<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Account locked in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707371#M239269</link>
    <description>&lt;P&gt;It depends on what information you have ingested into your Splunk environment.&lt;/P&gt;&lt;P&gt;Splunk is "just" a data processing tool. You have to feed it with data. If you have your AD logs in Splunk, you can search them but while there might be some people around here who have more experience with MS systems, it's generally more of a AD-related question how to find that info than it is a Splunk Question. You must know what to look for.&lt;/P&gt;&lt;P&gt;If your data is properly onboarded and CIM-compliant, you can look through Change datamodel (if I remember the syntax correctly)&lt;/P&gt;&lt;PRE&gt;| datamodel Change Account_Management.Locked_Accounts | search user="whatever"&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;I'm not sure though if it will only find the lockout event as such or will it contain the reason as well.&lt;/P&gt;</description>
    <pubDate>Fri, 20 Dec 2024 10:59:18 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2024-12-20T10:59:18Z</dc:date>
    <item>
      <title>Account locked</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707351#M239259</link>
      <description>&lt;P&gt;there is a user lets say ABC and I want to check why his AD account is locked .&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 05:14:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707351#M239259</guid>
      <dc:creator>SN1</dc:creator>
      <dc:date>2024-12-20T05:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Account locked</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707363#M239264</link>
      <description>&lt;P&gt;What information do you have available to you to help you determine this?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 09:43:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707363#M239264</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-12-20T09:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: Account locked</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707364#M239265</link>
      <description>&lt;P&gt;there is a user , he is saying his account is locked i want to check using splunk what is the cause how can i do that&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 09:45:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707364#M239265</guid>
      <dc:creator>SN1</dc:creator>
      <dc:date>2024-12-20T09:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: Account locked</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707367#M239266</link>
      <description>&lt;P&gt;What information do you have in Splunk? Which system is the user locked out of?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 10:03:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707367#M239266</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-12-20T10:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: Account locked</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707368#M239267</link>
      <description>&lt;P&gt;His AD account , windows system&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 10:04:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707368#M239267</guid>
      <dc:creator>SN1</dc:creator>
      <dc:date>2024-12-20T10:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: Account locked</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707370#M239268</link>
      <description>&lt;P&gt;OK, so what information do you have in Splunk?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 10:55:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707370#M239268</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-12-20T10:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: Account locked</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707371#M239269</link>
      <description>&lt;P&gt;It depends on what information you have ingested into your Splunk environment.&lt;/P&gt;&lt;P&gt;Splunk is "just" a data processing tool. You have to feed it with data. If you have your AD logs in Splunk, you can search them but while there might be some people around here who have more experience with MS systems, it's generally more of a AD-related question how to find that info than it is a Splunk Question. You must know what to look for.&lt;/P&gt;&lt;P&gt;If your data is properly onboarded and CIM-compliant, you can look through Change datamodel (if I remember the syntax correctly)&lt;/P&gt;&lt;PRE&gt;| datamodel Change Account_Management.Locked_Accounts | search user="whatever"&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;I'm not sure though if it will only find the lockout event as such or will it contain the reason as well.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 10:59:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Account-locked/m-p/707371#M239269</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-12-20T10:59:18Z</dc:date>
    </item>
  </channel>
</rss>

