Security

Account keeps getting locked out

jovnice
Path Finder

I have an employee who keeps getting locked out. I wanted to know how to put a script in to find out which device is getting locked out. 

Labels (1)
0 Karma

jovnice
Path Finder

_time user desc OU hostName lockout

How is this for an example?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

From what you have shown so far, if the EventCode is "True", the user is locked out and you set lockout to "Yes", but you haven't shown any events where this is the case. Is this because there are no events like this?

0 Karma

jovnice
Path Finder

It does show locked-out users as well as unlocked users. Honestly, I know who is locked out and who is not. I wish it would be stated yes when it is instead of no for everyone. But the real issue I have is. How can I know what computer is locked out or if it is off-site? 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Splunk can only report what it finds in the logged events or something it "calculates" from the events. So, the question remains, what evidence do you have in your log events that show that the user is locked out or off-site? (To be fair, you haven't told us what "locked out" or "off-site" mean, let alone shown evidence of these states!)

0 Karma

jovnice
Path Finder

I understand you're not able to help. Thanks for your help anyway.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

It's very difficult to help with a search when we don't know what is being searched.  Something in your indexed data must be showing when an account is locked out.  Show us those events and we can help you craft a search for them.

---
If this reply helps you, Karma would be appreciated.
0 Karma

jovnice
Path Finder

 

Thanks so much for trying to help me. I agree with what you stated. Something is wrong. However. I did;

I posted what was in the what was in the search.

Then, I posted what was ingested from the logs. I'm not sure what more information you need from me.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

What you posted with respect to the logs was a table of value for fields (presumably derived from your events). What would be more useful is the raw events e.g. the _raw field for the events you are trying to use to determine which device(s) the user(s) is(are) locked out from. If this evidence is not in your raw event data, it is highly unlikely that Splunk can help you find it. Having said that, there may be a sequence or possibly an incomplete sequence of events that indicate that a user failed to connect. For example, you may have evidence in your logs of connections and failed log in attempts on those sessions, or even just connection attempts. We have no idea until you share what information you have.

0 Karma

jovnice
Path Finder

Thanks for the information and explaining again what information you wanted. Here is the raw data you requested:

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Thanks for sharing the events.  That helps.  Am I correct in interpreting them to say a lock event has just the headings with empty values?  If so, then the query becomes one of looking for said empty values.  One problem, of course, is that the empty values convey no information so you won't know which workstation is being used.

 

---
If this reply helps you, Karma would be appreciated.
0 Karma

jovnice
Path Finder

I agree, but how can I fix this?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Do you have any other sources of information, e.g. other logs, connection logs, meta-data about the "empty" logs, when the events happen, where were they originally logged. Can you work your way back up the chain to find where the event was generated?

0 Karma

jovnice
Path Finder

Thanks, I will work on that information.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

So you don't have any events for the locked accounts?

0 Karma

jovnice
Path Finder

The Statistics show locked and unlocked accounts, but the raw data does not show the event codes 4740 for yes and no.

0 Karma

dural_yyz
Builder
| eval lockout=if(EventCode =True,"Yes","No")

Can you share how the field "EventCode" is evaluated.  You shared your search and the results from your search.  What would be helpful is an anonymized raw event which feeds into your search.

Any event which indicates an account is in lock out status may not show where the authentication attempt came from.  This is why knowing the raw event is helpful to outsiders providing feedback.  If you are really trying to discover the root of account lock outs then you need a search for failed log in attempts.  The 2 data sets might come from different log entries.

0 Karma

jovnice
Path Finder

As I looked into the information you asked me for, the eventcode is supposed to lock out event code 4740, and it stated yes for lockout if it locks out. And No, if it is not. But in the raw data. It seems like my lockout question, doesn't exist.

0 Karma

jovnice
Path Finder

Thank for the information

0 Karma

jovnice
Path Finder

index=* source="activedirectory" eventtype="ad-files" Event*

These are the logs I have. They give me a lot of information. However, it is not the computer name that is getting locked out or if they are off-site.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Thanks. That was the search not the events. Do you have any evidence in logs that you have ingested into Splunk that the user is getting locked out?

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...