<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to filter the subject account name in the event log below as those other than admin? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-the-subject-account-name-in-the-event-log-below-as/m-p/622405#M216346</link>
    <description>&lt;P&gt;I want to filter the Subject Account Name in the Event log below as those other than Admin. So I want to see the cases where this log appears outside of the Admin. How can I do it ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;11/29/2022 12:23:16 PM
LogName=Security
EventCode=4738
EventType=0
ComputerName=dc.windomain.local
SourceName=Microsoft Windows security auditing.
Type=Information
RecordNumber=247213
Keywords=Audit Success
TaskCategory=User Account Management
OpCode=Info
Message=A user account was changed.

Subject:
	Security ID:		S-1-5-21-4236582264-665789389-1555517817-1000
	Account Name:		Admin
	Account Domain:		WINDOMAIN
	Logon ID:		0x59B44

Target Account:
	Security ID:		S-1-5-21-4236582264-665789389-1555517817-1324
	Account Name:		aleda.billye
	Account Domain:		WINDOMAIN&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Nov 2022 14:16:21 GMT</pubDate>
    <dc:creator>realkazanova1</dc:creator>
    <dc:date>2022-11-29T14:16:21Z</dc:date>
    <item>
      <title>How to filter the subject account name in the event log below as those other than admin?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-the-subject-account-name-in-the-event-log-below-as/m-p/622405#M216346</link>
      <description>&lt;P&gt;I want to filter the Subject Account Name in the Event log below as those other than Admin. So I want to see the cases where this log appears outside of the Admin. How can I do it ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;11/29/2022 12:23:16 PM
LogName=Security
EventCode=4738
EventType=0
ComputerName=dc.windomain.local
SourceName=Microsoft Windows security auditing.
Type=Information
RecordNumber=247213
Keywords=Audit Success
TaskCategory=User Account Management
OpCode=Info
Message=A user account was changed.

Subject:
	Security ID:		S-1-5-21-4236582264-665789389-1555517817-1000
	Account Name:		Admin
	Account Domain:		WINDOMAIN
	Logon ID:		0x59B44

Target Account:
	Security ID:		S-1-5-21-4236582264-665789389-1555517817-1324
	Account Name:		aleda.billye
	Account Domain:		WINDOMAIN&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 14:16:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-the-subject-account-name-in-the-event-log-below-as/m-p/622405#M216346</guid>
      <dc:creator>realkazanova1</dc:creator>
      <dc:date>2022-11-29T14:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: Subject Account Name Filt</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-filter-the-subject-account-name-in-the-event-log-below-as/m-p/622410#M216349</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/251728"&gt;@realkazanova1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you have to run a simple search like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog EventCode=4738 Account_name!="admin"&lt;/LI-CODE&gt;&lt;P&gt;put attention if you have the Account_name field or another one.&lt;/P&gt;&lt;P&gt;If you don't have the correct field extractions, you have to install in your Search Head the Splunk_TA_Windows Add-on (&lt;A href="https://splunkbase.splunk.com/app/742" target="_blank"&gt;https://splunkbase.splunk.com/app/742&lt;/A&gt;)&amp;nbsp;to correctly parse your data.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 13:29:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-filter-the-subject-account-name-in-the-event-log-below-as/m-p/622410#M216349</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-11-29T13:29:00Z</dc:date>
    </item>
  </channel>
</rss>

