Security

How to detect fail password on Splunk?

cedSplunk2023
Observer

How to detect fail password on Splunk?

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @cedSplunk2023,

your question is just a little vague!

failed password on which opeating system (windows, Linux, etc...) or application or appliance?

Anyway to answer to this question you don't need a Splunk expert but of someone that knows the target environment.

e.g. to find the failed password on windows, you have to search for EventCode=4625, for Splunk, you have to search "ERROR AuthenticationManagerSplunk - Login failed".

In addition you need to know in which index data are stored, e.g. Splunk logs are in "_internal", winevenlogs are usualli in "wineventlog",

in conclusion to find the failed logins in windows, you have to search:

index=wineventlog EventCode=4625

to find the failed logins in Splunk, you have to search:

index=_internal "ERROR AuthenticationManagerSplunk - Login failed"

Remember that finding something in Splunk depends on the 70% on your knowledge of the target and 30% on your Splunk knowledge.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...

Stay Connected: Your Guide to July Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...