<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188427#M54282</link>
    <description>&lt;P&gt;Well obviously &lt;CODE&gt;EventIdentifier&lt;/CODE&gt; is a field so some fields are being created.  What do you get from this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; EventIdentifier=4624 | stats first(*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will show you what fields do exist.  Perhaps this field is being extracted as &lt;CODE&gt;Name&lt;/CODE&gt; instead of &lt;CODE&gt;Workstation Name&lt;/CODE&gt;.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Jul 2015 20:44:20 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2015-07-01T20:44:20Z</dc:date>
    <item>
      <title>Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188424#M54279</link>
      <description>&lt;P&gt;I want to start out with: EventIdentifier=4624 | AnomalousValue "Workstation Name"&lt;BR /&gt;
...but this search returns an error. What am I doing wrong here? It's like Splunk doesn't know what the "Workstation Name" field is.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2015 19:12:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188424#M54279</guid>
      <dc:creator>ajmb</dc:creator>
      <dc:date>2015-07-01T19:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188425#M54280</link>
      <description>&lt;P&gt;Are you sure that it is a field?  If it is, this will work, if not you need to make the field exist:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventIdentifier=4624 | anomalousvalue $Workstation Name$
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 01 Jul 2015 19:24:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188425#M54280</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-01T19:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188426#M54281</link>
      <description>&lt;P&gt;Well that doesn't work so I guess it isn't a 'field'. This is annoying and confusing.&lt;/P&gt;

&lt;P&gt;The event data has a section like this...&lt;/P&gt;

&lt;P&gt;Network Information:&lt;BR /&gt;
     Workstation Name:                  TestClientPc&lt;BR /&gt;
     Source Network Address:       192.168.1.247&lt;BR /&gt;
     Source Port:                               52404&lt;/P&gt;

&lt;P&gt;So what the heck do I do here? Is this something I have to use eval() for?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2015 19:44:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188426#M54281</guid>
      <dc:creator>ajmb</dc:creator>
      <dc:date>2015-07-01T19:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188427#M54282</link>
      <description>&lt;P&gt;Well obviously &lt;CODE&gt;EventIdentifier&lt;/CODE&gt; is a field so some fields are being created.  What do you get from this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; EventIdentifier=4624 | stats first(*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will show you what fields do exist.  Perhaps this field is being extracted as &lt;CODE&gt;Name&lt;/CODE&gt; instead of &lt;CODE&gt;Workstation Name&lt;/CODE&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2015 20:44:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188427#M54282</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-01T20:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188428#M54283</link>
      <description>&lt;P&gt;It returned the field as Workstation_Name, but I've tried:&lt;/P&gt;

&lt;P&gt;EventIdentifier=4624 | ...&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;AnomalousValue 'Workstation_Name'&lt;/LI&gt;
&lt;LI&gt;AnomalousValue "Workstation_Name"&lt;/LI&gt;
&lt;LI&gt;AnomalousValue $Workstation_Name"&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;every single one of these returns "Error in 'anomalousvalue' command: found no qualifying results. Please verify that the field names are correct"&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2015 21:18:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188428#M54283</guid>
      <dc:creator>ajmb</dc:creator>
      <dc:date>2015-07-01T21:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188429#M54284</link>
      <description>&lt;P&gt;Based on your clarification, this should work:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EventIdentifier=4624 | anomalousvalue Workstation_Name
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 01 Jul 2015 21:29:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188429#M54284</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-01T21:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Search for Windows logon events for usernames matching a pattern with anomalousvalue Workstation Name</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188430#M54285</link>
      <description>&lt;P&gt;Did this work?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2015 04:44:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-for-Windows-logon-events-for-usernames-matching-a-pattern/m-p/188430#M54285</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-07-18T04:44:36Z</dc:date>
    </item>
  </channel>
</rss>

