<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Index based search for user being added to multiple windows groups? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647574#M224134</link>
    <description>&lt;P&gt;Hello Folks,&lt;/P&gt;
&lt;P&gt;Needed help with index based search for any user being added to multiple windows groups (preferably more then count of 5) in a time span of 15 mins .&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Tue, 20 Jun 2023 13:41:14 GMT</pubDate>
    <dc:creator>john-doe</dc:creator>
    <dc:date>2023-06-20T13:41:14Z</dc:date>
    <item>
      <title>Index based search for user being added to multiple windows groups?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647574#M224134</link>
      <description>&lt;P&gt;Hello Folks,&lt;/P&gt;
&lt;P&gt;Needed help with index based search for any user being added to multiple windows groups (preferably more then count of 5) in a time span of 15 mins .&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 13:41:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647574#M224134</guid>
      <dc:creator>john-doe</dc:creator>
      <dc:date>2023-06-20T13:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: Index based search for user being added to multiple windows groups</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647576#M224135</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256134"&gt;@john-doe&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;at first, you have to check if your Domain Controller is logging EventCodes 4728 (A member was added to a security-enabled global group) and 4732 (A member was added to a security-enabled local group) and you're taking these EventCodes in your Splunk.&lt;/P&gt;&lt;P&gt;If yes, you can run a simple search like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog EventCode IN (4728,4732)
| stats count dc(ComputerName) AS ComputerName_count BY user
| where ComputerName_count&amp;gt;1&lt;/LI-CODE&gt;&lt;P&gt;Obviously you can choose a different threeshold in the last row.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 10:53:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647576#M224135</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-20T10:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Index based search for user being added to multiple windows groups</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647580#M224136</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I think your query will give me user added in particular groups on distinct hosts.&lt;/P&gt;&lt;P&gt;For checking if a user was added in multiple groups in15 min time span how can I modify your query ?&amp;nbsp; How can I use span or maxspan ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was working on something like this below. Not sure how to add the time factor check in there..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows EventCode IN ("4728", "4756", "4732") Subject_Account_Name !="*$" | stats count values(Group_Name) by Subject_Account_Name, Member_Security_ID | where count &amp;gt;= 20 &lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 11:32:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647580#M224136</guid>
      <dc:creator>john-doe</dc:creator>
      <dc:date>2023-06-20T11:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: Index based search for user being added to multiple windows groups</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647585#M224138</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/256134"&gt;@john-doe&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you can add the time factor:&lt;/P&gt;&lt;P&gt;if you want an alert: defining the time monitoring period, e.g. every 15 minutes using the search you shared.&lt;/P&gt;&lt;P&gt;if instead you want to trace the distinct count of Subject_Accoun_Names registered in more groups, depending on time (e.g. every hour), you could use:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=windows EventCode IN ("4728", "4756", "4732") Subject_Account_Name !="*$" 
| bin span=1h _time
| chart dc(Group_Name) AS Group_Name_count BY _time Subject_Account_Name 
| where Group_Name_count&amp;gt;= 20 &lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2023 11:56:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Index-based-search-for-user-being-added-to-multiple-windows/m-p/647585#M224138</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-06-20T11:56:40Z</dc:date>
    </item>
  </channel>
</rss>

