Splunk Enterprise Security

Excessive Failed Logins Correlation Search

bbraun
New Member

Hi guys,

Im not sure how to go about this. We currently have the Excessive Failed Logins Correlation Search enabled on our Splunk ES instance. Id like to filter out the accounts with failed authentications that had their passwords recently expire. I tried using map and join to query okta or wineventlog but couldn't figure it out.

Below is the default correlation search query. Any ideas?

| from datamodel:"Authentication"."Failed_Authentication" | stats values(tag) as "tag",dc(user) as "user_count",dc(dest) as "dest_count",count by "app","src","user","host" | where 'count'>=50

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...