<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Identifying Authentication Irregularities in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29439#M5942</link>
    <description>&lt;P&gt;I've been tasked with searching for authentication irregularities and I am fairly new to splunk. Authentication irregularities is fairly broad and so I am wondering if the splunk community has any suggestions! Thanks in advance. And if you were wondering, yes I have read the manual already.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jun 2011 16:30:44 GMT</pubDate>
    <dc:creator>ryangibson99</dc:creator>
    <dc:date>2011-06-16T16:30:44Z</dc:date>
    <item>
      <title>Identifying Authentication Irregularities</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29439#M5942</link>
      <description>&lt;P&gt;I've been tasked with searching for authentication irregularities and I am fairly new to splunk. Authentication irregularities is fairly broad and so I am wondering if the splunk community has any suggestions! Thanks in advance. And if you were wondering, yes I have read the manual already.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2011 16:30:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29439#M5942</guid>
      <dc:creator>ryangibson99</dc:creator>
      <dc:date>2011-06-16T16:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying Authentication Irregularities</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29440#M5943</link>
      <description>&lt;P&gt;Here are a couple of examples.  Searches are sometimes specific to certain data or field extractions, so you probably won't get too many that will just work right off the bat for you, but these should give you some ideas.&lt;/P&gt;

&lt;P&gt;For SSH logins: show me cases where there were at least 6 failed logins followed by a successful login (i.e. possible brute force login attack)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"failed password" OR "accepted password" | stats list(sshd_action) as list by host, user | eval list = mvjoin(list, " ") | eval alert = if(match(list, "Accepted (?:Failed\s?){6,}"), "True", "False") | where alert == "True"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Nice for a chart of the count of failed logins per user vs. the avg number of failed logins per user&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(failed password) OR (logon failed) | stats count by user, host | eventstats avg(count) as avg | fields user, avg, count
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 Jun 2011 01:26:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29440#M5943</guid>
      <dc:creator>mw</dc:creator>
      <dc:date>2011-06-17T01:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying Authentication Irregularities</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29441#M5944</link>
      <description>&lt;P&gt;MW thanks so much, I am pretty new to Splunk this really helped.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2011 18:24:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29441#M5944</guid>
      <dc:creator>ryangibson99</dc:creator>
      <dc:date>2011-06-17T18:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying Authentication Irregularities</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29442#M5945</link>
      <description>&lt;P&gt;MV,&lt;/P&gt;

&lt;P&gt;Running the chart of the count of failed logins per user vs. the avg number of failed logins per user search query, but I'm getting the same output in the average column for every user. Is that correct?&lt;/P&gt;

&lt;P&gt;I'm seeing the following:&lt;/P&gt;

&lt;P&gt;USER     AVG            COUNT&lt;BR /&gt;
UserA   1.208333    3&lt;BR /&gt;&lt;BR /&gt;
UserB   1.208333    2&lt;BR /&gt;
UserC   1.208333    1&lt;BR /&gt;
etc&lt;/P&gt;

&lt;P&gt;Thx&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 17:04:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Identifying-Authentication-Irregularities/m-p/29442#M5945</guid>
      <dc:creator>jwalzerpitt</dc:creator>
      <dc:date>2015-04-17T17:04:39Z</dc:date>
    </item>
  </channel>
</rss>

