<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to query for MFA and SSO on network in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-query-for-MFA-and-SSO-on-network/m-p/691026#M235344</link>
    <description>&lt;P&gt;&lt;SPAN&gt;1.If you have your SSO/MFA data ingested and parsed correctly, also using Splunk's TA's most of them come with out of the box tags that can be used to search for the data type. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Simple Example - This will search for authentication data across your defined indexes - and present the results (The tags search for authentication data) You can add your sourcetypes as well&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=linux OR index=Windows OR index=my_SSO_data tag=authentication&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;You can find the tags via GUI – easy way, or inspects the TA itself (eventtypes and tags)&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;2. If you have not ingested data then you need to ensure the below.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Example &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Okta SSO / MFA - Okta would provide authentication data somewhere, in logs or API, you then need to onboard this data into Splunk, ensure there is a TA that helps with the parsing and tagging, then analyse the data, to see what it gives you and run various queries to give you the results you are looking for.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Windows Event logs normally give you authentication data, based on AD / Logon events, they also provide Azure AD/ Entra, so if you used these you again would need to ingest that data into Splunk first and then run queries.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Side note:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Using Splunk you can check with TA’s have tags for authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rest splunk_server=local services/configs/conf-tags
| rename eai:acl.app AS app, title AS tag
| table app tag authentication&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;This will show you the eventtypes which are associated with tags&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rest splunk_server=local services/configs/conf-eventtypes
| rename eai:acl.app AS app, title AS eventtype
| table app search eventtype&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jun 2024 16:20:27 GMT</pubDate>
    <dc:creator>deepakc</dc:creator>
    <dc:date>2024-06-18T16:20:27Z</dc:date>
    <item>
      <title>How to query for MFA and SSO on network</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-query-for-MFA-and-SSO-on-network/m-p/690995#M235330</link>
      <description>&lt;P&gt;&lt;EM&gt;Thank you everyone for taking the time to ready this. I am new in Splunk and interested in learning more. I have a project at home, and this has to do with viewing authentication traffic on a given network&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;The challenge I face:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I need to view what authentication method is being used to access what resource on the network for a giving index and sourcetype. For example, Windows systems do not have an attribute solo representing if the access to the Nod was SSO or MFA all I get is an event ID 4624.&amp;nbsp;&lt;A href="https://www.manageengine.com/products/active-directory-audit/kb/windows-security-log-event-id-4624.html#:~:text=Event%20ID%204624%20(viewed%20in,4625%20documents%20failed%20logon%20attempts." target="_blank"&gt;Windows Event ID 4624, successful logon — Dummies guide, 3 minute read (manageengine.com)&lt;/A&gt;&amp;nbsp;My understanding is that I have to gather a few attributes and make an educated guess about what access was used. I was hoping to find a one liner lol that will show me what resource is using what authentication method. Any help would be appreciated and virtual drinks on me if we strike gold &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 14:02:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-query-for-MFA-and-SSO-on-network/m-p/690995#M235330</guid>
      <dc:creator>sgtwolf1</dc:creator>
      <dc:date>2024-06-18T14:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to query for MFA and SSO on network</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-query-for-MFA-and-SSO-on-network/m-p/691026#M235344</link>
      <description>&lt;P&gt;&lt;SPAN&gt;1.If you have your SSO/MFA data ingested and parsed correctly, also using Splunk's TA's most of them come with out of the box tags that can be used to search for the data type. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Simple Example - This will search for authentication data across your defined indexes - and present the results (The tags search for authentication data) You can add your sourcetypes as well&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=linux OR index=Windows OR index=my_SSO_data tag=authentication&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;You can find the tags via GUI – easy way, or inspects the TA itself (eventtypes and tags)&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;2. If you have not ingested data then you need to ensure the below.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Example &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Okta SSO / MFA - Okta would provide authentication data somewhere, in logs or API, you then need to onboard this data into Splunk, ensure there is a TA that helps with the parsing and tagging, then analyse the data, to see what it gives you and run various queries to give you the results you are looking for.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Windows Event logs normally give you authentication data, based on AD / Logon events, they also provide Azure AD/ Entra, so if you used these you again would need to ingest that data into Splunk first and then run queries.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Side note:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Using Splunk you can check with TA’s have tags for authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rest splunk_server=local services/configs/conf-tags
| rename eai:acl.app AS app, title AS tag
| table app tag authentication&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;This will show you the eventtypes which are associated with tags&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rest splunk_server=local services/configs/conf-eventtypes
| rename eai:acl.app AS app, title AS eventtype
| table app search eventtype&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 16:20:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-query-for-MFA-and-SSO-on-network/m-p/691026#M235344</guid>
      <dc:creator>deepakc</dc:creator>
      <dc:date>2024-06-18T16:20:27Z</dc:date>
    </item>
  </channel>
</rss>

