<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Getting Started Question:   Finding failed Windows logon attempts in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48232#M179489</link>
    <description>&lt;P&gt;The service account that runs splunkd on the indexer needs to be a domain account.  Here is an older post that speaks to WMI:&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/3701/how-to-get-wmi-data-collection-by-providing-to-splunk-the-remote-host-credentials"&gt;http://answers.splunk.com/answers/3701/how-to-get-wmi-data-collection-by-providing-to-splunk-the-remote-host-credentials&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Aug 2013 19:47:26 GMT</pubDate>
    <dc:creator>lukejadamec</dc:creator>
    <dc:date>2013-08-27T19:47:26Z</dc:date>
    <item>
      <title>Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48225#M179482</link>
      <description>&lt;P&gt;Ok, Great! So we just got splunk running.  Now what.&lt;BR /&gt;&lt;BR /&gt;
I've gone out and told it to grab AD data, so I thought Hey, how do I find failed logon attempts on the network?  Even better, can I set a trigger to alert me when someone fails X times and the account gets locked out?   &lt;/P&gt;

&lt;P&gt;Any takers for a rookie question?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 15:09:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48225#M179482</guid>
      <dc:creator>TylerTreat</dc:creator>
      <dc:date>2013-08-27T15:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48226#M179483</link>
      <description>&lt;P&gt;You might want to take a look at the &lt;A href="http://apps.splunk.com/app/1059"&gt;Splunk App for Active Directory&lt;/A&gt;, which includes a &lt;A href="http://docs.splunk.com/Documentation/ActiveDirectory/latest/DeployAD/Dashboardreference-Security"&gt;dashboard for user logon failures&lt;/A&gt;. If you're going to install that app, be sure to read the &lt;A href="http://docs.splunk.com/Documentation/ActiveDirectory/1.2.1/DeployAD/NewtoSplunk"&gt;New to Splunk?&lt;/A&gt; topic in that manual.&lt;/P&gt;

&lt;P&gt;You can set up an alert based on those saved searches; see &lt;A href="http://docs.splunk.com/Documentation/Splunk/5.0.4/Alert/Aboutalerts"&gt;the Splunk Alerting Manual&lt;/A&gt; for more information.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 15:22:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48226#M179483</guid>
      <dc:creator>ChrisG</dc:creator>
      <dc:date>2013-08-27T15:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48227#M179484</link>
      <description>&lt;P&gt;You should get yourself a copy of the Windows Security Operations Center.&lt;/P&gt;

&lt;P&gt;It will have pre-built searches and dashboards for this activity.&lt;/P&gt;

&lt;P&gt;However, you can do what you ask without the app.  To find and alert on locked accounts use the following search:&lt;/P&gt;

&lt;P&gt;index=main sourcetype="*security*" EventCode=644 OR EventCode=4740 &lt;/P&gt;

&lt;P&gt;In the upper right select Create &amp;gt; Alert, give it a name and select realtime, and select Next.&lt;/P&gt;

&lt;P&gt;Select Send Email, and enter your email address.&lt;/P&gt;

&lt;P&gt;Select Include Results - Inline&lt;/P&gt;

&lt;P&gt;Select Next and select your Sharing option.&lt;/P&gt;

&lt;P&gt;Select Finish.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 15:24:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48227#M179484</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-27T15:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48228#M179485</link>
      <description>&lt;P&gt;I assume you have configured your smtp setting in Splunk.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 15:59:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48228#M179485</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-27T15:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48229#M179486</link>
      <description>&lt;P&gt;yeah, so apparently i'm not completely talking to active directory until I install some forwarders.    I saw "add data source" for AD or whatever on the firstrun page and did that.&lt;BR /&gt;&lt;BR /&gt;
Apparently its a bit more involved.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 19:03:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48229#M179486</guid>
      <dc:creator>TylerTreat</dc:creator>
      <dc:date>2013-08-27T19:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48230#M179487</link>
      <description>&lt;P&gt;You don't need to install forwarders necessarily.&lt;BR /&gt;
Go to Manager &amp;gt; Data Inputs &amp;gt; Remote Event Log Collections and select New.  This will use WMI.  You will need a windows domain account.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 19:11:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48230#M179487</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-27T19:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48231#M179488</link>
      <description>&lt;P&gt;Will it prompt for the domain account or is it configured somewhere?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 19:39:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48231#M179488</guid>
      <dc:creator>TylerTreat</dc:creator>
      <dc:date>2013-08-27T19:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48232#M179489</link>
      <description>&lt;P&gt;The service account that runs splunkd on the indexer needs to be a domain account.  Here is an older post that speaks to WMI:&lt;BR /&gt;
&lt;A href="http://answers.splunk.com/answers/3701/how-to-get-wmi-data-collection-by-providing-to-splunk-the-remote-host-credentials"&gt;http://answers.splunk.com/answers/3701/how-to-get-wmi-data-collection-by-providing-to-splunk-the-remote-host-credentials&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2013 19:47:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48232#M179489</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-27T19:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48233#M179490</link>
      <description>&lt;P&gt;Great! This worked.  Thanks!&lt;BR /&gt;
Now we're hammering the daily limit for the free system.   May have to dial it back a notch. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2013 15:40:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48233#M179490</guid>
      <dc:creator>TylerTreat</dc:creator>
      <dc:date>2013-08-28T15:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48234#M179491</link>
      <description>&lt;P&gt;Do you have the deployment monitor app installed?&lt;BR /&gt;
The initial data dump will be pretty large because it will collect all of the logs.&lt;BR /&gt;&lt;BR /&gt;
The deployment monitor &amp;gt; License Usage tab will show the indexing volume change over time.&lt;BR /&gt;
Splunk support can help with license violations.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2013 15:55:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48234#M179491</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-28T15:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Getting Started Question:   Finding failed Windows logon attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48235#M179492</link>
      <description>&lt;P&gt;Don't forget to accept the answer.  It lets other folks know the issue is closed.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2013 17:11:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Getting-Started-Question-Finding-failed-Windows-logon-attempts/m-p/48235#M179492</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-28T17:11:20Z</dc:date>
    </item>
  </channel>
</rss>

