<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do I edit my report on inventory of systems to get my expected output? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236653#M70311</link>
    <description>&lt;P&gt;Looks like Splunk could be very useful in performing an inventory of systems.  I have a report that runs with these parameters:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Src_IP="10.3.30.*" | stats dc(Src_IP) as Src_IP by Security_ID Src_IP | sort src_IP  ( *Run this with a time frame of TODAY*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It works pretty good and is usable, but I was wondering if some of you long time Splunkers could help me refine it.  My output is currently:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;MyDomain\System1      10.3.30.15
MyDomain\FSmith       10.3.30.15
NULL SID              10.3.30.15
MyDomian\System2      10.3.30.20
MyDomain\BJones       10.3.30.20
NULL SID              10.3.30.20
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So this lets me know that FSmith is using System1 and through a couple of days of checking I can reasonably surmise that FSmith is the dominate user of this system. Same with BJones and System2.  How can I make it avoid the NULL SID entry?  Is there a way to make it produce output like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;MyDomain\System1    FSmith    10.3.30.15
MyDomian\System2    BJones    10.3.30.20 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or better yet &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;System1  FSmith   10.3.30.15
System2  Bjones   10.3.30.20
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;These systems are remote, so I can't just walk over and do a visual inventory.  And we have a couple of remote sites.&lt;/P&gt;</description>
    <pubDate>Mon, 02 May 2016 18:34:37 GMT</pubDate>
    <dc:creator>geoeldsul</dc:creator>
    <dc:date>2016-05-02T18:34:37Z</dc:date>
    <item>
      <title>How do I edit my report on inventory of systems to get my expected output?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236653#M70311</link>
      <description>&lt;P&gt;Looks like Splunk could be very useful in performing an inventory of systems.  I have a report that runs with these parameters:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Src_IP="10.3.30.*" | stats dc(Src_IP) as Src_IP by Security_ID Src_IP | sort src_IP  ( *Run this with a time frame of TODAY*)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It works pretty good and is usable, but I was wondering if some of you long time Splunkers could help me refine it.  My output is currently:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;MyDomain\System1      10.3.30.15
MyDomain\FSmith       10.3.30.15
NULL SID              10.3.30.15
MyDomian\System2      10.3.30.20
MyDomain\BJones       10.3.30.20
NULL SID              10.3.30.20
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So this lets me know that FSmith is using System1 and through a couple of days of checking I can reasonably surmise that FSmith is the dominate user of this system. Same with BJones and System2.  How can I make it avoid the NULL SID entry?  Is there a way to make it produce output like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;MyDomain\System1    FSmith    10.3.30.15
MyDomian\System2    BJones    10.3.30.20 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or better yet &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;System1  FSmith   10.3.30.15
System2  Bjones   10.3.30.20
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;These systems are remote, so I can't just walk over and do a visual inventory.  And we have a couple of remote sites.&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2016 18:34:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236653#M70311</guid>
      <dc:creator>geoeldsul</dc:creator>
      <dc:date>2016-05-02T18:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my report on inventory of systems to get my expected output?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236654#M70312</link>
      <description>&lt;P&gt;Can you post some sample logs which contains all three type of entry for Security_ID field? (one containing system, second containing user and third with NULL SID)&lt;/P&gt;</description>
      <pubDate>Mon, 02 May 2016 19:26:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236654#M70312</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2016-05-02T19:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my report on inventory of systems to get my expected output?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236655#M70313</link>
      <description>&lt;P&gt;No. Unfortunately these systems are isolated and cannot reach the internet.  You can probably see the same type logs in your Windows Security Logs. &lt;BR /&gt;
LogName=Security&lt;BR /&gt;
SourceName=Microsoft Windows Security Auditing&lt;BR /&gt;
EventCode=4624&lt;BR /&gt;
EventType=0&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2016 11:14:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236655#M70313</guid>
      <dc:creator>geoeldsul</dc:creator>
      <dc:date>2016-05-03T11:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: How do I edit my report on inventory of systems to get my expected output?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236656#M70314</link>
      <description>&lt;P&gt;Ok. Sort of got it figured out.  The Answer ... just change what is being searched.&lt;/P&gt;

&lt;P&gt;The following is providing better output:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_ip="10.1.30.*" |stats dc(src_nt_host) by src_nt_host user src_ip | sort src_nt_host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Example output returned is:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;src_nt_host            user          src_ip
system1               JTKirk       10.1.30.15
system2               MRSpock      10.1.30.17
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 11 May 2016 12:51:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-edit-my-report-on-inventory-of-systems-to-get-my/m-p/236656#M70314</guid>
      <dc:creator>geoeldsul</dc:creator>
      <dc:date>2016-05-11T12:51:45Z</dc:date>
    </item>
  </channel>
</rss>

