Security

Activity for a privileged account previously disabled and recently rehabilitated

wvalente
Explorer

Hi Guys,

I need a help to set up a search that alert me when a privileged account was disabled and after habilited in a certain period of time.

I have no idea how I can construct this search.

Help, please.

Tks guys.

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi wvalente,
I'm not sure abut the EventCode but they should be 4722 (enabled) and 4725 (disabled) so you should try something like this

index=wineventlog sourcetype=WinEventLog:Security (EventCode=4722 OR EventCode=4725)
| transaction Account_Name 
| search EventCode=4722 EventCode=4725

| in this way you create an event that correlate all events of each Account_Name, if there are both EventCode 4722 and 4725 you can trigger an alert.
You can manage time in in earliest and latest.

Bye.
Giuseppe

0 Karma

wvalente
Explorer

Hi Giuseppe,

Sorry, I was looking for linux devices.

Do you know?

Tks

0 Karma

gcusello
SplunkTrust
SplunkTrust

it's the same thing, only different field names:

 index=your_index sourcetype=your_sourcetype (EventCode=4722 OR EventCode=4725)
 | transaction user 
 | search EventCode=4722 EventCode=4725

Bye.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...