<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to separate name in stats for local discovered accounts? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-name-in-stats-for-local-discovered-accounts/m-p/606631#M210981</link>
    <description>&lt;P&gt;I'm not that much of an expert on Windows but your search most probably simply returns list of changed accounts. Since Windows uses account for machines as well, you're getting them in the results. It's not about Splunk but about how you distinguish user accounts from the machine accounts. If I remember correctly, the machine accounts have a dollar sign at the end (or at the beginning?). Filtering them out should do the trick then.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Jul 2022 09:27:18 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2022-07-22T09:27:18Z</dc:date>
    <item>
      <title>How to separate name in stats for local discovered accounts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-name-in-stats-for-local-discovered-accounts/m-p/606576#M210964</link>
      <description>&lt;P&gt;Any advice on this search? Although it simply produces what I need, it also lumps the system name with it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;index=main s LogName=Security EventCode=4738 Account_Name="*"| table Account_Name | dedup Account_Name&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 00:44:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-name-in-stats-for-local-discovered-accounts/m-p/606576#M210964</guid>
      <dc:creator>Minasdad</dc:creator>
      <dc:date>2022-07-22T00:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate name in stats for local discovered accounts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-name-in-stats-for-local-discovered-accounts/m-p/606620#M210979</link>
      <description>&lt;P&gt;What is your expected output? &amp;nbsp;What is the difference between a "system name" and a "local discovered account"? &amp;nbsp;Remember, this is a Splunk board. &amp;nbsp;Most people have no knowledge about your specific data even if LogName=Security may seem obvious to you.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 08:22:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-name-in-stats-for-local-discovered-accounts/m-p/606620#M210979</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2022-07-22T08:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to separate name in stats for local discovered accounts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-separate-name-in-stats-for-local-discovered-accounts/m-p/606631#M210981</link>
      <description>&lt;P&gt;I'm not that much of an expert on Windows but your search most probably simply returns list of changed accounts. Since Windows uses account for machines as well, you're getting them in the results. It's not about Splunk but about how you distinguish user accounts from the machine accounts. If I remember correctly, the machine accounts have a dollar sign at the end (or at the beginning?). Filtering them out should do the trick then.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 09:27:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-separate-name-in-stats-for-local-discovered-accounts/m-p/606631#M210981</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2022-07-22T09:27:18Z</dc:date>
    </item>
  </channel>
</rss>

