<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search for user additions to Active Directory privileged groups in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-for-user-additions-to-Active-Directory-privileged-groups/m-p/548319#M155529</link>
    <description>&lt;P&gt;Nothing stands out as wrong with that search.&amp;nbsp; I'd suggest reviewing the job inspector, maybe the keywords or remotesearch fields (Job -&amp;gt; Inspect Job, expand search properties) - that should give you an idea if the subsearch is working as you expect.&lt;/P&gt;&lt;P&gt;I think a lookup is fine approach.&amp;nbsp; If you have the ability, you could install the Lookup Editor app, which provides an excel-like experience for modifying lookups.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or you could use the outputlookup command overwrite the lookup.&amp;nbsp; Typically that would involve using inputlookup to get the events, using where/append/etc to modify the results, then using outputlookup to write it back.&lt;/P&gt;</description>
    <pubDate>Sat, 17 Apr 2021 13:26:39 GMT</pubDate>
    <dc:creator>maciep</dc:creator>
    <dc:date>2021-04-17T13:26:39Z</dc:date>
    <item>
      <title>Search for user additions to Active Directory privileged groups</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-user-additions-to-Active-Directory-privileged-groups/m-p/547108#M155105</link>
      <description>&lt;P class="lia-align-left"&gt;I would like to run a query for any user additions to privileged Active Directory groups. I am storing the AD groups of interest in Lookup file titled&amp;nbsp;&lt;EM&gt;DomainPrivilegedGroups.csv&lt;/EM&gt;. The definition has also been defined with the same name of&amp;nbsp;&lt;EM&gt;DomainPrivilegedGroups.csv.&amp;nbsp;&lt;/EM&gt;At this time, the Lookup file contains 16 rows and this is likely to grow in the future. The Lookup file contains one column titled&amp;nbsp;&lt;EM&gt;GroupName&lt;/EM&gt;.&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-left"&gt;My eventual search will look for any events where &lt;EM&gt;EventID=4728 OR EventID=4732 OR EventID=4756&lt;/EM&gt;. For now, I'm just trying to get the basic search working and therefore I am running the below:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;sourcetype="XmlWinEventLog"      [ |  inputlookup DomainPrivilegedGroups.csv      |  rename GroupName as Group_Name ]&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm performing the rename action because I know that the events store the group name in an attribute titled&amp;nbsp;&lt;EM&gt;Group_Name&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;I know that there are events containing one of the group names so I am expecting results to return.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anything glaringly obvious I'm doing wrong here?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another consideration is whether or not a Lookup file is the best option. From what I can see, there is no way to update a Lookup file and instead, when wanting to make any additions I would need to delete and re-create the Lookup file &amp;amp; definition. Is this correct?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Apr 2021 21:11:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-user-additions-to-Active-Directory-privileged-groups/m-p/547108#M155105</guid>
      <dc:creator>jlph</dc:creator>
      <dc:date>2021-04-07T21:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Search for user additions to Active Directory privileged groups</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-user-additions-to-Active-Directory-privileged-groups/m-p/548319#M155529</link>
      <description>&lt;P&gt;Nothing stands out as wrong with that search.&amp;nbsp; I'd suggest reviewing the job inspector, maybe the keywords or remotesearch fields (Job -&amp;gt; Inspect Job, expand search properties) - that should give you an idea if the subsearch is working as you expect.&lt;/P&gt;&lt;P&gt;I think a lookup is fine approach.&amp;nbsp; If you have the ability, you could install the Lookup Editor app, which provides an excel-like experience for modifying lookups.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or you could use the outputlookup command overwrite the lookup.&amp;nbsp; Typically that would involve using inputlookup to get the events, using where/append/etc to modify the results, then using outputlookup to write it back.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Apr 2021 13:26:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-user-additions-to-Active-Directory-privileged-groups/m-p/548319#M155529</guid>
      <dc:creator>maciep</dc:creator>
      <dc:date>2021-04-17T13:26:39Z</dc:date>
    </item>
  </channel>
</rss>

