Splunk Cloud Platform

Find who changed an AD attribute for a specific account

Sotu
Engager

I recently had an error message pop up synchronizing from our on-prem AD servers to Entra about an account issue.  I found that the account in question had all the attributes correct except for the userPrincipalName.  In the UPN, instead of having the username@mydomain.com, it was changed to a "\"@mydomain.com.  I am trying to figure out who or which account made that change in Splunk Cloud.  I have searched for Event IDs 4738 and it shows the UPN with the "\" but it doesn't tell me who made the change.  Also I am looking in the Windows TA addon to see if I can find any more info in there.

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...