<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tracking user logon (standard and admin account) Windows AD in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/571031#M198979</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236717"&gt;@Stefanie&lt;/a&gt;&amp;nbsp;hello! I am getting an error when I paste it into search, about time error. Could you please advise? Thank you&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Oct 2021 17:27:48 GMT</pubDate>
    <dc:creator>araiv1998</dc:creator>
    <dc:date>2021-10-14T17:27:48Z</dc:date>
    <item>
      <title>Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570967#M198963</link>
      <description>&lt;P&gt;Hello, I am looking to create a report of a search. I have a requirement of tracking user logon to window machines (Active directory). I am currently getting all the data, but I am having problems with false logons, or services using the credentials. for example, I will see people logged in at 1 am, but the logon id is 0x0, or there is an error code 000, so that most likely will be a service or something using the credentials of someone, and no one actually logging in. there are about 1500 records a day of these false logons.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also have the requirement to track Monday - Friday from 6pm to 6am overnight, and I cant seem to get the time of recording properly in the search. Below is the search I am currently using, and help would be appreciated, thank you!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;source= “wineventlog: security" EventCode=528 OR EventCode=540 OR EventCode=4624 OR&lt;/P&gt;
&lt;P&gt;(EventCode=4776 Error_Code=0x0) NOT Account_Name=“*$” NOT Logon _Account="*$" NOT User_Name="*$'&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| eval Account_Name=mvindex(Account Name, 1)

| eval User=coalesce(Account_Name, Logon_Account, Logon_account, User_Name)

| eval User=lower (User)

| table  _time, User, EventCode&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 02 Jul 2024 18:43:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570967#M198963</guid>
      <dc:creator>araiv1998</dc:creator>
      <dc:date>2024-07-02T18:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570971#M198964</link>
      <description>&lt;P&gt;Try this search. I saved it a while back and its been useful. You may have to modify it to match exactly what account names you don't want to track.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="wineventlog:security" action=success Logon_Type=2 (EventCode=4624 OR EventCode=4634 OR EventCode=4779 OR EventCode=4800 OR EventCode=4801 OR EventCode=4802 OR EventCode=4803 OR EventCode=4804 ) user!="anonymous logon" user!="DWM-*" user!="UMFD-*" user!=SYSTEM user!=*$ (Logon_Type=2 OR Logon_Type=7 OR Logon_Type=10)
| convert timeformat="%a %B %d %Y" ctime(_time) AS Date 
| streamstats earliest(_time) AS login, latest(_time) AS logout by Date, host
| eval session_duration=logout-login 
| eval h=floor(session_duration/3600) 
| eval m=floor((session_duration-(h*3600))/60) 
| eval SessionDuration=h."h ".m."m " 
| convert timeformat=" %m/%d/%y - %I:%M %P" ctime(login) AS login 
| convert timeformat=" %m/%d/%y - %I:%M %P" ctime(logout) AS logout 
| stats count AS auth_event_count, earliest(login) as login, max(SessionDuration) AS sesion_duration, latest(logout) as logout, values(Logon_Type) AS logon_types by Date, host, user&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 14 Oct 2021 12:43:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570971#M198964</guid>
      <dc:creator>Stefanie</dc:creator>
      <dc:date>2021-10-14T12:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570978#M198966</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236717"&gt;@Stefanie&lt;/a&gt;&amp;nbsp;Thank you very much for the reply! I am so sorry, could you possibly explain a little? On this section,&amp;nbsp;&lt;/P&gt;&lt;P&gt;“user!="anonymous logon" user!="DWM-*" user!="UMFD-*" user!=SYSTEM user!=*$ (Logon_Type=2 OR Logon_Type=7 OR Logon_Type=10)”&lt;/P&gt;&lt;P&gt;Are those you are saying to keep out of the search since they are system related? Or are this account you are specifically telling it to look for? I apologize for the dumb question, I am very new to Splunk.. I was told on Friday I needed to learn Splunk asap with zero knowledge hahaha. So I am still very much learning. I am just curious, as I remember if this is something we do not want searched, we put "NOT" in front correct?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 12:55:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570978#M198966</guid>
      <dc:creator>araiv1998</dc:creator>
      <dc:date>2021-10-14T12:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570981#M198967</link>
      <description>&lt;P&gt;No worries. Those are items I am telling it to NOT look for.&lt;/P&gt;&lt;P&gt;the "!" in front of the "=" means "NOT" &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So in your case... Account_Name!="*$" is the same as you saying "NOT Account_Name="*$""&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 13:00:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570981#M198967</guid>
      <dc:creator>Stefanie</dc:creator>
      <dc:date>2021-10-14T13:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570991#M198970</link>
      <description>&lt;P&gt;Awesome! Thank you so much! truly appreciate it.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 13:13:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570991#M198970</guid>
      <dc:creator>araiv1998</dc:creator>
      <dc:date>2021-10-14T13:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570995#M198971</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236717"&gt;@Stefanie&lt;/a&gt;&amp;nbsp;what would you recommend for the time? So I am looking to track between 6pm and 5am, I tried this but it did not seem to work:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"date_hour›16 date_hour ‹06"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"sourcetype-foo&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| eval date_ hour=strftime(_time, "%H)

| eval date_wday = strftime(_time, "%W")

| search date_hour&amp;gt;=16 date_hour&amp;lt;=06 date_wday&amp;gt;=1 date_wday&amp;lt;=5"&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 02 Jul 2024 18:43:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570995#M198971</guid>
      <dc:creator>araiv1998</dc:creator>
      <dc:date>2024-07-02T18:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570996#M198972</link>
      <description>&lt;P&gt;Adding the search range into the search itself its not very efficient. Next to the box you type your searches in is a drop down box to select your range. You can select the timeframe there using the "Date and Timeframe" range.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 13:27:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/570996#M198972</guid>
      <dc:creator>Stefanie</dc:creator>
      <dc:date>2021-10-14T13:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/571031#M198979</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236717"&gt;@Stefanie&lt;/a&gt;&amp;nbsp;hello! I am getting an error when I paste it into search, about time error. Could you please advise? Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 17:27:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/571031#M198979</guid>
      <dc:creator>araiv1998</dc:creator>
      <dc:date>2021-10-14T17:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/571035#M198980</link>
      <description>&lt;P&gt;Sure I messaged you.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 17:42:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/571035#M198980</guid>
      <dc:creator>Stefanie</dc:creator>
      <dc:date>2021-10-14T17:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking user logon (standard and admin account) Windows AD</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/692233#M235639</link>
      <description>&lt;P&gt;&lt;EM&gt;I was hoping to get some help, in modifying the query above. I got an Index and a source type for my windows environment. I would like to see the following:&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;- &lt;U&gt;&lt;STRONG&gt;Authentication PackagesName&lt;/STRONG&gt;&lt;/U&gt;&amp;nbsp; = &lt;EM&gt;This looks to shows the type of Authentication taking place like NTLM, Kerberos, MFA, etc.... I need this to show for each user&amp;nbsp; (&lt;A href="https://learn.microsoft.com/en-us/windows-server/security/windows-authentication/windows-authentication-technical-overview" target="_blank"&gt;Windows Authentication Technical Overview | Microsoft Learn&lt;/A&gt;)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;- &lt;U&gt;&lt;STRONG&gt;Logon Type&lt;/STRONG&gt; &lt;/U&gt;= &lt;EM&gt;used by Windows to shows successful login and failers logs like (4624, 4625, 4648) and should have a count related to the above attribute&amp;nbsp; (&lt;A href="https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dn169020(v=ws.10)" target="_blank"&gt;Windows Logon Scenarios | Microsoft Learn&lt;/A&gt;)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;-&lt;U&gt;&lt;STRONG&gt; LogonProcessName&lt;/STRONG&gt;&lt;/U&gt; = &lt;EM&gt;The process name for the authentication action taking place for the user&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;PS. The idea here it sees what Authentication action is taking place for each user so I can say yea there are using NTLM or Kerberos to access this host or resource. Thanks again Community!!!!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 18:09:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Tracking-user-logon-standard-and-admin-account-Windows-AD/m-p/692233#M235639</guid>
      <dc:creator>sgtwolf1</dc:creator>
      <dc:date>2024-07-02T18:09:45Z</dc:date>
    </item>
  </channel>
</rss>

