<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Account Logged On For More Than 12 Hours in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581128#M202455</link>
    <description>&lt;P&gt;thats the thing they didnt logoff , they are still connected . so now -12h&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Jan 2022 16:15:28 GMT</pubDate>
    <dc:creator>websplunk01</dc:creator>
    <dc:date>2022-01-14T16:15:28Z</dc:date>
    <item>
      <title>User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/580985#M202408</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;BR /&gt;I am trying to figure out how to write a query to create an alert that will alert me whenever a user is logged on to the machine more than 12 hours .&lt;BR /&gt;Can you please help me figure this out . Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 16:54:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/580985#M202408</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-13T16:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581008#M202415</link>
      <description>&lt;P&gt;What events do you have available?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 18:44:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581008#M202415</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-01-13T18:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581009#M202416</link>
      <description>&lt;P&gt;Security , system and application&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 19:11:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581009#M202416</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-13T19:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581013#M202418</link>
      <description>&lt;P&gt;Can you provide some sample events please?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 19:26:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581013#M202418</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-01-13T19:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581015#M202420</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;01/13/2022&lt;/SPAN&gt; &lt;SPAN class=""&gt;02:12:37&lt;/SPAN&gt; &lt;SPAN class=""&gt;PM&lt;/SPAN&gt; &lt;SPAN class=""&gt;LogName=Security&lt;/SPAN&gt; &lt;SPAN class=""&gt;EventCode=4624&lt;/SPAN&gt; &lt;SPAN class=""&gt;EventType=0&lt;/SPAN&gt; &lt;SPAN class=""&gt;ComputerName=GWD58EF&lt;/SPAN&gt; &lt;SPAN class=""&gt;SourceName=Microsoft&lt;/SPAN&gt; &lt;SPAN class=""&gt;Windows&lt;/SPAN&gt; &lt;SPAN class=""&gt;security&lt;/SPAN&gt; &lt;SPAN class=""&gt;auditing.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Type=Information&lt;/SPAN&gt; &lt;SPAN class=""&gt;RecordNumber=51488031&lt;/SPAN&gt; &lt;SPAN class=""&gt;Keywords=Audit&lt;/SPAN&gt; &lt;SPAN class=""&gt;Success&lt;/SPAN&gt; &lt;SPAN class=""&gt;TaskCategory=Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;OpCode=Info&lt;/SPAN&gt; &lt;SPAN class=""&gt;Message=An&lt;/SPAN&gt; &lt;SPAN class=""&gt;account&lt;/SPAN&gt; &lt;SPAN class=""&gt;was&lt;/SPAN&gt; &lt;SPAN class=""&gt;successfully&lt;/SPAN&gt; &lt;SPAN class=""&gt;logged&lt;/SPAN&gt; &lt;SPAN class=""&gt;on.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Subject:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Security&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;NULL&lt;/SPAN&gt; &lt;SPAN class=""&gt;SID&lt;/SPAN&gt; &lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Domain:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;0x0&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;Information:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;Type:&lt;/SPAN&gt; &lt;SPAN class=""&gt;3&lt;/SPAN&gt; &lt;SPAN class=""&gt;Restricted&lt;/SPAN&gt; &lt;SPAN class=""&gt;Admin&lt;/SPAN&gt; &lt;SPAN class=""&gt;Mode:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Virtual&lt;/SPAN&gt; &lt;SPAN class=""&gt;Account:&lt;/SPAN&gt; &lt;SPAN class=""&gt;No&lt;/SPAN&gt; &lt;SPAN class=""&gt;Elevated&lt;/SPAN&gt; &lt;SPAN class=""&gt;Token:&lt;/SPAN&gt; &lt;SPAN class=""&gt;No&lt;/SPAN&gt; &lt;SPAN class=""&gt;Impersonation&lt;/SPAN&gt; &lt;SPAN class=""&gt;Level:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Impersonation&lt;/SPAN&gt; &lt;SPAN class=""&gt;New&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Security&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;GWD58EF\admin&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt;&amp;nbsp;admin&amp;nbsp;&lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Domain:&lt;/SPAN&gt; &lt;SPAN class=""&gt;GWD58EF&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;0x1FF978045&lt;/SPAN&gt; &lt;SPAN class=""&gt;Linked&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;0x0&lt;/SPAN&gt; &lt;SPAN class=""&gt;Network&lt;/SPAN&gt; &lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Network&lt;/SPAN&gt; &lt;SPAN class=""&gt;Account&lt;/SPAN&gt; &lt;SPAN class=""&gt;Domain:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;GUID:&lt;/SPAN&gt;&lt;SPAN&gt; {&lt;/SPAN&gt;&lt;SPAN class=""&gt;00000000-0000-0000-0000-000000000000&lt;/SPAN&gt;&lt;SPAN&gt;} &lt;/SPAN&gt;&lt;SPAN class=""&gt;Process&lt;/SPAN&gt; &lt;SPAN class=""&gt;Information:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Process&lt;/SPAN&gt; &lt;SPAN class=""&gt;ID:&lt;/SPAN&gt; &lt;SPAN class=""&gt;0x0&lt;/SPAN&gt; &lt;SPAN class=""&gt;Process&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Network&lt;/SPAN&gt; &lt;SPAN class=""&gt;Information:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Workstation&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;XTHD09A&lt;/SPAN&gt; &lt;SPAN class=""&gt;Source&lt;/SPAN&gt; &lt;SPAN class=""&gt;Network&lt;/SPAN&gt; &lt;SPAN class=""&gt;Address:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Source&lt;/SPAN&gt; &lt;SPAN class=""&gt;Port:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Detailed&lt;/SPAN&gt; &lt;SPAN class=""&gt;Authentication&lt;/SPAN&gt; &lt;SPAN class=""&gt;Information:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;Process:&lt;/SPAN&gt; &lt;SPAN class=""&gt;NtLmSsp&lt;/SPAN&gt; &lt;SPAN class=""&gt;Authentication&lt;/SPAN&gt; &lt;SPAN class=""&gt;Package:&lt;/SPAN&gt; &lt;SPAN class=""&gt;NTLM&lt;/SPAN&gt; &lt;SPAN class=""&gt;Transited&lt;/SPAN&gt; &lt;SPAN class=""&gt;Services:&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Package&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name&lt;/SPAN&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;SPAN class=""&gt;NTLM&lt;/SPAN&gt; &lt;SPAN class=""&gt;only&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;NTLM&lt;/SPAN&gt; &lt;SPAN class=""&gt;V2&lt;/SPAN&gt; &lt;SPAN class=""&gt;Key&lt;/SPAN&gt; &lt;SPAN class=""&gt;Length:&lt;/SPAN&gt; &lt;SPAN class=""&gt;128&lt;/SPAN&gt; &lt;SPAN class=""&gt;This&lt;/SPAN&gt; &lt;SPAN class=""&gt;event&lt;/SPAN&gt; &lt;SPAN class=""&gt;is&lt;/SPAN&gt; &lt;SPAN class=""&gt;generated&lt;/SPAN&gt; &lt;SPAN class=""&gt;when&lt;/SPAN&gt; &lt;SPAN class=""&gt;a&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;session&lt;/SPAN&gt; &lt;SPAN class=""&gt;is&lt;/SPAN&gt; &lt;SPAN class=""&gt;created.&lt;/SPAN&gt; &lt;SPAN class=""&gt;It&lt;/SPAN&gt; &lt;SPAN class=""&gt;is&lt;/SPAN&gt; &lt;SPAN class=""&gt;generated&lt;/SPAN&gt; &lt;SPAN class=""&gt;on&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;computer&lt;/SPAN&gt; &lt;SPAN class=""&gt;that&lt;/SPAN&gt; &lt;SPAN class=""&gt;was&lt;/SPAN&gt; &lt;SPAN class=""&gt;accessed.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The&lt;/SPAN&gt; &lt;SPAN class=""&gt;subject&lt;/SPAN&gt; &lt;SPAN class=""&gt;fields&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicate&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;account&lt;/SPAN&gt; &lt;SPAN class=""&gt;on&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;local&lt;/SPAN&gt; &lt;SPAN class=""&gt;system&lt;/SPAN&gt; &lt;SPAN class=""&gt;which&lt;/SPAN&gt; &lt;SPAN class=""&gt;requested&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon.&lt;/SPAN&gt; &lt;SPAN class=""&gt;This&lt;/SPAN&gt; &lt;SPAN class=""&gt;is&lt;/SPAN&gt; &lt;SPAN class=""&gt;most&lt;/SPAN&gt; &lt;SPAN class=""&gt;commonly&lt;/SPAN&gt; &lt;SPAN class=""&gt;a&lt;/SPAN&gt; &lt;SPAN class=""&gt;service&lt;/SPAN&gt; &lt;SPAN class=""&gt;such&lt;/SPAN&gt; &lt;SPAN class=""&gt;as&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;Server&lt;/SPAN&gt; &lt;SPAN class=""&gt;service&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;a&lt;/SPAN&gt; &lt;SPAN class=""&gt;local&lt;/SPAN&gt; &lt;SPAN class=""&gt;process&lt;/SPAN&gt; &lt;SPAN class=""&gt;such&lt;/SPAN&gt; &lt;SPAN class=""&gt;as&lt;/SPAN&gt; &lt;SPAN class=""&gt;Winlogon.exe&lt;/SPAN&gt; &lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;Services.exe.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;type&lt;/SPAN&gt; &lt;SPAN class=""&gt;field&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicates&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;kind&lt;/SPAN&gt; &lt;SPAN class=""&gt;of&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;that&lt;/SPAN&gt; &lt;SPAN class=""&gt;occurred.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The&lt;/SPAN&gt; &lt;SPAN class=""&gt;most&lt;/SPAN&gt; &lt;SPAN class=""&gt;common&lt;/SPAN&gt; &lt;SPAN class=""&gt;types&lt;/SPAN&gt; &lt;SPAN class=""&gt;are&lt;/SPAN&gt; &lt;SPAN class=""&gt;2&lt;/SPAN&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;SPAN class=""&gt;interactive&lt;/SPAN&gt;&lt;SPAN&gt;) &lt;/SPAN&gt;&lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;3&lt;/SPAN&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;SPAN class=""&gt;network&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The&lt;/SPAN&gt; &lt;SPAN class=""&gt;New&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;fields&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicate&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;account&lt;/SPAN&gt; &lt;SPAN class=""&gt;for&lt;/SPAN&gt; &lt;SPAN class=""&gt;whom&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;new&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;was&lt;/SPAN&gt; &lt;SPAN class=""&gt;created&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;i.e.&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;account&lt;/SPAN&gt; &lt;SPAN class=""&gt;that&lt;/SPAN&gt; &lt;SPAN class=""&gt;was&lt;/SPAN&gt; &lt;SPAN class=""&gt;logged&lt;/SPAN&gt; &lt;SPAN class=""&gt;on.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The&lt;/SPAN&gt; &lt;SPAN class=""&gt;network&lt;/SPAN&gt; &lt;SPAN class=""&gt;fields&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicate&lt;/SPAN&gt; &lt;SPAN class=""&gt;where&lt;/SPAN&gt; &lt;SPAN class=""&gt;a&lt;/SPAN&gt; &lt;SPAN class=""&gt;remote&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;request&lt;/SPAN&gt; &lt;SPAN class=""&gt;originated.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Workstation&lt;/SPAN&gt; &lt;SPAN class=""&gt;name&lt;/SPAN&gt; &lt;SPAN class=""&gt;is&lt;/SPAN&gt; &lt;SPAN class=""&gt;not&lt;/SPAN&gt; &lt;SPAN class=""&gt;always&lt;/SPAN&gt; &lt;SPAN class=""&gt;available&lt;/SPAN&gt; &lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;may&lt;/SPAN&gt; &lt;SPAN class=""&gt;be&lt;/SPAN&gt; &lt;SPAN class=""&gt;left&lt;/SPAN&gt; &lt;SPAN class=""&gt;blank&lt;/SPAN&gt; &lt;SPAN class=""&gt;in&lt;/SPAN&gt; &lt;SPAN class=""&gt;some&lt;/SPAN&gt; &lt;SPAN class=""&gt;cases.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The&lt;/SPAN&gt; &lt;SPAN class=""&gt;impersonation&lt;/SPAN&gt; &lt;SPAN class=""&gt;level&lt;/SPAN&gt; &lt;SPAN class=""&gt;field&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicates&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;extent&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;which&lt;/SPAN&gt; &lt;SPAN class=""&gt;a&lt;/SPAN&gt; &lt;SPAN class=""&gt;process&lt;/SPAN&gt; &lt;SPAN class=""&gt;in&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;session&lt;/SPAN&gt; &lt;SPAN class=""&gt;can&lt;/SPAN&gt; &lt;SPAN class=""&gt;impersonate.&lt;/SPAN&gt; &lt;SPAN class=""&gt;The&lt;/SPAN&gt; &lt;SPAN class=""&gt;authentication&lt;/SPAN&gt; &lt;SPAN class=""&gt;information&lt;/SPAN&gt; &lt;SPAN class=""&gt;fields&lt;/SPAN&gt; &lt;SPAN class=""&gt;provide&lt;/SPAN&gt; &lt;SPAN class=""&gt;detailed&lt;/SPAN&gt; &lt;SPAN class=""&gt;information&lt;/SPAN&gt; &lt;SPAN class=""&gt;about&lt;/SPAN&gt; &lt;SPAN class=""&gt;this&lt;/SPAN&gt; &lt;SPAN class=""&gt;specific&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;request.&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;GUID&lt;/SPAN&gt; &lt;SPAN class=""&gt;is&lt;/SPAN&gt; &lt;SPAN class=""&gt;a&lt;/SPAN&gt; &lt;SPAN class=""&gt;unique&lt;/SPAN&gt; &lt;SPAN class=""&gt;identifier&lt;/SPAN&gt; &lt;SPAN class=""&gt;that&lt;/SPAN&gt; &lt;SPAN class=""&gt;can&lt;/SPAN&gt; &lt;SPAN class=""&gt;be&lt;/SPAN&gt; &lt;SPAN class=""&gt;used&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;correlate&lt;/SPAN&gt; &lt;SPAN class=""&gt;this&lt;/SPAN&gt; &lt;SPAN class=""&gt;event&lt;/SPAN&gt; &lt;SPAN class=""&gt;with&lt;/SPAN&gt; &lt;SPAN class=""&gt;a&lt;/SPAN&gt; &lt;SPAN class=""&gt;KDC&lt;/SPAN&gt; &lt;SPAN class=""&gt;event.&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Transited&lt;/SPAN&gt; &lt;SPAN class=""&gt;services&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicate&lt;/SPAN&gt; &lt;SPAN class=""&gt;which&lt;/SPAN&gt; &lt;SPAN class=""&gt;intermediate&lt;/SPAN&gt; &lt;SPAN class=""&gt;services&lt;/SPAN&gt; &lt;SPAN class=""&gt;have&lt;/SPAN&gt; &lt;SPAN class=""&gt;participated&lt;/SPAN&gt; &lt;SPAN class=""&gt;in&lt;/SPAN&gt; &lt;SPAN class=""&gt;this&lt;/SPAN&gt; &lt;SPAN class=""&gt;logon&lt;/SPAN&gt; &lt;SPAN class=""&gt;request.&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Package&lt;/SPAN&gt; &lt;SPAN class=""&gt;name&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicates&lt;/SPAN&gt; &lt;SPAN class=""&gt;which&lt;/SPAN&gt; &lt;SPAN class=""&gt;sub-protocol&lt;/SPAN&gt; &lt;SPAN class=""&gt;was&lt;/SPAN&gt; &lt;SPAN class=""&gt;used&lt;/SPAN&gt; &lt;SPAN class=""&gt;among&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;NTLM&lt;/SPAN&gt; &lt;SPAN class=""&gt;protocols.&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;Key&lt;/SPAN&gt; &lt;SPAN class=""&gt;length&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicates&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;length&lt;/SPAN&gt; &lt;SPAN class=""&gt;of&lt;/SPAN&gt; &lt;SPAN class=""&gt;the&lt;/SPAN&gt; &lt;SPAN class=""&gt;generated&lt;/SPAN&gt; &lt;SPAN class=""&gt;session&lt;/SPAN&gt; &lt;SPAN class=""&gt;key.&lt;/SPAN&gt; &lt;SPAN class=""&gt;This&lt;/SPAN&gt; &lt;SPAN class=""&gt;will&lt;/SPAN&gt; &lt;SPAN class=""&gt;be&lt;/SPAN&gt; &lt;SPAN class=""&gt;0&lt;/SPAN&gt; &lt;SPAN class=""&gt;if&lt;/SPAN&gt; &lt;SPAN class=""&gt;no&lt;/SPAN&gt; &lt;SPAN class=""&gt;session&lt;/SPAN&gt; &lt;SPAN class=""&gt;key&lt;/SPAN&gt; &lt;SPAN class=""&gt;was&lt;/SPAN&gt; &lt;SPAN class=""&gt;requested.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 19:35:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581015#M202420</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-13T19:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581019#M202422</link>
      <description>&lt;P&gt;Can you split this up into separated events, perhaps putting each in a code block &amp;lt;/&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 20:00:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581019#M202422</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-01-13T20:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581038#M202429</link>
      <description>&lt;P&gt;Having worked through a lot of challenges around calculating windows sessions, it is much complex than that you'll expect.&lt;/P&gt;&lt;P&gt;The sample event that you've provided indicate that the logon type = 3 which is logged when a user access a shared resource of the host remotely (e.g. mapped drive) -- should that be in scope? How about services running as a service account? More info about logon types:&amp;nbsp;&lt;A href="https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4624" target="_blank" rel="noopener"&gt;https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4624&lt;/A&gt;&lt;/P&gt;&lt;P&gt;What is the size of your environment, number of users and host? What is your (screensaver) password inactivity lock policy?&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Give me a better understanding of what you're trying to achieve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 03:36:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581038#M202429</guid>
      <dc:creator>johnhuang</dc:creator>
      <dc:date>2022-01-14T03:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581105#M202445</link>
      <description>&lt;P&gt;it would be something like : source=WinEventLog:Security EventCode=4624 (Logon_Type=2 OR Logon_Type=10) , I dont need to log in the service user , at the moment I have 6 machines connected to splunk and I want an alert to be sent when a user is logged in more than 12 hours .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 14:39:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581105#M202445</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-14T14:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581107#M202446</link>
      <description>&lt;LI-CODE lang="markup"&gt;01/14/2022 09:47:17 AM
LogName=Security
EventCode=4624
EventType=0
ComputerName=2R4EHQA
SourceName=Microsoft Windows security auditing.
Type=Information
RecordNumber=166686450
Keywords=Audit Success
TaskCategory=Logon
OpCode=Info
Message=An account was successfully logged on.

Subject:
	Security ID:		NT AUTHORITY\SYSTEM
	Account Name:		2R4EHQA$
	Account Domain:		WGG25TJD3
	Logon ID:		0x3E7

Logon Information:
	Logon Type:		10
	Restricted Admin Mode:	No
	Virtual Account:		No
	Elevated Token:		No

Impersonation Level:		Impersonation

New Logon:
	Security ID:		2R4EHQA\admin
	Account Name:		admin
	Account Domain:		2R4EHQA
	Logon ID:		0x10B4B3F587
	Linked Logon ID:		0x10B4B3F54B
	Network Account Name:	-
	Network Account Domain:	-
	Logon GUID:		{00000000-0000-0000-0000-000000000000}

Process Information:
	Process ID:		0x914
	Process Name:		C:\Windows\System32\svchost.exe

Network Information:
	Workstation Name:	SV00001-2R4EHQA
	Source Network Address:	192.168.2.11
	Source Port:		0

Detailed Authentication Information:
	Logon Process:		User32 
	Authentication Package:	Negotiate
	Transited Services:	-
	Package Name (NTLM only):	-
	Key Length:		0&lt;/LI-CODE&gt;&lt;P&gt;this is a result of search query :&amp;nbsp;source=WinEventLog:Security EventCode=4624 (Logon_Type=2 OR Logon_Type=10)&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 14:50:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581107#M202446</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-14T14:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581124#M202452</link>
      <description>&lt;P&gt;And which event tells you they have logged off or disconnected?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 16:09:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581124#M202452</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-01-14T16:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581128#M202455</link>
      <description>&lt;P&gt;thats the thing they didnt logoff , they are still connected . so now -12h&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 16:15:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581128#M202455</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-14T16:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581133#M202457</link>
      <description>&lt;P&gt;But presumably you want to ignore those who have logged off? So, how do you find which those are?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 16:56:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581133#M202457</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-01-14T16:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581134#M202458</link>
      <description>&lt;P&gt;Not sure , I just started with splunk and have little knowledge . that s why I was asking for help .&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 16:59:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581134#M202458</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-14T16:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581138#M202459</link>
      <description>&lt;P&gt;Finding things that don't exist is not one of Splunk's strong suits - Splunk is merely a tool to help you analyse your data - knowledge of your data is by far the most important thing to grasp. Having said that, in order to find what is missing, e.g. a log off event, you need to find the log on events and remove all the log on events which do have corresponding log off events, so that you are left with log on events which don't have log off events, bearing in mind that you might well have disconnect events in your data, which might effectively serve the same purpose as log off events (it depends what you have in your data!).&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 17:28:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581138#M202459</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-01-14T17:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581140#M202460</link>
      <description>&lt;P&gt;thats the thing . there is no log off event , the user logs on and we can find out that by the query i shared . The question is how to calculate the time of logging +12 hours thats where I needed help . but I think I found some queries in&amp;nbsp;&lt;A href="https://gosplunk.com/" target="_blank"&gt;https://gosplunk.com/&lt;/A&gt;&amp;nbsp;that will help me find out a way , thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 17:37:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581140#M202460</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-14T17:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581142#M202461</link>
      <description>&lt;P&gt;Try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| eval plus12h=relative_time(_time,"+12h")&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 14 Jan 2022 17:44:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581142#M202461</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-01-14T17:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581144#M202462</link>
      <description>&lt;P&gt;I will , Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 17:51:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581144#M202462</guid>
      <dc:creator>websplunk01</dc:creator>
      <dc:date>2022-01-14T17:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581149#M202463</link>
      <description>&lt;P&gt;I think that this is the hardest part of this case. Maybe this helps you&amp;nbsp;&lt;A href="https://superuser.com/questions/1614690/how-to-find-when-a-user-is-started-and-ended-a-session-on-computer-based-on-wind" target="_blank"&gt;https://superuser.com/questions/1614690/how-to-find-when-a-user-is-started-and-ended-a-session-on-computer-based-on-wind&lt;/A&gt;&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 18:30:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581149#M202463</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2022-01-14T18:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: User Account Logged On For More Than 12 Hours</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581550#M202597</link>
      <description>&lt;P&gt;Try this. Since your environment is small, it should work well -- there's a lot of different corner cases with large complex environments that makes things more complicated.&lt;BR /&gt;&lt;BR /&gt;In addition to logon type 2, and 10, you should include 7 for unlocking a existing session, and 11 for local logins using cached credentials.&lt;/P&gt;&lt;P&gt;As for calculating when a session ends, this is the tricky part. You can look for EventCode 4657 (user initiated logoff), 4779 (terminal/rdp disconnect), and 4800 for locked screen.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;To calculate active sessions with no logoff events, we will rely on orphaned transactions and use the current time to calculate session length.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source=WinEventLog:Security (EventCode=4647 OR EventCode=4779 OR EventCode=4800 OR (EventCode=4624 AND (Logon_Type=2 OR Logon_Type=7 OR Logon_Type=10 OR Logon_Type=11))) earliest=-18h@h
| eval event_type=CASE(EventCode=4624, "logon", EventCode=4779 OR EventCode=4800 OR EventCode=4647, "logoff") | eval user=LOWER(user)
| dedup host user event_type
| transaction host user keeporphans=1 unifyends=1 maxspan=24h maxopentxn=10000 startswith=(event_type=logon) endswith=(event_type=logoff) 
| eval current_status=IF(event_type="logoff", "inactive", "active")
| eval duration_secs=IF(event_type="logoff", duration, now()-_time)
| eval duration_hours=ROUND(duration_secs/3600, 2)
| table _time duration_hours duration_secs host user EventCode Logon_Type event_type current_status
| where duration_hours&amp;gt;12&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jan 2022 20:23:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-Account-Logged-On-For-More-Than-12-Hours/m-p/581550#M202597</guid>
      <dc:creator>johnhuang</dc:creator>
      <dc:date>2022-01-18T20:23:16Z</dc:date>
    </item>
  </channel>
</rss>

