<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Several user logon event for same host in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559403#M158933</link>
    <description>&lt;LI-CODE lang="markup"&gt;| dedup host,Signed_Account,EventCode,_time&lt;/LI-CODE&gt;</description>
    <pubDate>Wed, 14 Jul 2021 12:07:10 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2021-07-14T12:07:10Z</dc:date>
    <item>
      <title>Several user logon event for same host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559360#M158921</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have Splunk on Windows network, and using UF for windows events.&lt;/P&gt;&lt;P&gt;I am searching to detect users logon during specific hours:&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;index=main source="WinEventLog:Security"EventCode=528 OR EventCode=540 OR EventCode=4624&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;|where Logon_Type!=3 OR (Logon_Type=3 AND NOT LIKE(host,"DC%"))&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| eval Signed_Account=mvindex (Account_Name,1)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;|eval hour=strftime(_time,"%H")&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| eval ShowTime=strftime(_time,"%D %H:%M")&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| search Signed_Account=TThemistokleous (hour&amp;gt;23 OR hour&amp;lt;6)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| table host ShowTime Logon_Type&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Issue is, in result, I have for Same HOST, on Same TIME, 2 users signed on. AND Each signed on 4 times!&lt;BR /&gt;&lt;BR /&gt;Can someone please advise, what can be the issue?&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 07:00:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559360#M158921</guid>
      <dc:creator>a_n</dc:creator>
      <dc:date>2021-07-14T07:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Several user logon event for same host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559374#M158925</link>
      <description>&lt;P&gt;Since the alternative to Logon_type!=3 is Logon_type=3, this part is redundant in the where clause i.e.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|where Logon_Type!=3 OR NOT LIKE(host,"DC%")&lt;/LI-CODE&gt;&lt;P&gt;You may find date_hour already holds the hour so you might be able to use that rather than creating another field with the same information in.&lt;/P&gt;&lt;P&gt;When is hour ever going to be greater than 23? The hours are 0 - 23 inclusive.&lt;/P&gt;&lt;P&gt;Your table command does not include the EventCode, and your times are at the minute scale - is it possible that the "extra" events are for different EventCodes within the same minute?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 09:03:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559374#M158925</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-07-14T09:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: Several user logon event for same host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559375#M158926</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;Thank you for your response.&lt;BR /&gt;As for the where clause, I agree.&lt;BR /&gt;date_hour does not hold the data, hour field is ok.&lt;BR /&gt;we need to now about working in forbidden hours, which is after 11 PM until 6 AM.&lt;BR /&gt;&lt;BR /&gt;The result I have has same hostname, same event code 4624.&lt;BR /&gt;This is main search I have with results attached:&lt;BR /&gt;&lt;STRONG&gt;index=main source="WinEventLog:Security" EventCode="4624" OR EventCode="539" OR (EventCode="529" AND EventCode="537") OR (EventCode="547" AND EventCode="549") &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;|where (Logon_Type!=3 OR ( NOT LIKE(host,"DC%"))) AND Logon_Type!=9&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| eval Signed_Account=mvindex (Account_Name,1)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;|eval hour=strftime(_time,"%H")&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;|regex Signed_Account!="\$"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| search Signed_Account=* Signed_Account!="SYSTEM" Signed_Account!="ANONYMOUS LOGON" Signed_Account!="Administrator" (hour&amp;gt;23 OR hour&amp;lt;6)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| table host,Signed_Account,EventCode,_time&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 09:16:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559375#M158926</guid>
      <dc:creator>a_n</dc:creator>
      <dc:date>2021-07-14T09:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Several user logon event for same host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559376#M158927</link>
      <description>&lt;P&gt;How does date_hour not hold the information, it is derived from _time automatically, is it not?&lt;/P&gt;&lt;P&gt;Can you give me an example of a time that is after 11pm where the hour is &lt;STRONG&gt;&lt;U&gt;greater&lt;/U&gt;&lt;/STRONG&gt; than 23?&lt;/P&gt;&lt;P&gt;You should examine the "duplicate" events to see is they really are duplicates e.g. the _raw is identical, which might point to a problem with the ingesting of the events. Do the duplicates come from different indexers (assuming you have them)?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 09:27:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559376#M158927</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-07-14T09:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: Several user logon event for same host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559383#M158929</link>
      <description>&lt;P&gt;Ah, yes. Now I got your point regarding the time.&lt;BR /&gt;I will handle it, thank you.&lt;BR /&gt;&lt;BR /&gt;Back to main issue:&lt;BR /&gt;- I have one indexer only.&lt;BR /&gt;- I compared 2 problematic events. the only differences are:&lt;BR /&gt;Logon ID:&amp;nbsp; (0x32E964BA ,&amp;nbsp;0x32E964D4)&lt;BR /&gt;Source Port: (54833,54835)&lt;BR /&gt;&lt;BR /&gt;What is the solution? How to ignore these?&lt;BR /&gt;&lt;BR /&gt;Thank you again&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 09:40:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559383#M158929</guid>
      <dc:creator>a_n</dc:creator>
      <dc:date>2021-07-14T09:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Several user logon event for same host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559403#M158933</link>
      <description>&lt;LI-CODE lang="markup"&gt;| dedup host,Signed_Account,EventCode,_time&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 14 Jul 2021 12:07:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559403#M158933</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-07-14T12:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Several user logon event for same host</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559532#M158956</link>
      <description>&lt;P&gt;Thank you,&lt;BR /&gt;It works, however I am still worried that I may lose some events.&lt;/P&gt;&lt;P&gt;Thank you very much for your help.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 07:02:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Several-user-logon-event-for-same-host/m-p/559532#M158956</guid>
      <dc:creator>a_n</dc:creator>
      <dc:date>2021-07-15T07:02:37Z</dc:date>
    </item>
  </channel>
</rss>

