I want to identify the login and logouts for each user on a server.
I use the eventid 4624 (logon) and 4634(logoff). the problem is that Windows generates multiple events for only one login/logoff.
It seems that they share the same loginid.
so I try something like:
host="server a" user="allice" (EventCode=4624 OR EventCode=4624 )
now I need something like:
| where loginid= loginid
So that I get only 2 events for one login/logoff , but for all users and over time 🙂
Thanks for reading.
Can you please try this?
host="server a" user="allice" (EventCode=4624 OR EventCode=4634) | dedup EventCode,user
EDIT: If above query works then remove
user="allice" from above query so it will give you result for all users who login/logoff in
Are you sure your not seeing multiple events for logintype3 or logintype4 which are network or service logons - its quite conceivable you would see lots of these during login (and use) as you system downloads profiles/maps drives etc.
If you restrict your search to LoginType2 (interactive) you may have more concise results.
I am not near Splunk at the moment, so this may not work off the hop, but this might get you closer.
((EventCode=4624 (Logon_Type=2 OR login_Type=7 OR Login_Type=10)) OR (EventCode=4634 OR EventCode=4647) )|transaction user, host startswith="EventCode=4624"
edited to include loging type7 (unlock) and 10 (remote desktop)