<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitoring logons of domain users (EventCode 4624) in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119197#M31952</link>
    <description>&lt;P&gt;Thank you for your answer!&lt;/P&gt;

&lt;P&gt;I added "source="WinEventLog:Security" EventCode=4624 AccountName="*$" | eval user = mvindex(AccountName,1) | table _time, user".&lt;/P&gt;

&lt;P&gt;Now I recieve 3-10 same messages of successfull authentifications in 2 seconds. Is it possible to show only one message?&lt;/P&gt;</description>
    <pubDate>Tue, 18 Nov 2014 14:35:51 GMT</pubDate>
    <dc:creator>r2r2</dc:creator>
    <dc:date>2014-11-18T14:35:51Z</dc:date>
    <item>
      <title>Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119195#M31950</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;

&lt;P&gt;I have logs from Domain Controller Active Directory in Splunk and try to configure monitoring of user logons (EventCode=4624).&lt;BR /&gt;
Unfortunately, there are two fields with a name "Account Name": NAMEOFPC$ and USERACCOUNT.&lt;/P&gt;

&lt;P&gt;I`d like to make two different fields for NAMEOFPC$ and USERACCOUNT. How can I separate them?&lt;/P&gt;

&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 12:46:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119195#M31950</guid>
      <dc:creator>r2r2</dc:creator>
      <dc:date>2014-11-18T12:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119196#M31951</link>
      <description>&lt;P&gt;Hello r2r2,&lt;/P&gt;

&lt;P&gt;The mvindex function of the EVAL command will perform exactly what you want.&lt;/P&gt;

&lt;P&gt;Try this.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventCode=4624 | eval Subject_Account_Name = mvindex(Account_Name,0) | eval New_Logon_Account_Name = mvindex(Account_Name,1)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Break down of the search.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;EventCode=4624&lt;/CODE&gt;,  The Windows Event Log you are looking for.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| eval Subject_Account_Name = mvindex(Account_Name,0)&lt;/CODE&gt;  The first eval creates the field name Subject_Account_Name (you can name this field anything you want).  The &lt;CODE&gt;mvindex&lt;/CODE&gt; function with a value of zero, finds the first occurrence of Account_Name.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;| eval New_Logon_Account_Name = mvindex(Account_Name,1)&lt;/CODE&gt; The second eval creates the field name New_Logon_Account_Name (again, you can name this field anything you want).  The &lt;CODE&gt;mvindex&lt;/CODE&gt; function with a value of 1, finds the second occurrence of Account_Name.&lt;/P&gt;

&lt;P&gt;You will find in Windows Event Logs, there are many duplicate field names in a single event.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:12:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119196#M31951</guid>
      <dc:creator>sjaworski</dc:creator>
      <dc:date>2020-09-28T18:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119197#M31952</link>
      <description>&lt;P&gt;Thank you for your answer!&lt;/P&gt;

&lt;P&gt;I added "source="WinEventLog:Security" EventCode=4624 AccountName="*$" | eval user = mvindex(AccountName,1) | table _time, user".&lt;/P&gt;

&lt;P&gt;Now I recieve 3-10 same messages of successfull authentifications in 2 seconds. Is it possible to show only one message?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 14:35:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119197#M31952</guid>
      <dc:creator>r2r2</dc:creator>
      <dc:date>2014-11-18T14:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119198#M31953</link>
      <description>&lt;P&gt;You might want to filter on Logon_Type ... in addition ... different Logon_Types ... different meaning.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:12:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119198#M31953</guid>
      <dc:creator>lmyrefelt</dc:creator>
      <dc:date>2020-09-28T18:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119199#M31954</link>
      <description>&lt;P&gt;Good Point Imyrefelt.&lt;/P&gt;

&lt;P&gt;A lookup table will come in handy here.&lt;/P&gt;

&lt;P&gt;Create a CSV file that looks like this save the file name as logontypedesc.csv&lt;BR /&gt;
Descriptions courtesy of &lt;A href="http://www.ultimatewindowssecurity.com" target="_blank"&gt;www.ultimatewindowssecurity.com&lt;/A&gt; Win Security Log Quick Ref.&lt;/P&gt;

&lt;P&gt;2,Interactive (logon at keyboard and screen of system)&lt;BR /&gt;
3,Network(i.e. mapped drive)&lt;BR /&gt;
4,Batch(i.e. schedule task)&lt;BR /&gt;
5,Service(service startup)&lt;BR /&gt;
7,Unlock (i.e. unattended workstation with password protected screen saver)&lt;BR /&gt;
8,Network Cleartext (Most often indicates a logon to IIS with "basic authentication")&lt;BR /&gt;
9,NewCredentials such as with RunAs or mapping a network drive with alternate credentials&lt;BR /&gt;
10,Remote Desktop (Terminal Services; Remote Desktop or Remote Assistance)&lt;BR /&gt;
11,Logon with cached credentials&lt;/P&gt;

&lt;P&gt;Create Lookup Table files&lt;BR /&gt;
Choose Destination app, most likely search,&lt;BR /&gt;
Upload the csv file to Lookup table files&lt;BR /&gt;
Make the destination file name logontypedesc.csv&lt;/P&gt;

&lt;P&gt;Create Lookup Definition. &lt;BR /&gt;
Choose Destination app, most likely search, &lt;BR /&gt;
Name it winlogontypedesc,&lt;BR /&gt;&lt;BR /&gt;
Make Type File-based and the Lookup file should point to logontypedesc.csv, &lt;/P&gt;

&lt;P&gt;Make the lookup Automatic.&lt;BR /&gt;&lt;BR /&gt;
Choose your Destination app, most likely search,&lt;BR /&gt;
Name it winlogontypedesc&lt;BR /&gt;
Choose lookup table winlogontypedesc&lt;BR /&gt;
Choose sourcetype, type in WinEventLog:Security (Most likely the EventCode falls under this sourcetype)&lt;BR /&gt;
Input fields should be Logon_Type = Logon_Type&lt;BR /&gt;
Output fields should be LogonTypeDesc = &lt;/P&gt;

&lt;P&gt;Perform a search, &lt;BR /&gt;
There should be a new interesting Field LogonTypeDesc showing.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:11:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119199#M31954</guid>
      <dc:creator>sjaworski</dc:creator>
      <dc:date>2020-09-28T18:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119200#M31955</link>
      <description>&lt;P&gt;r2r2,&lt;/P&gt;

&lt;P&gt;You can add | dedup _time, user between your eval and table command.&lt;/P&gt;

&lt;P&gt;However, since you are using _time in your results, dedup will only be effective if you have two events with the same time stamp and user.   If you want the time stamp in your results, you are most likely receiving accurate results.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 17:28:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119200#M31955</guid>
      <dc:creator>sjaworski</dc:creator>
      <dc:date>2014-11-18T17:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119201#M31956</link>
      <description>&lt;P&gt;There are similar logon types in all messages.&lt;/P&gt;

&lt;P&gt;I added "|dedup user" and received the right result.&lt;/P&gt;

&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2014 13:20:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119201#M31956</guid>
      <dc:creator>r2r2</dc:creator>
      <dc:date>2014-11-19T13:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119202#M31957</link>
      <description>&lt;P&gt;I have another problem - now I try to add a field from another index to my table using "join". &lt;BR /&gt;
I wrote a search &lt;CODE&gt;source="WinEventLog:Security" EventCode=4624 AccountName="*$" | eval user = mvindex(AccountName,1) |dedup user | join type=left user [index=anotherindex employeeID=*] | table _time, user, employeeID&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;But column employeeID is empty.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 14:09:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119202#M31957</guid>
      <dc:creator>r2r2</dc:creator>
      <dc:date>2014-11-20T14:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring logons of domain users (EventCode 4624)</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119203#M31958</link>
      <description>&lt;P&gt;please ask this as a separate question.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 14:27:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Monitoring-logons-of-domain-users-EventCode-4624/m-p/119203#M31958</guid>
      <dc:creator>piebob</dc:creator>
      <dc:date>2014-11-20T14:27:21Z</dc:date>
    </item>
  </channel>
</rss>

