I am struggling to find a text string - "TargetUserName" using SPLUNK. I have drilled down to the actual event log in question and can't get SPLUNK to display any of the data in the Event log General tab.
Could someone please advise how I can filter on TargetUserName
To find a value of the field TargetUserName that is equal to Dave121:
To search for Dave121 as plain text:
If for some reason Splunk is not finding that TargetUserName is a field, then the second option should work. If you are searching Windows event logs, most of the time the username is in the UserName or AccountName fields. If you still are unable to find what you are looking for, please post a copy of the event.
I am trying to find the value for TargetUserName, but it would be useful to know how to find the text string too.
I know that an account that I am investigating has been used to logon to a system over the network, but searching for that account name, lets call it Dave121, doesn’t return any values.
So the ultimate question is how would find the value Dave121 for TargetUserName