<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342373#M161309</link>
    <description>&lt;P&gt;I had not. &lt;BR /&gt;
Since I can see the returned data, I can see that for the "Account Name" name the value is always Administrator. &lt;BR /&gt;
Also have a feeling that the correct operator would be  "!=" and not the "NOT".&lt;BR /&gt;
There is no "Standard User" value in the data retrieved for the standard user created, therefore I can't filter for that. At least not for the value "Account_Name" but I went ahead and tried your code and it still returns the "Standard User" type account.&lt;BR /&gt;
So, that is not the solution.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Apr 2017 17:08:23 GMT</pubDate>
    <dc:creator>acabralg</dc:creator>
    <dc:date>2017-04-20T17:08:23Z</dc:date>
    <item>
      <title>How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342371#M161307</link>
      <description>&lt;P&gt;I thought the following query would return that but I can see accounts of type "Standard User".&lt;/P&gt;

&lt;P&gt;"search host=* AND sourcetype=WinEventLog:Security AND (EventCode=4720 OR EventCode=4722) AND Account_Name=Administrator"&lt;/P&gt;

&lt;P&gt;Is that possible? And if so, what am I missing?&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 16:51:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342371#M161307</guid>
      <dc:creator>acabralg</dc:creator>
      <dc:date>2017-04-20T16:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342372#M161308</link>
      <description>&lt;P&gt;Have you tried the obvious?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"search host=* AND sourcetype=WinEventLog:Security AND (EventCode=4720 OR EventCode=4722) AND Account_Name=Administrator" NOT "Standard User"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 20 Apr 2017 16:56:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342372#M161308</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2017-04-20T16:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342373#M161309</link>
      <description>&lt;P&gt;I had not. &lt;BR /&gt;
Since I can see the returned data, I can see that for the "Account Name" name the value is always Administrator. &lt;BR /&gt;
Also have a feeling that the correct operator would be  "!=" and not the "NOT".&lt;BR /&gt;
There is no "Standard User" value in the data retrieved for the standard user created, therefore I can't filter for that. At least not for the value "Account_Name" but I went ahead and tried your code and it still returns the "Standard User" type account.&lt;BR /&gt;
So, that is not the solution.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 17:08:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342373#M161309</guid>
      <dc:creator>acabralg</dc:creator>
      <dc:date>2017-04-20T17:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342374#M161310</link>
      <description>&lt;P&gt;I took your "Standard User" quote literally.&lt;BR /&gt;
Something in the event is telling you that this Administrator is not really an admin.  You need to teach Splunk how to spot that indicator.&lt;BR /&gt;
&lt;CODE&gt;NOT&lt;/CODE&gt; tells Splunk to ignore events that contain whatever follows.&lt;BR /&gt;
&lt;CODE&gt;!=&lt;/CODE&gt; looks for a specific field.  &lt;CODE&gt;foo!=bar&lt;/CODE&gt; will return events that have a field called 'foo' the value of which is not 'bar'.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 17:57:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342374#M161310</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2017-04-20T17:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342375#M161311</link>
      <description>&lt;P&gt;I have used a text comparison tool to compare the differences btw the data returned for an admin account created vs. a standard user account created but found nothing that identifies an account/user as admin or not. &lt;/P&gt;

&lt;P&gt;Have modified the query to check for eventcodes 624 and 626,&lt;BR /&gt;
host=* AND sourcetype=WinEventLog:Security AND (EventCode=4720 OR EventCode=4722 OR EventCode=624 OR EventCode=626) AND Account_Name=Administrator &lt;/P&gt;

&lt;P&gt;I am not sure on how to find this. Is there a way for me to add more data being displayed/returned?&lt;/P&gt;

&lt;P&gt;I am working on C# code to handle the result of the query...&lt;/P&gt;

&lt;P&gt;Thanks for the suggestion and help with the NOT/!=&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 19:57:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342375#M161311</guid>
      <dc:creator>acabralg</dc:creator>
      <dc:date>2017-04-20T19:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342376#M161312</link>
      <description>&lt;P&gt;Since I could not find a way to retrieve the account type, I am currently just retrieving new accounts created and also retrieving EventCode=636(Security Enabled Local Group Member Added) and EventCode=4732 (A member was added to a security-enabled local group). &lt;/P&gt;

&lt;P&gt;These events will tell me what groups the created users were added to. &lt;BR /&gt;
Since I am writing c# code I can retrieve only the users that were added to the Administrators group.&lt;/P&gt;

&lt;P&gt;Current search query,&lt;BR /&gt;
host=* AND sourcetype=WinEventLog:Security AND (EventCode=4720 OR EventCode=4732 OR EventCode=624 OR EventCode=636 ) AND Account_Name=Administrator&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 16:00:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342376#M161312</guid>
      <dc:creator>acabralg</dc:creator>
      <dc:date>2017-04-21T16:00:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342377#M161313</link>
      <description>&lt;P&gt;Hello acabralg,&lt;BR /&gt;
using the EventCode 4720 description here: &lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4720"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4720&lt;/A&gt; you can see there are 2 values under field Account_Name first is for the creator, and second is for the new created user&lt;BR /&gt;
i use eval mvindex to distinguish between the two. &lt;BR /&gt;
here is a sample search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  host=* AND sourcetype=WinEventLog:Security AND (EventCode=4720 OR EventCode=4722) 
    | eval CreatedBy = mvindex(Account_Name,0) 
    | eval New_User = mvindex(Account_Name,1) 
    | search CreatedBy=*
    | table _time EventCode CreatedBy New_User
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;hope it helps&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 16:43:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342377#M161313</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2017-04-21T16:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342378#M161314</link>
      <description>&lt;P&gt;Adonio, where in the response the account type? I see that I can get the account name, account domain and security id for both account creator and account created, but no account type can be found. Thanks for replying.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 16:51:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342378#M161314</guid>
      <dc:creator>acabralg</dc:creator>
      <dc:date>2017-04-21T16:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342379#M161315</link>
      <description>&lt;P&gt;to understand better, you are looking for changes or new accounts that has "Administrator" privileges. these accounts might be created by anyone that has permissions to create accounts. is that a true statement?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 17:23:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342379#M161315</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2017-04-21T17:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342380#M161316</link>
      <description>&lt;P&gt;I think that my lack of knowledge on the flow of events related to account creation on a windows server did not allow me to ask the correct question. After some research I believe that there is one event for new account created and another event for adding that account to the "Administrators" group. &lt;BR /&gt;
Initially I thought that I could retrieve that information from the account creation Event logs - EventCode=4720. &lt;BR /&gt;
At this point I am looking for newly created accounts that have Administrator privileges. No matter if it was created by someone with permission to or not - I am assuming it will only be created by accounts with permission to do so.  I am no longer worried about the enabling of accounts. &lt;BR /&gt;
I have found a way to do so. &lt;BR /&gt;
Below is my comment to the previous answer,&lt;/P&gt;

&lt;P&gt;"Since I could not find a way to retrieve the account type, I am currently just retrieving new accounts created and also retrieving EventCode=636(Security Enabled Local Group Member Added) and EventCode=4732 (A member was added to a security-enabled local group).&lt;/P&gt;

&lt;P&gt;These events will tell me what groups the created users were added to. &lt;BR /&gt;
Since I am writing c# code I can retrieve only the users that were added to the Administrators group.&lt;/P&gt;

&lt;P&gt;Current search query,&lt;BR /&gt;
host=* AND sourcetype=WinEventLog:Security AND (EventCode=4720 OR EventCode=4732 OR EventCode=624 OR EventCode=636 ) AND Account_Name=Administrator"&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 18:09:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342380#M161316</guid>
      <dc:creator>acabralg</dc:creator>
      <dc:date>2017-04-21T18:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342381#M161317</link>
      <description>&lt;P&gt;beautiful,&lt;BR /&gt;
if you are happy with your solution, please post as an answer and mark as accepted. or accept another answer here to close the question&lt;BR /&gt;
have a great weekend&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 18:20:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342381#M161317</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2017-04-21T18:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to serach for Windows Server created and enabled accounts of type Administrator - excluding Standard user account type.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342382#M161318</link>
      <description>&lt;P&gt;Since I could not find a way to retrieve the account type with the eventcode=4720 only, I am currently just retrieving new accounts created and also retrieving EventCode=636(Security Enabled Local Group Member Added) and EventCode=4732 (A member was added to a security-enabled local group).&lt;/P&gt;

&lt;P&gt;These events will tell me which groups the created users were added to. &lt;BR /&gt;
Since I am writing c# code, I can retrieve only the users that were added to the Administrators group.&lt;/P&gt;

&lt;P&gt;Current search query,&lt;BR /&gt;
host=* AND sourcetype=WinEventLog:Security AND (EventCode=4720 OR EventCode=4732 OR EventCode=624 OR EventCode=636 ) AND Account_Name=Administrator&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 18:24:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-serach-for-Windows-Server-created-and-enabled-accounts-of/m-p/342382#M161318</guid>
      <dc:creator>acabralg</dc:creator>
      <dc:date>2017-04-21T18:24:06Z</dc:date>
    </item>
  </channel>
</rss>

