Splunk Dev

AD monitoring

SoknySplunk
Loves-to-Learn Lots

I want to collect log from user AD. I have used eventcode 4720 and eventcode 4624. i wonder how to combine these two events together and get table like this: host, RecordNumber, user_id, signature, status, admin_id, src_ip, logonby, logon_time, Create_time, Logon_ID

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi SoknySplunk,
if you're already receiving logs from AD, try something like this

index=wineventlog sourcetype=WinEventLog:Security (EventCode=4720 OR EventCode=4624)
| table _time host RecordNumber user_id signature status admin_id src_ip logonby logon_time Create_time Logon_ID

verify if the field names are correct related to your logs.

Bye.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

New This Month - Observability Updates Give Extended Visibility and Improve User ...

This month is a collection of special news! From Magic Quadrant updates to AppDynamics integrations to ...

Intro to Splunk Synthetic Monitoring

In our last post, we mentioned that the 3 key pieces of observability – metrics, logs, and traces – provide ...