Splunk Enterprise Security

Password reset events

EMDEEEEE
New Member

Can someone provide queries for the below 

Password reset events for a user

interactive and non interactive login attempts

Account disable event for a user

 

thanks

 

Labels (1)
0 Karma

thahir
Contributor

@EMDEEEEE  

If you haven’t integrated Splunk users with LDAP or SAML, then user management activities (like account edits, password resets, or role changes) are logged in the _audit index. You can search with something like below SPL in the SH.

index=_audit action=edit_user


However, if your Splunk environment is integrated with Active Directory/Windows authentication, account lifecycle events (disable/enable, password resets, etc.) won’t appear in _audit. Instead, you’ll need to rely on Windows Security Event Logs indexes — for example:

4722 → User account enabled

4725 → User account disabled

4723/4724 → Password change/reset

0 Karma

PrewinThomas
Motivator

@EMDEEEEE 
As others mentioned you need provide more context. If its for Windows Logs in Splunk, you can use below,


Password reset event id's are 4723 and 4724

 

index=YOUR_INDEX sourcetype="WinEventLog:Security" (EventCode=4723 OR EventCode=4724)
| eval Action=case(EventCode=4723,"Password Change Attempt", EventCode=4724,"Password Reset")
| table _time user Account_Name Target_Account_Name Action host
| sort - _time

 

Interactive & Non-interactive
Successful logons are EventCode 4624. The Logon_Type field tells you the type.

Interactive: 2 (console), 10 (remote desktop), 11 (cached) and rest you can normally mention as non-interactive

Account Disabled - Use EventCode 4725

index=YOUR_INDEX sourcetype="WinEventLog:Security" EventCode=4725
| eval Action="Account Disabled"
| table _time Target_Account_Name user host Action
| sort - _time

 


Regards,
Prewin
If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!

0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @EMDEEEEE 

What are the logs you are ingesting that you are looking for? There are a number of existing searches in the Splunk Security Essentials app (https://splunkbase.splunk.com/app/3435) and also at https://research.splunk.com/detections/ which might help you, it ultimately depends on the data you are ingesting.

🌟 Did this answer help you? If so, please consider:

    • Adding karma to show it was useful
    • Marking it as the solution if it resolved your issue
    • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing.

richgalloway
SplunkTrust
SplunkTrust

What have you tried so far and how have those efforts not met expectations?

To help with this question, we need more information. 

  1. What platform/service is performing the password resets, login attempts, and account disables? 
  2. Are those events sent to Splunk?  If not, then no query will work.  Otherwise, it would help to see sample sanitized events.
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...