Monitoring Splunk

How to monitor Windows failed log on

catch_mili
Explorer

How to check Windows failed log on using Splunk.

Tags (1)
0 Karma

mbenwell
Communicator

The Windows and Active Directory apps (NOTE: Choose relevant app based on your requirement) have a heap of field extractions and eventtypes that will be useful to you for this sort of stuff.

Assuming your logs are already in Splunk, your search would be as simple as:

eventtype=windows_logon_failure

If you don't have the apps installed or dont want to install them you could search for the relevant EventCodes instead. Example below, where "source_of_your_logs" = whatever the source is called in your Splunk installation.

source=source_of_your_logs EventCode=529 OR EventCode=4625

0 Karma

catch_mili
Explorer

Further, I would like to monitor files & folders created under C:\ & D:\ drive.

How can I do that.

0 Karma
Get Updates on the Splunk Community!

Pro Tips for First-Time .conf Attendees: Advice from SplunkTrust

Heading to your first .Conf? You’re in for an unforgettable ride — learning, networking, swag collecting, ...

Raise Your Skills at the .conf25 Builder Bar: Your Splunk Developer Destination

Calling all Splunk developers, custom SPL builders, dashboarders, and Splunkbase app creators – the Builder ...

Hunt Smarter, Not Harder: Discover New SPL “Recipes” in Our Threat Hunting Webinar

Are you ready to take your threat hunting skills to the next level? As Splunk community members, you know the ...