Security

How to detect fail password on Splunk?

cedSplunk2023
Observer

How to detect fail password on Splunk?

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @cedSplunk2023,

your question is just a little vague!

failed password on which opeating system (windows, Linux, etc...) or application or appliance?

Anyway to answer to this question you don't need a Splunk expert but of someone that knows the target environment.

e.g. to find the failed password on windows, you have to search for EventCode=4625, for Splunk, you have to search "ERROR AuthenticationManagerSplunk - Login failed".

In addition you need to know in which index data are stored, e.g. Splunk logs are in "_internal", winevenlogs are usualli in "wineventlog",

in conclusion to find the failed logins in windows, you have to search:

index=wineventlog EventCode=4625

to find the failed logins in Splunk, you have to search:

index=_internal "ERROR AuthenticationManagerSplunk - Login failed"

Remember that finding something in Splunk depends on the 70% on your knowledge of the target and 30% on your Splunk knowledge.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...