<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Strange Splunk Search Exclusion Results in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481937#M193149</link>
    <description>&lt;P&gt;Hello, &lt;/P&gt;

&lt;P&gt;Can you please add the option of &lt;STRONG&gt;&lt;EM&gt;| sort 0 - _time&lt;/EM&gt;&lt;/STRONG&gt; command like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;**index=-windows-logs (EventCode=4624 AND Logon_Type=3) Account_Name=helpdesk | sort 0 - _time | table _time, Account_Name, EventCode, Logon_Type, src_nt_host, dest_nt_host, signature*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.1/SearchReference/Sort"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.1/SearchReference/Sort&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Jan 2020 14:56:08 GMT</pubDate>
    <dc:creator>TISKAR</dc:creator>
    <dc:date>2020-01-10T14:56:08Z</dc:date>
    <item>
      <title>Strange Splunk Search Exclusion Results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481936#M193148</link>
      <description>&lt;P&gt;Hello. I am creating a search to see when the Account_Name called "helpdesk" logs in via EventCode 4624 with Logon_Type=3. My goal is to see what source machines (src_nt_host) normally perform this logon behavior with that account name. After I find the source machines I will exclude them in the search so I can alert off of it.&lt;/P&gt;

&lt;P&gt;A search going back the past 3 months below brings back five different source machines (src_nt_host). &lt;/P&gt;

&lt;P&gt;Here is the strange part - when I exclude one of those five source machines using &lt;STRONG&gt;src_nt_host!=machineA&lt;/STRONG&gt; then rerun the search, it brings back more source machines that never showed up in the original search! Any clue why this is occurring? It would be awesome if I could figure out what is going on!&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;index=*-windows-logs (EventCode=4624 AND Logon_Type=3) Account_Name=helpdesk | sort - _time | table  _time, Account_Name, EventCode, Logon_Type, src_nt_host, dest_nt_host, signature&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:38:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481936#M193148</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2020-09-30T03:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Splunk Search Exclusion Results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481937#M193149</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;

&lt;P&gt;Can you please add the option of &lt;STRONG&gt;&lt;EM&gt;| sort 0 - _time&lt;/EM&gt;&lt;/STRONG&gt; command like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;**index=-windows-logs (EventCode=4624 AND Logon_Type=3) Account_Name=helpdesk | sort 0 - _time | table _time, Account_Name, EventCode, Logon_Type, src_nt_host, dest_nt_host, signature*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.1/SearchReference/Sort"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.1/SearchReference/Sort&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 14:56:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481937#M193149</guid>
      <dc:creator>TISKAR</dc:creator>
      <dc:date>2020-01-10T14:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Splunk Search Exclusion Results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481938#M193150</link>
      <description>&lt;P&gt;Hello TISKAR. I tried it but it made no difference...&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 15:33:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481938#M193150</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2020-01-10T15:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Splunk Search Exclusion Results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481939#M193151</link>
      <description>&lt;P&gt;Can you please run this request: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=-windows-logs (EventCode=4624 AND Logon_Type=3) Account_Name=helpdesk | stats count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And compar result with: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=-windows-logs (EventCode=4624 AND Logon_Type=3) Account_Name=helpdesk NOT  src_nt_host=machineA | stats count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 10 Jan 2020 15:39:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481939#M193151</guid>
      <dc:creator>TISKAR</dc:creator>
      <dc:date>2020-01-10T15:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Splunk Search Exclusion Results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481940#M193152</link>
      <description>&lt;P&gt;First search (no exclusions) = 450,073&lt;/P&gt;

&lt;P&gt;Second search (with the machineA exclusion) = 79,947&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 15:59:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481940#M193152</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2020-01-10T15:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: Strange Splunk Search Exclusion Results</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481941#M193153</link>
      <description>&lt;P&gt;If I run these two searches, the Statistics totals are 29 and 28 - only off by one (which makes sense because I excluded only one machine). Therefore that seems to add up correctly. Not sure why my original search only showed 5 systems. &lt;/P&gt;

&lt;P&gt;index=*-windows-logs (EventCode=4624 AND Logon_Type=3) Account_Name=administrator | table src_nt_host | dedup src_nt_host&lt;/P&gt;

&lt;P&gt;index=*-windows-logs (EventCode=4624 AND Logon_Type=3) Account_Name=administrator src_nt_host!=machineA | table src_nt_host | dedup src_nt_host&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:38:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Strange-Splunk-Search-Exclusion-Results/m-p/481941#M193153</guid>
      <dc:creator>johann2017</dc:creator>
      <dc:date>2020-09-30T03:38:21Z</dc:date>
    </item>
  </channel>
</rss>

