<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how to get domain name, domain user name from active directory logs in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/how-to-get-domain-name-domain-user-name-from-active-directory/m-p/244507#M176182</link>
    <description>&lt;P&gt;how to get domain name, domain user name from active directory logs &lt;/P&gt;

&lt;P&gt;11/22/2016 04:15:20 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4634&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=RIYSVSYM-006.KAMC-RD.ngha.med&lt;BR /&gt;
TaskCategory=Logoff&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=23190529&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=An account was logged off.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
    Security ID:        KAMC-RD\Binshbreenab&lt;BR /&gt;
    Account Name:       Binshbreenab&lt;BR /&gt;
    Account Domain:     KAMC-RD&lt;BR /&gt;
    Logon ID:       0x322998008&lt;/P&gt;

&lt;P&gt;Logon Type:         3&lt;/P&gt;

&lt;P&gt;Regards&lt;BR /&gt;
Pradeep&lt;/P&gt;</description>
    <pubDate>Tue, 22 Nov 2016 13:16:29 GMT</pubDate>
    <dc:creator>seetharamanPr</dc:creator>
    <dc:date>2016-11-22T13:16:29Z</dc:date>
    <item>
      <title>how to get domain name, domain user name from active directory logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-get-domain-name-domain-user-name-from-active-directory/m-p/244507#M176182</link>
      <description>&lt;P&gt;how to get domain name, domain user name from active directory logs &lt;/P&gt;

&lt;P&gt;11/22/2016 04:15:20 PM&lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows security auditing.&lt;BR /&gt;
EventCode=4634&lt;BR /&gt;
EventType=0&lt;BR /&gt;
Type=Information&lt;BR /&gt;
ComputerName=RIYSVSYM-006.KAMC-RD.ngha.med&lt;BR /&gt;
TaskCategory=Logoff&lt;BR /&gt;
OpCode=Info&lt;BR /&gt;
RecordNumber=23190529&lt;BR /&gt;
Keywords=Audit Success&lt;BR /&gt;
Message=An account was logged off.&lt;/P&gt;

&lt;P&gt;Subject:&lt;BR /&gt;
    Security ID:        KAMC-RD\Binshbreenab&lt;BR /&gt;
    Account Name:       Binshbreenab&lt;BR /&gt;
    Account Domain:     KAMC-RD&lt;BR /&gt;
    Logon ID:       0x322998008&lt;/P&gt;

&lt;P&gt;Logon Type:         3&lt;/P&gt;

&lt;P&gt;Regards&lt;BR /&gt;
Pradeep&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 13:16:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-get-domain-name-domain-user-name-from-active-directory/m-p/244507#M176182</guid>
      <dc:creator>seetharamanPr</dc:creator>
      <dc:date>2016-11-22T13:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: how to get domain name, domain user name from active directory logs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/how-to-get-domain-name-domain-user-name-from-active-directory/m-p/244508#M176183</link>
      <description>&lt;P&gt;Hi seetharamanPr,&lt;BR /&gt;
your regex is &lt;CODE&gt;(?ms)Account Name:\s(?&amp;lt;Name&amp;gt;\w*)\nAccount Domain:\s(?&amp;lt;Domain&amp;gt;.*)\nLogon\sID:\s(?&amp;lt;Logon_ID&amp;gt;\w*)&lt;/CODE&gt;&lt;BR /&gt;
as you can see at &lt;A href="https://regex101.com/r/Wmrdhy/1"&gt;https://regex101.com/r/Wmrdhy/1&lt;/A&gt;&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2016 13:29:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/how-to-get-domain-name-domain-user-name-from-active-directory/m-p/244508#M176183</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2016-11-22T13:29:12Z</dc:date>
    </item>
  </channel>
</rss>

