<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to search for failed logins of a specific Active Directory group? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-failed-logins-of-a-specific-Active-Directory/m-p/279526#M84450</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;You should install and app to query the ldap for the members of the group that you want to filter.&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/1151/#/details"&gt;https://splunkbase.splunk.com/app/1151/#/details&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Hope i help you&lt;/P&gt;</description>
    <pubDate>Sat, 17 Sep 2016 17:39:11 GMT</pubDate>
    <dc:creator>jmallorquin</dc:creator>
    <dc:date>2016-09-17T17:39:11Z</dc:date>
    <item>
      <title>How to search for failed logins of a specific Active Directory group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-failed-logins-of-a-specific-Active-Directory/m-p/279525#M84449</link>
      <description>&lt;P&gt;Greetings.  I am looking to search failed logins for a particular Active Directory group(s).  I was thinking I'd have to do a subsearch based on what I've read in the forums.  However, ldapsearch isn't an option due to the access I have in our managed Splunk (it's managed by a central team).  So I can do a search for failed logins like so:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=[my domain controllers index]  sourcetype=XmlWinEventLog:Security EventCode=4625 user!="*$" user!="SYSTEM" (LogonType=10 OR LogonType=3) 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However, I don't know how to search just a specific group name at the same time and report on just the failed logins for members of that group.  Alternatively I could add the members of the group individually, but since the group membership would change that would be ineffective (I wouldn't always be aware of the changes).&lt;/P&gt;

&lt;P&gt;Does anyone have any advice?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2016 12:57:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-failed-logins-of-a-specific-Active-Directory/m-p/279525#M84449</guid>
      <dc:creator>SplunkLunk</dc:creator>
      <dc:date>2016-09-16T12:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to search for failed logins of a specific Active Directory group?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-failed-logins-of-a-specific-Active-Directory/m-p/279526#M84450</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;You should install and app to query the ldap for the members of the group that you want to filter.&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/1151/#/details"&gt;https://splunkbase.splunk.com/app/1151/#/details&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Hope i help you&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2016 17:39:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-for-failed-logins-of-a-specific-Active-Directory/m-p/279526#M84450</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2016-09-17T17:39:11Z</dc:date>
    </item>
  </channel>
</rss>

