<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create an Alert on disabled AD accounts being re-enabled? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-Alert-on-disabled-AD-accounts-being-re-enabled/m-p/601552#M209354</link>
    <description>&lt;P&gt;How long back are you looking to detect when an account was disabled?&lt;/P&gt;&lt;P&gt;I've found a query that may suit your needs&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;EventCode=4725 OR EventCode=4722 earliest=-60d
|eval account=mvindex(Account_Name,1)
|stats values(_time) as times, earliest(EventCode) as firstEvent, latest(EventCode) as lastEvent by account
|replace "4722" with "enabled" in firstEvent, lastEvent
|replace "4725" with "disabled" in firstEvent, lastEvent
|search account != "*\$" AND firstEvent != "enabled" AND lastEvent != "disabled"
|convert ctime(times)
|table times, firstEvent, lastEvent, account&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Jun 2022 13:43:27 GMT</pubDate>
    <dc:creator>Stefanie</dc:creator>
    <dc:date>2022-06-13T13:43:27Z</dc:date>
    <item>
      <title>How to create an Alert on disabled AD accounts being re-enabled?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-Alert-on-disabled-AD-accounts-being-re-enabled/m-p/601371#M209296</link>
      <description>&lt;P&gt;Does anyone have experience writing a query that can be used to alert on disabled AD accounts being re-enabled? I've learned that Windows EventCode 4722 can be used to find accounts being enabled, but I'm unsure of how to correlate that with whether or not the account was in a disabled state beforehand.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 15:30:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-Alert-on-disabled-AD-accounts-being-re-enabled/m-p/601371#M209296</guid>
      <dc:creator>eblackburn</dc:creator>
      <dc:date>2022-06-10T15:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an Alert on disabled AD accounts being re-enabled?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-Alert-on-disabled-AD-accounts-being-re-enabled/m-p/601552#M209354</link>
      <description>&lt;P&gt;How long back are you looking to detect when an account was disabled?&lt;/P&gt;&lt;P&gt;I've found a query that may suit your needs&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;EventCode=4725 OR EventCode=4722 earliest=-60d
|eval account=mvindex(Account_Name,1)
|stats values(_time) as times, earliest(EventCode) as firstEvent, latest(EventCode) as lastEvent by account
|replace "4722" with "enabled" in firstEvent, lastEvent
|replace "4725" with "disabled" in firstEvent, lastEvent
|search account != "*\$" AND firstEvent != "enabled" AND lastEvent != "disabled"
|convert ctime(times)
|table times, firstEvent, lastEvent, account&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jun 2022 13:43:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-Alert-on-disabled-AD-accounts-being-re-enabled/m-p/601552#M209354</guid>
      <dc:creator>Stefanie</dc:creator>
      <dc:date>2022-06-13T13:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an Alert on disabled AD accounts being re-enabled?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-Alert-on-disabled-AD-accounts-being-re-enabled/m-p/602285#M209640</link>
      <description>&lt;P&gt;That's really helpful. Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 19:58:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-Alert-on-disabled-AD-accounts-being-re-enabled/m-p/602285#M209640</guid>
      <dc:creator>eblackburn</dc:creator>
      <dc:date>2022-06-17T19:58:53Z</dc:date>
    </item>
  </channel>
</rss>

