<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query for Suspicious Logon Behavior in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468305#M145826</link>
    <description>&lt;P&gt;If the usernames are important, then add them in as key=value pairs before the first pipe, and then as a second by clause for the stats(dc). Something like this:&lt;/P&gt;

&lt;P&gt;index=windows-logs (EventCode=4624 OR EventCode=4625) Source_Network_Address=* NOT src="10.1.2.23" (user=Administrator OR user=root)&lt;BR /&gt;
| stats dc(dest) AS dest by Source_Network_Address user&lt;BR /&gt;
| where dest &amp;gt; 20&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 03:28:23 GMT</pubDate>
    <dc:creator>martynoconnor</dc:creator>
    <dc:date>2020-09-30T03:28:23Z</dc:date>
    <item>
      <title>Search for Suspicious Logon Behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468300#M145821</link>
      <description>&lt;P&gt;Hello there. I want to build a query that alerts off when a single source IP or source computer is attempting to logon to multiple computers (Event Code's 4624 and 4625). How can I go about this? &lt;/P&gt;

&lt;P&gt;I tried with the query below but its not differentiating single to many logon attempts, it is returning also single to single attempts which is not what I want. &lt;/P&gt;

&lt;P&gt;index=windows-logs  (EventCode=4624 OR EventCode=4625) src_ip=* src!=10.1.2.23 | top Account_Name, src_ip limit=0 countfield="Total" showperc=f | where  Total &amp;gt; 20 | rename  src_ip AS "Source IP Performing Remote Login Attempts"&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:25:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468300#M145821</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2020-09-30T03:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Query for Suspicious Logon Behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468301#M145822</link>
      <description>&lt;P&gt;Something like this?&lt;/P&gt;

&lt;P&gt;index=windows-logs (EventCode=4624 OR EventCode=4625) src_ip=* NOT src="10.1.2.23" &lt;BR /&gt;
| stats dc(host) AS hosts by Account_Name&lt;BR /&gt;
| where hosts &amp;gt; 20 &lt;BR /&gt;
| rename src_ip AS "Source IP Performing Remote Login Attempts"&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:27:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468301#M145822</guid>
      <dc:creator>martynoconnor</dc:creator>
      <dc:date>2020-09-30T03:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: Query for Suspicious Logon Behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468302#M145823</link>
      <description>&lt;P&gt;Hello Marty. A couple of things I found when doing a test vulnerability scan which would mimic the type of behavior I want to alert on (a single IP scanning multiple IPs). I found the the remote systems attempting to be accessed show up under the field name "dest" and that the source ip of the scanner attempting to connect is under the field name "Source_Network_Address". I modified your sytax below - does it look right because I am getting zero results?&lt;/P&gt;

&lt;P&gt;index=windows-logs (EventCode=4624 OR EventCode=4625) Source_Network_Address=* NOT src="10.1.2.23"&lt;BR /&gt;
| stats dc(dest) AS dest by Source_Network_Address&lt;BR /&gt;
| where dest &amp;gt; 20&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:25:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468302#M145823</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2020-09-30T03:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: Query for Suspicious Logon Behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468303#M145824</link>
      <description>&lt;P&gt;Actually I had a typo in my index. I think your recommendation will get me going in the right direction. I am going to keep testing with it though. Thanks!!&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 15:55:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468303#M145824</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2019-12-20T15:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: Query for Suspicious Logon Behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468304#M145825</link>
      <description>&lt;P&gt;@martynoconnor  If I wanted to build a similar search - except this time I want to alert off a certain username trying to log on to multiple computers how would I do that? Let's say the usernames I am interested in are Administrator and Root...&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 15:59:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468304#M145825</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2019-12-20T15:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: Query for Suspicious Logon Behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468305#M145826</link>
      <description>&lt;P&gt;If the usernames are important, then add them in as key=value pairs before the first pipe, and then as a second by clause for the stats(dc). Something like this:&lt;/P&gt;

&lt;P&gt;index=windows-logs (EventCode=4624 OR EventCode=4625) Source_Network_Address=* NOT src="10.1.2.23" (user=Administrator OR user=root)&lt;BR /&gt;
| stats dc(dest) AS dest by Source_Network_Address user&lt;BR /&gt;
| where dest &amp;gt; 20&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:28:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468305#M145826</guid>
      <dc:creator>martynoconnor</dc:creator>
      <dc:date>2020-09-30T03:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: Query for Suspicious Logon Behavior</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468306#M145827</link>
      <description>&lt;P&gt;You rock that worked too!&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2019 19:21:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Suspicious-Logon-Behavior/m-p/468306#M145827</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2019-12-20T19:21:13Z</dc:date>
    </item>
  </channel>
</rss>

