Deployment Architecture

Help with Windows dormant enable search

Path Finder

Hi All, 

I want to create a use case where the account is inactive for 60 days and it got enable after 60 days.. 

I tied to draw ta logic but not sure whether query is correct or not.

Can somebody please modify the query if it required some change 

index=wineventlog EventCode=4624 user=”*" earliest= -60d latest = now() | transaction user maxspan=60d search (EventCode!=)


Thank you 

Labels (4)
0 Karma
Get Updates on the Splunk Community!

Get ready to show some Splunk Certification swagger at .conf24!

Dive into the deep end of data by earning a Splunk Certification at .conf24. We're enticing you again this ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Now On-Demand Join us to learn more about how you can leverage Service Level Objectives (SLOs) and the new ...

Database Performance Sidebar Panel Now on APM Database Query Performance & Service ...

We’ve streamlined the troubleshooting experience for database-related service issues by adding a database ...