Splunk Enterprise Security

Datamodel search for changing windows group member in datamodel

eriklp
Explorer

Hi there, 

I'd like to create a search to look for group membership changes in active directory. 

So far I've created this search:

| tstats dc(All_Changes.user) as Useraccounts from datamodel=Change where All_Changes.result_id="4732" OR All_Changes.result_id="4733" by All_Changes.dest All_Changes.action All_Changes.result 

which provides me results:

user account blabla added to group 

user account blabla removed from group  

etc

However, I'd like to refine this search more to actually be able to determine if a user has been added to a particular privileged group and removed from that same group within a specific time frame, for instance within an hour. 

 

Thanks in advance

Erik

 

 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Check out the "Short-lived Admin Accounts" use case in the Splunk Security Essentials app.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...