<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need last logon for a user in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528337#M149177</link>
    <description>&lt;P&gt;Need to know what was the last time a domain AD account “username” was logged into and from what server/machine please?&lt;/P&gt;</description>
    <pubDate>Fri, 06 Nov 2020 14:47:57 GMT</pubDate>
    <dc:creator>chrodriguez</dc:creator>
    <dc:date>2020-11-06T14:47:57Z</dc:date>
    <item>
      <title>Need last logon for a user</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528337#M149177</link>
      <description>&lt;P&gt;Need to know what was the last time a domain AD account “username” was logged into and from what server/machine please?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 14:47:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528337#M149177</guid>
      <dc:creator>chrodriguez</dc:creator>
      <dc:date>2020-11-06T14:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Need last logon for a user</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528338#M149178</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228509"&gt;@chrodriguez&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;EventCode=4624 | dedup ComputerName | table ComputerName _time&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.splunk.com/t5/Getting-Data-In/Windows-Last-Logon/m-p/198547#M39353" target="_self"&gt;View solution in original post&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Let us know if this works for you&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;V/R,&lt;BR /&gt;nwuest&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 15:09:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528338#M149178</guid>
      <dc:creator>nwuest</dc:creator>
      <dc:date>2020-11-06T15:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Need last logon for a user</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528343#M149181</link>
      <description>&lt;P&gt;That doesn't return anything, I really need to focus on "A User" not just everything. I ran this, and it returned nothing for the account but then when I try against my user account it does return data. The account wmsadmin is indeed an actual user account that is disabled and the "lastLogonTimestamp" has a value or date of 9/20/2011.&lt;/P&gt;&lt;P&gt;index=wineventlog sourcetype=WinEventLog:Security (EventCode=4624 OR EventCode=4634 "wmsadmin")&lt;BR /&gt;| eval day=strftime(_time,"%d/%m/%Y")&lt;BR /&gt;| stats earliest(_time) AS earliest latest(_time) AS latest by user host day&lt;BR /&gt;| eval earliest=strftime(earliest,"%d/%m/%Y %H.%M.%S"), latest=strftime(latest,"%d/%m/%Y %H.%M.%S")&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 15:45:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528343#M149181</guid>
      <dc:creator>chrodriguez</dc:creator>
      <dc:date>2020-11-06T15:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: Need last logon for a user</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528353#M149183</link>
      <description>&lt;P&gt;That doesn't return anything, I really need to focus on "A User" not just everything. I ran this, and it returned nothing for the account but then when I try against my user account it does return data. The account wmsadmin is indeed an actual user account that is disabled and the "lastLogonTimestamp" has a value or date of 9/20/2011. index=wineventlog sourcetype=WinEventLog:Security (EventCode=4624 OR EventCode=4634 "wmsadmin") | eval day=strftime(_time,"%d/%m/%Y") | stats earliest(_time) AS earliest latest(_time) AS latest by user host day | eval earliest=strftime(earliest,"%d/%m/%Y %H.%M.%S"), latest=strftime(latest,"%d/%m/%Y %H.%M.%S")&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 16:52:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528353#M149183</guid>
      <dc:creator>chrodriguez</dc:creator>
      <dc:date>2020-11-06T16:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: Need last logon for a user</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528354#M149184</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228509"&gt;@chrodriguez&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;So you are specifically looking for the account "wmsadmin", which is &lt;U&gt;disabled&lt;/U&gt; to see the last time that it was used to log in?&lt;BR /&gt;&lt;BR /&gt;Have you been collecting logs in your environment with splunk forwarders since "9/20/2011" the date of the lastLogonTimestamp?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If you have had splunk forwarders collecting events for that long, what is your retention policy with frozen buckets?&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;If not&lt;/STRONG&gt;, you can try to kickoff an event with 'enabling that account, logging in-and-out with it then disabling the account'.&lt;BR /&gt;Then you should see some activity in your searchhead so that search will return some results.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Let us know what happens!&lt;/P&gt;&lt;P&gt;V/R,&lt;BR /&gt;nwuest&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 17:25:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528354#M149184</guid>
      <dc:creator>nwuest</dc:creator>
      <dc:date>2020-11-06T17:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Need last logon for a user</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528360#M149187</link>
      <description>&lt;P&gt;thanks for the insight, I completely forgot that we have only had splunk introduced since 2016. So thats why its not populating data from 2011.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 18:17:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-last-logon-for-a-user/m-p/528360#M149187</guid>
      <dc:creator>chrodriguez</dc:creator>
      <dc:date>2020-11-06T18:17:36Z</dc:date>
    </item>
  </channel>
</rss>

