Getting Data In

TargetUserName - Win7 Security Event Log

New Member

I am struggling to find a text string - "TargetUserName" using SPLUNK. I have drilled down to the actual event log in question and can't get SPLUNK to display any of the data in the Event log General tab.

Could someone please advise how I can filter on TargetUserName

Thanks

Dave

0 Karma

SplunkTrust
SplunkTrust

To find a value of the field TargetUserName that is equal to Dave121:

TargetUserName="Dave121"

To search for Dave121 as plain text:

"Dave121"

If for some reason Splunk is not finding that TargetUserName is a field, then the second option should work. If you are searching Windows event logs, most of the time the username is in the UserName or AccountName fields. If you still are unable to find what you are looking for, please post a copy of the event.

0 Karma

New Member

I am trying to find the value for TargetUserName, but it would be useful to know how to find the text string too.

I know that an account that I am investigating has been used to logon to a system over the network, but searching for that account name, lets call it Dave121, doesn’t return any values.

So the ultimate question is how would find the value Dave121 for TargetUserName

Thanks

Dave

0 Karma

SplunkTrust
SplunkTrust

Are you trying to find the value for TargetUserName or the text string TargetUserName?

0 Karma