<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Failed Login to Locked out account in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319831#M140101</link>
    <description>&lt;P&gt;It will append the search result of one search with another.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jul 2017 15:48:18 GMT</pubDate>
    <dc:creator>abhijit_mhatre</dc:creator>
    <dc:date>2017-07-20T15:48:18Z</dc:date>
    <item>
      <title>Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319824#M140094</link>
      <description>&lt;P&gt;I am trying to identify an event that fires when a login has been attempted to a previously locked account. I am not looking for failed logins or lockout events. I just want the failed login attempt that occurred on an account that was already locked out. Any help figuring out how to design a query for this would be great.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2020 17:41:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319824#M140094</guid>
      <dc:creator>mihall</dc:creator>
      <dc:date>2020-06-08T17:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319825#M140095</link>
      <description>&lt;P&gt;Hi Mihall,&lt;/P&gt;

&lt;P&gt;If an account gets locked out, the next event coming would be either a failed logon(EventCode4625) or Kerberos pre-authentication failed(4771) event for that particular account. You can use the below query:&lt;/P&gt;

&lt;P&gt;index=winsec EventCode=4625 OR EventCode=4771 user=abc(locked out user) |  eval Time=strftime(_time,"%Y-%m-%d %H:%M:%S") | dedup user ComputerName | eval Error=coalesce(Failure_Reason, Failure_Code)| table Time user Error EventCodeDescription&lt;/P&gt;

&lt;P&gt;Let me know if this works.&lt;BR /&gt;
Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:57:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319825#M140095</guid>
      <dc:creator>abhijit_mhatre</dc:creator>
      <dc:date>2020-09-29T14:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319826#M140096</link>
      <description>&lt;P&gt;The results produced are showing all failed logins, including events that occurred due to a failed password attempt. Is there a way to narrow this down further so that it's only showing events that came after a lockout. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 17:45:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319826#M140096</guid>
      <dc:creator>mihall</dc:creator>
      <dc:date>2017-07-19T17:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319827#M140097</link>
      <description>&lt;P&gt;The event which will occur after an account gets locked out, would be a failed login event. So if user=abc gets locked out, the next event for user=abc would be failed logon. EventCode 4625 would show you failed logon events&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 10:03:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319827#M140097</guid>
      <dc:creator>abhijit_mhatre</dc:creator>
      <dc:date>2017-07-20T10:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319828#M140098</link>
      <description>&lt;P&gt;So would the following search and subsearch find the locked out accounts and look for failed logon attempts to them?&lt;/P&gt;

&lt;P&gt;EventCode=4625 [search EventCode=4740] | table user, _time&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 12:47:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319828#M140098</guid>
      <dc:creator>mihall</dc:creator>
      <dc:date>2017-07-20T12:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319829#M140099</link>
      <description>&lt;P&gt;&amp;#1;&amp;#1;Yes it would work, just modifying the query a little bit:&lt;/P&gt;

&lt;P&gt;index=winsec EventCode=4625 user=abc | append [search EventCode=4740 user=abc] | table user, _time&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 14:39:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319829#M140099</guid>
      <dc:creator>abhijit_mhatre</dc:creator>
      <dc:date>2017-07-20T14:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319830#M140100</link>
      <description>&lt;P&gt;what does append do here?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 15:34:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319830#M140100</guid>
      <dc:creator>mihall</dc:creator>
      <dc:date>2017-07-20T15:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319831#M140101</link>
      <description>&lt;P&gt;It will append the search result of one search with another.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 15:48:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319831#M140101</guid>
      <dc:creator>abhijit_mhatre</dc:creator>
      <dc:date>2017-07-20T15:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: Failed Login to Locked out account</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319832#M140102</link>
      <description>&lt;H1&gt;Locked out account searchform&lt;/H1&gt;

&lt;P&gt;Account Lockout Search&lt;/P&gt;

&lt;P&gt;eventtype="windows_events" sourcetype="WinEventLog:Security" EventCode=4740 OR EventCode=4723 OR EventCode=4724 OR EventCode=4625 OR EventCode=4769 OR EventCode=4767 OR EventCode=4776 user="$user$" | eval Workstation_Name=coalesce(Workstation_Name,Source_Workstation) | table _time, src_ip, user, action, Workstation_Name, src_nt_host, name, Failure_Reason | rename name AS Description | sort user&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;!-- the default is a text box, with no seed value; if user does not input
      a value, then the $from$ token in searchTemplate will be removed --&amp;gt;
&amp;lt;input type="text" token="user"&amp;gt;
  &amp;lt;default&amp;gt;*&amp;lt;/default&amp;gt;
&amp;lt;/input&amp;gt;
&amp;lt;input type="time"&amp;gt;
  &amp;lt;default&amp;gt;
    &amp;lt;earliestTime&amp;gt;-15m&amp;lt;/earliestTime&amp;gt;
    &amp;lt;latestTime&amp;gt;now&amp;lt;/latestTime&amp;gt;
  &amp;lt;/default&amp;gt;
&amp;lt;/input&amp;gt;


&amp;lt;panel&amp;gt;
  &amp;lt;table&amp;gt;
    &amp;lt;event&amp;gt;
      &amp;lt;title&amp;gt;Results&amp;lt;/title&amp;gt;
      &amp;lt;option name="count"&amp;gt;50&amp;lt;/option&amp;gt;
    &amp;lt;/event&amp;gt;
  &amp;lt;/table&amp;gt;
&amp;lt;/panel&amp;gt;


&amp;lt;panel&amp;gt;
  &amp;lt;chart&amp;gt;
    &amp;lt;title&amp;gt;Top Descriptions&amp;lt;/title&amp;gt;
    &amp;lt;searchPostProcess&amp;gt;| top limit=20 Description&amp;lt;/searchPostProcess&amp;gt;
    &amp;lt;option name="charting.chart"&amp;gt;bar&amp;lt;/option&amp;gt;
  &amp;lt;/chart&amp;gt;
&amp;lt;/panel&amp;gt;
&amp;lt;panel&amp;gt;
  &amp;lt;chart&amp;gt;
    &amp;lt;title&amp;gt;Top Source IP by Time&amp;lt;/title&amp;gt;
    &amp;lt;searchPostProcess&amp;gt;| timechart count by src_ip limit=10&amp;lt;/searchPostProcess&amp;gt;
    &amp;lt;option name="charting.chart"&amp;gt;bar&amp;lt;/option&amp;gt;
  &amp;lt;/chart&amp;gt;
&amp;lt;/panel&amp;gt;


&amp;lt;panel&amp;gt;
  &amp;lt;table&amp;gt;
    &amp;lt;title&amp;gt;Count over time&amp;lt;/title&amp;gt;
    &amp;lt;searchPostProcess&amp;gt;| chart sparkline count by user&amp;lt;/searchPostProcess&amp;gt;
    &amp;lt;format field="sparkline" type="sparkline"&amp;gt;&amp;lt;/format&amp;gt;
  &amp;lt;/table&amp;gt;
&amp;lt;/panel&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Sep 2020 05:36:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Failed-Login-to-Locked-out-account/m-p/319832#M140102</guid>
      <dc:creator>jchintha</dc:creator>
      <dc:date>2020-09-30T05:36:54Z</dc:date>
    </item>
  </channel>
</rss>

