Splunk Enterprise Security

Datamodel search for changing windows group member in datamodel

eriklp
Explorer

Hi there, 

I'd like to create a search to look for group membership changes in active directory. 

So far I've created this search:

| tstats dc(All_Changes.user) as Useraccounts from datamodel=Change where All_Changes.result_id="4732" OR All_Changes.result_id="4733" by All_Changes.dest All_Changes.action All_Changes.result 

which provides me results:

user account blabla added to group 

user account blabla removed from group  

etc

However, I'd like to refine this search more to actually be able to determine if a user has been added to a particular privileged group and removed from that same group within a specific time frame, for instance within an hour. 

 

Thanks in advance

Erik

 

 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Check out the "Short-lived Admin Accounts" use case in the Splunk Security Essentials app.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...