<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password spraying search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564334#M196591</link>
    <description>&lt;P&gt;I made those changes still i am not getting the result what am expecting.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Aug 2021 13:33:16 GMT</pubDate>
    <dc:creator>kuriakose</dc:creator>
    <dc:date>2021-08-23T13:33:16Z</dc:date>
    <item>
      <title>Password spraying search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564322#M196586</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attempting to create a search for a password spraying attempt. I need the IP address and Hostname made with the different login names attempted to login to a particular machine within the last 5 min. Also, the number of login attempts should be more than 10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created the below search, but that's pulling me wrong data. A sample data am expecting is attached in the screenshot&lt;/P&gt;&lt;P&gt;index=win* EventCode=4625 Logon_Type=3 Target_User_Name!="" src_ip!="-" |bucket span=5m _time&lt;BR /&gt;|stats dc(TargetUserName) AS Unique_accounts values(TargetUserName) as tried_accounts by _time, src_ip Source_Workstation |eventstats avg(Unique_accounts) as global_avg, stdev(Unique_accounts) as global_std |eval upperBound=(comp_avg+comp_std*3) |eval isOutlier=if(Unique_accounts&amp;gt;10 and Unique_accounts&amp;gt;=upperBound, 1, 0) |sort -Unique_accounts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 12:53:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564322#M196586</guid>
      <dc:creator>kuriakose</dc:creator>
      <dc:date>2021-08-23T12:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Password spraying search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564330#M196590</link>
      <description>&lt;P&gt;comp_avg and comp_std don't exist, you named them global_avg and global_std in the eventstats command&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 13:11:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564330#M196590</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-08-23T13:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: Password spraying search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564334#M196591</link>
      <description>&lt;P&gt;I made those changes still i am not getting the result what am expecting.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 13:33:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564334#M196591</guid>
      <dc:creator>kuriakose</dc:creator>
      <dc:date>2021-08-23T13:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: Password spraying search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564341#M196594</link>
      <description>&lt;P&gt;In what way does it differ from what you expected?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 13:51:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Password-spraying-search/m-p/564341#M196594</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-08-23T13:51:30Z</dc:date>
    </item>
  </channel>
</rss>

