB&lt;BR /&gt;
Logon ID: 0x894B5E95&lt;BR /&gt;
Logon GUID: {f09e5f81-9f19-5f11-29b8-8750c7c02be3}&lt;/P&gt;

&lt;P&gt;Process Information:&lt;BR /&gt;
Process ID: 0x0&lt;BR /&gt;
Process Name: -"&lt;/P&gt;

&lt;P&gt;Application logon sample: (these differ per application) - Use of the root account in linux&lt;BR /&gt;
"su: pam_unix(su-l session): session opened for user root by (uid-=0)"&lt;/P&gt;</description>
    <pubDate>Tue, 20 Jun 2017 19:08:40 GMT</pubDate>
    <dc:creator>scc00</dc:creator>
    <dc:date>2017-06-20T19:08:40Z</dc:date>
    <item>
      <title>Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356206#M105425</link>
      <description>&lt;P&gt;I am attempting to track user activity from vdi login to the use of a shared account to log into an application. For example, &lt;CODE&gt;user&lt;/CODE&gt;=&lt;CODE&gt;Tim&lt;/CODE&gt; logs into his VDI session &lt;CODE&gt;VDI-XXXX&lt;/CODE&gt; at 9am, then opens up application, &lt;CODE&gt;sample_app&lt;/CODE&gt;, and logs in as &lt;CODE&gt;user&lt;/CODE&gt;=&lt;CODE&gt;admin&lt;/CODE&gt;. How do I bring the two events into one transaction? In this case, assume that we have the application account name only, &lt;CODE&gt;admin&lt;/CODE&gt; and that the vdi &lt;CODE&gt;user&lt;/CODE&gt; name can change.&lt;/P&gt;

&lt;P&gt;I can track general logons as follows as a catchall:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index="*" user="*"  "*logged*"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I've attempted to use a subsearch to narrow it down to just the application usage and hopefully the vdi session that led to the application logon but those searches come back blank.&lt;/P&gt;

&lt;P&gt;Sample searches tried:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=* user=* "*logged*" [search sourcetype=sample_app user=admin "*logged*" | fields + user, computer, event] | table _time, user, computer, event | sort _time
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 16 Jun 2017 14:24:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356206#M105425</guid>
      <dc:creator>scc00</dc:creator>
      <dc:date>2017-06-16T14:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356207#M105426</link>
      <description>&lt;P&gt;You are going to have to show some sample events.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 14:36:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356207#M105426</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-06-16T14:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356208#M105427</link>
      <description>&lt;P&gt;In addition to showing some sample events, it might also be useful to know which VDI system you are using in case there's some additional or different logs you can enable that will tell you this information directly.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jun 2017 17:04:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356208#M105427</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2017-06-18T17:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356209#M105428</link>
      <description>&lt;P&gt;Samples events are below: &lt;/P&gt;

&lt;P&gt;VDI logon events:&lt;BR /&gt;
    "An account was successfully logged on.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Subject:
  Security ID: NULL SID
  Account Name: -
  Account Domain: -
  Logon ID: 0x0
  Logon Type: 3

Impersonation Level: Impersonation

New Logon:
  Security ID: LB\DEV1$
  Account Name: DEV1$
  Account Domain: LB
  Logon ID: 0x894B5E95
  Logon GUID: {f09e5f81-9f19-5f11-29b8-8750c7c02be3}

Process Information:
  Process ID: 0x0
  Process Name: -"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Application logon sample: (these differ per application) - Use of the root account in linux&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"su: pam_unix(su-l session): session opened for user root by (uid-=0)"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;For VDI type: &lt;CODE&gt;VMWare&lt;/CODE&gt; (unsure which version though). &lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 12:36:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356209#M105428</guid>
      <dc:creator>scc00</dc:creator>
      <dc:date>2017-06-19T12:36:19Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356210#M105429</link>
      <description>&lt;P&gt;Samples events are below:&lt;/P&gt;

&lt;P&gt;VDI logon events:&lt;BR /&gt;
"An account was successfully logged on.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
Security ID: NULL SID&lt;BR /&gt;
Account Name: -&lt;BR /&gt;
Account Domain: -&lt;BR /&gt;
Logon ID: 0x0&lt;BR /&gt;
Logon Type: 3&lt;/P&gt;

&lt;P&gt;Impersonation Level: Impersonation&lt;/P&gt;

&lt;P&gt;New Logon:&lt;BR /&gt;
Security ID: LB\DEV1$&lt;BR /&gt;
Account Name: DEV1$&lt;BR /&gt;
Account Domain: LB&lt;BR /&gt;
Logon ID: 0x894B5E95&lt;BR /&gt;
Logon GUID: {f09e5f81-9f19-5f11-29b8-8750c7c02be3}&lt;/P&gt;

&lt;P&gt;Process Information:&lt;BR /&gt;
Process ID: 0x0&lt;BR /&gt;
Process Name: -"&lt;/P&gt;

&lt;P&gt;Application logon sample: (these differ per application) - Use of the root account in linux&lt;BR /&gt;
"su: pam_unix(su-l session): session opened for user root by (uid-=0)"&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 19:08:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356210#M105429</guid>
      <dc:creator>scc00</dc:creator>
      <dc:date>2017-06-20T19:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356211#M105430</link>
      <description>&lt;P&gt;Index=internal sourcetyp=* | stats count by clientip,user&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2017 17:52:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356211#M105430</guid>
      <dc:creator>puneethgowda</dc:creator>
      <dc:date>2017-07-02T17:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356212#M105431</link>
      <description>&lt;P&gt;Did I reformat your text correctly?   You have neglected to show &lt;CODE&gt;_time&lt;/CODE&gt; which is really the key here.  How close together are these events in time (or should I say "at worst, how far apart are the matching events from eachother in tme")?  And is it always 1-to-1 for pairing?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 14:33:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356212#M105431</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2017-07-03T14:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking User Activity Across applications without matching sourcetypes or Fields</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356213#M105432</link>
      <description>&lt;P&gt;So I found a better way to complete this query, using a multisearch. See updated query below. It searches for VDI session computer utilizing a inputlookup searching for expected users of the shared account. The second search is just checking for login activity for the shared account along for the application. &lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;|multisearch [search index=* *logged*  ComputerName=pci-vdi* [|inputlookup account_users |fields + user] |fields + user,name, ComputerName,Msg,app, EventCode,src_ip] [search sourcetype=application user="sharedaccount" *logged* action=success | fields + user,host, Msg, app]  | eval computer= coalesce(ComputerName, host), event=coalesce(name, Msg), Hour=strftime(_time, "%B %d %Y, %I:%M:%S %p"), user=upper(user) | dedup computer event |where computer!=" " | table Hour, user, computer, app,event | sort Hour user&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Now I need to figure out how to populate the searches only when search 2 finds a hit. Thoughts?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2017 19:20:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-User-Activity-Across-applications-without-matching/m-p/356213#M105432</guid>
      <dc:creator>scc00</dc:creator>
      <dc:date>2017-07-24T19:20:25Z</dc:date>
    </item>
  </channel>
</rss>

