Security

Top 10 Failed Login

sittingonion
Observer

Im new to splunk , 

I created 15 users and had failed login attempts on some of them.

how can i find the first 10 failed login attempts,with what command can i see this in splunk

sourcetype="WinEventLog:Security" eventcode 4625| top limit=10 "Account Name"

I tried it brought all users but how do I integrate the failed part into it, am I walking on the wrong path?

Labels (1)
0 Karma

kkrises
Path Finder

Here is your SPL query, let me know if it works for you.

index=wineventlog sourcetype="Wineventlog:Security" EventCode=4625 OR EventCode=529 Account_Name!="" | stats count by Account_Name | sort -count | head 10

Event code 529 to capture failure events from Win 2003 or older versions

Account_Name!="<put value which doesn't make any sense to you like blank/- etc>

head 10 - for top 10 results.

Hope this helps and happy Splunking!

0 Karma

richgalloway
SplunkTrust
SplunkTrust

You're on the right path.

The event should have a field that indicates if the login succeeded or failed.  Test that field in your query to include only failures.  You'll need to remove the top command to see the full event.

The query may end up looking something like this:

sourcetype="WinEventLog" EventCode=4625 index=wineventlog action=failure
| top limit=10 Account_Name
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...