<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: using the result  of a first search in entry of a secon search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610502#M212321</link>
    <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt; for your answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AS you can see in the command line below. Firstable I search for all the computers which using ntlmv1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="windows" AND (host="toto")  Authentication_Package=NTLM Account_Domain!="NT AUTHORITY" Package_Name__NTLM_only_="NTLM V1" &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets say that the result of this research give me those 3 computers name&lt;/P&gt;&lt;P&gt;ComputerA&lt;/P&gt;&lt;P&gt;ComputerB&lt;/P&gt;&lt;P&gt;Computer C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to put this result (this 3 computer) in this command line&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="windows" AND (host="toto")  Authentication_Package=NTLM Account_Domain!="NT AUTHORITY" Package_Name__NTLM_only_="NTLM V2" &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;to check if these 3 computers are also using ntlmv2. I want to know if one or more of these computers do not show up after the second search. This way, I will know that computerX never used NTLMV2.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;At the end of my search, I want to know the names of the computers that only use NTLMV1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for my english.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Aug 2022 14:37:02 GMT</pubDate>
    <dc:creator>darphboubou</dc:creator>
    <dc:date>2022-08-23T14:37:02Z</dc:date>
    <item>
      <title>How to use the result  of a first search in entry of a second search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610461#M212304</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to get the servers who use only ntlmv1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So in a first search I using this command&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index="windows" EventCode=4624  AND(host="*-toto")   Authentication_Package=NTLM Package_Name__NTLM_only_="NTLM V1" &lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to inject the result of this search in a second command line to retrieve the server which using ntlmV2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At the end of those search i Want to get the server that only uses NTLMV1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I proceed ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 13:55:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610461#M212304</guid>
      <dc:creator>darphboubou</dc:creator>
      <dc:date>2022-08-23T13:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610492#M212316</link>
      <description>&lt;P&gt;It depends on what needs to be passed from the first search to the second, how the passed fields will be used, and what the desired results are.&lt;/P&gt;&lt;P&gt;In general, it's like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;&amp;lt;second search&amp;gt;&amp;gt; [ &amp;lt;&amp;lt;first search&amp;gt;&amp;gt; ]&lt;/LI-CODE&gt;&lt;P&gt;The results of the first search are appended to the second search in &lt;FONT face="courier new,courier"&gt;(foo=bar OR baz=fubar)&lt;/FONT&gt; format.&lt;/P&gt;&lt;P&gt;Tell us more about the problem you're trying to solve and we can be more specific.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 13:43:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610492#M212316</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-08-23T13:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610502#M212321</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt; for your answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AS you can see in the command line below. Firstable I search for all the computers which using ntlmv1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="windows" AND (host="toto")  Authentication_Package=NTLM Account_Domain!="NT AUTHORITY" Package_Name__NTLM_only_="NTLM V1" &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets say that the result of this research give me those 3 computers name&lt;/P&gt;&lt;P&gt;ComputerA&lt;/P&gt;&lt;P&gt;ComputerB&lt;/P&gt;&lt;P&gt;Computer C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to put this result (this 3 computer) in this command line&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="windows" AND (host="toto")  Authentication_Package=NTLM Account_Domain!="NT AUTHORITY" Package_Name__NTLM_only_="NTLM V2" &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;to check if these 3 computers are also using ntlmv2. I want to know if one or more of these computers do not show up after the second search. This way, I will know that computerX never used NTLMV2.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;At the end of my search, I want to know the names of the computers that only use NTLMV1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for my english.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 14:37:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610502#M212321</guid>
      <dc:creator>darphboubou</dc:creator>
      <dc:date>2022-08-23T14:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610509#M212325</link>
      <description>&lt;P&gt;That's different.&amp;nbsp; We can just merge the two searches to get a list of computers that only use NTLMV1.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="windows" AND (host="toto")  Authentication_Package=NTLM Account_Domain!="NT AUTHORITY" (Package_Name__NTLM_only_="NTLM V1" OR
Package_Name__NTLM_only_="NTLM V2")
| stats values(Package_Name__NTLM_only_) as Package_Name__NTLM_only_ by ComputerName
| where (mvcount(Package_Name__NTLM_only_)=1 AND Package_Name__NTLM_only_="NTLM V1")&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 23 Aug 2022 15:06:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610509#M212325</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-08-23T15:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610610#M212361</link>
      <description>&lt;P class="lia-align-justify"&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp; Perfect &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 06:03:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/610610#M212361</guid>
      <dc:creator>darphboubou</dc:creator>
      <dc:date>2022-08-24T06:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612573#M212982</link>
      <description>&lt;P&gt;HOw can I add the Host in the table given by the request. I'm enable to show host field in the result actually&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="windows"  EventCode=4624 AND (host=*)  Authentication_Package=NTLM Account_Domain!="NT AUTHORITY" (Package_Name__NTLM_only_="NTLM V1" OR
Package_Name__NTLM_only_="NTLM V2")
| stats values(Package_Name__NTLM_only_) as Package_Name__NTLM_only_ by Workstation_Name
| where (mvcount(Package_Name__NTLM_only_)=1 AND Package_Name__NTLM_only_="NTLM V1")
| join type=left Workstation_Name [ search index=bel_ldapsearch AND (type=server) earliest=-1d@d latest=@d | table name operatingSystem | rename name as Workstation_Name operatingSystem as os]
| table Workstation_Name Package_Name__NTLM_only_  os 
| where isnotnull(os)
| sort Workstation_Name&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 12:52:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612573#M212982</guid>
      <dc:creator>darphboubou</dc:creator>
      <dc:date>2022-09-09T12:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612576#M212983</link>
      <description>&lt;P&gt;Do you want to show the Host field or host field (they're different)?&amp;nbsp; In which index is the Host field stored (host is in all indexes)?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 13:03:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612576#M212983</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-09-09T13:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612581#M212984</link>
      <description>&lt;P&gt;host field&amp;nbsp; and it's in the windows index&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="host.png" style="width: 625px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/21406i4C5C6B1B2EE03719/image-size/large?v=v2&amp;amp;px=999" role="button" title="host.png" alt="host.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 13:41:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612581#M212984</guid>
      <dc:creator>darphboubou</dc:creator>
      <dc:date>2022-09-09T13:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: using the result  of a first search in entry of a secon search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612583#M212985</link>
      <description>&lt;P&gt;The challenge with using the host field from the windows index is the &lt;FONT face="courier new,courier"&gt;stats&lt;/FONT&gt; command does not provide that field.&amp;nbsp; The command would have to be changed to include the field so it can be added to subsequent table commands for display.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="windows"  EventCode=4624 AND (host=*)  Authentication_Package=NTLM Account_Domain!="NT AUTHORITY" (Package_Name__NTLM_only_="NTLM V1" OR
Package_Name__NTLM_only_="NTLM V2")
| stats values(Package_Name__NTLM_only_) as Package_Name__NTLM_only_ ***values(host) as host*** by Workstation_Name
| where (mvcount(Package_Name__NTLM_only_)=1 AND Package_Name__NTLM_only_="NTLM V1")
| join type=left Workstation_Name [ search index=bel_ldapsearch AND (type=server) earliest=-1d@d latest=@d | table name operatingSystem | rename name as Workstation_Name operatingSystem as os]
| table Workstation_Name Package_Name__NTLM_only_  os ***host***
| where isnotnull(os)
| sort Workstation_Name&lt;/LI-CODE&gt;&lt;P&gt;I used &lt;FONT face="courier new,courier"&gt;***&lt;/FONT&gt; to indicate new code.&amp;nbsp; Remove them before running the query.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 14:18:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-the-result-of-a-first-search-in-entry-of-a-second/m-p/612583#M212985</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-09-09T14:18:00Z</dc:date>
    </item>
  </channel>
</rss>

