Monitoring Splunk

Cyberark user adds/removed not firing in splunk

Ghanayem1974
Path Finder

I have a rule that is not generating any splunk events when a user has been added/removed from my the AD groups created in CyberArk. I am not sure what i am missing. any ideas?

Tags (1)
0 Karma

mohammadsharukh
Path Finder

Could you please share the condition/logic of Use case so that i can implement the same in other SIEM tools

0 Karma

ahmar74
Explorer

index=wineventlog earliest=-16m sourcetype="WinEventLog:Security" CyberArk_*_DGM ("EventCode=4756" OR "EventCode=4757") action=success | table _time, signature_id, signature, src_user, user_group, user, user_email

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...