<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to separate data from Security_ID field when capturing local accounts created/added to the local admin group? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519151#M146177</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am trying to test on a single host and this search may be completely wrong and would appreciate any assistance as I am just starting to use Splunk.&lt;/P&gt;
&lt;P&gt;I am trying to capture any local accounts created or added to the local Administrators group on one host.&lt;/P&gt;
&lt;P&gt;This gets me what I need, which is the Time(when), hostname ,who created but the Security_ID field is lumping all into one .. I need a column with just the Hostname\LocalAccountName or just LocalAccountName&lt;/P&gt;
&lt;P&gt;Security_ID is including the SAmAccountname that created the account, the local account name and&amp;nbsp;BUILTIN\Administrators all in one.&lt;/P&gt;
&lt;P&gt;This is what I am searching, any help will be appreciated.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;MyHostName EventCode=4732 OR EventCode=4720 | table _time, HostName, src_user, Security_ID, EventCode,&lt;/LI-CODE&gt;</description>
    <pubDate>Fri, 11 Sep 2020 20:56:32 GMT</pubDate>
    <dc:creator>papa</dc:creator>
    <dc:date>2020-09-11T20:56:32Z</dc:date>
    <item>
      <title>How to separate data from Security_ID field when capturing local accounts created/added to the local admin group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519151#M146177</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am trying to test on a single host and this search may be completely wrong and would appreciate any assistance as I am just starting to use Splunk.&lt;/P&gt;
&lt;P&gt;I am trying to capture any local accounts created or added to the local Administrators group on one host.&lt;/P&gt;
&lt;P&gt;This gets me what I need, which is the Time(when), hostname ,who created but the Security_ID field is lumping all into one .. I need a column with just the Hostname\LocalAccountName or just LocalAccountName&lt;/P&gt;
&lt;P&gt;Security_ID is including the SAmAccountname that created the account, the local account name and&amp;nbsp;BUILTIN\Administrators all in one.&lt;/P&gt;
&lt;P&gt;This is what I am searching, any help will be appreciated.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;MyHostName EventCode=4732 OR EventCode=4720 | table _time, HostName, src_user, Security_ID, EventCode,&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 11 Sep 2020 20:56:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519151#M146177</guid>
      <dc:creator>papa</dc:creator>
      <dc:date>2020-09-11T20:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate data from Security_ID field when capturing local accounts created/added to the local admin group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519182#M146193</link>
      <description>Can you post a screen cap or sample of your log event?</description>
      <pubDate>Sat, 12 Sep 2020 03:48:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519182#M146193</guid>
      <dc:creator>marycordova</dc:creator>
      <dc:date>2020-09-12T03:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate data from Security_ID field when capturing local accounts created/added to the local admin group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519184#M146194</link>
      <description>&lt;P&gt;Your problem I think, is that SecurityID is a multivalue field.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For reference:&amp;nbsp;&lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4732" target="_blank" rel="noopener"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4732&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="marycordova_1-1599883111253.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/10790iE2EF47B77C23BF68/image-size/medium?v=v2&amp;amp;px=400" role="button" title="marycordova_1-1599883111253.png" alt="marycordova_1-1599883111253.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;If you want to extract these into individual fields you would use "mvindex":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|eval subject_sid=mvindex('SecurityID',0)
|eval member_sid=mvindex('SecurityID',1)
|eval group_sid=mvindex('SecurityID',2)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.5/SearchReference/MultivalueEvalFunctions#mvindex.28MVFIELD.2CSTARTINDEX.2C_ENDINDEX.29" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.5/SearchReference/MultivalueEvalFunctions#mvindex.28MVFIELD.2CSTARTINDEX.2C_ENDINDEX.29&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Sep 2020 04:00:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519184#M146194</guid>
      <dc:creator>marycordova</dc:creator>
      <dc:date>2020-09-12T04:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate data from Security_ID field when capturing local accounts created/added to the local admin group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519511#M146335</link>
      <description>&lt;P&gt;Hi Marcy&lt;/P&gt;&lt;P&gt;The example log you posted is the exact that I see , I tested your example below but it made no difference .. is that how I would search ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;MyHostName EventCode=4732 OR EventCode=4720 | table _time, HostName, src_user, Security_ID, EventCode
|eval group_sid=mvindex('SecurityID',2)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2020 17:21:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519511#M146335</guid>
      <dc:creator>papa</dc:creator>
      <dc:date>2020-09-14T17:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate data from Security_ID field when capturing local accounts created/added to the local admin group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519524#M146337</link>
      <description>&lt;P&gt;MyHostName EventCode=4732 OR EventCode=4720&lt;BR /&gt;| eval group_sid=mvindex('SecurityID',2)&lt;BR /&gt;| table _time, HostName, src_user, &lt;STRONG&gt;group_sid&lt;/STRONG&gt;, EventCode&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2020 17:35:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519524#M146337</guid>
      <dc:creator>marycordova</dc:creator>
      <dc:date>2020-09-14T17:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate data from Security_ID field when capturing local accounts created/added to the local admin group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519526#M146338</link>
      <description>&lt;P&gt;that was it , I modified it a bit and got the&amp;nbsp;&lt;/P&gt;&lt;P&gt;I modified&amp;nbsp;&lt;SPAN&gt;('SecurityID',2) to&amp;nbsp;('Security_ID',1)&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;MyHostName EventCode=4732 OR EventCode=4720
| eval group_sid=mvindex('Security_ID',1)
| table _time, HostName, src_user,group_sid&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2020 17:47:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-data-from-Security-ID-field-when-capturing-local/m-p/519526#M146338</guid>
      <dc:creator>papa</dc:creator>
      <dc:date>2020-09-14T17:47:39Z</dc:date>
    </item>
  </channel>
</rss>

