Splunk Enterprise Security

Datamodel search for changing windows group member in datamodel

eriklp
Explorer

Hi there, 

I'd like to create a search to look for group membership changes in active directory. 

So far I've created this search:

| tstats dc(All_Changes.user) as Useraccounts from datamodel=Change where All_Changes.result_id="4732" OR All_Changes.result_id="4733" by All_Changes.dest All_Changes.action All_Changes.result 

which provides me results:

user account blabla added to group 

user account blabla removed from group  

etc

However, I'd like to refine this search more to actually be able to determine if a user has been added to a particular privileged group and removed from that same group within a specific time frame, for instance within an hour. 

 

Thanks in advance

Erik

 

 

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Check out the "Short-lived Admin Accounts" use case in the Splunk Security Essentials app.

---
If this reply helps you, Karma would be appreciated.
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...