Splunk Enterprise Security

Search for failed logins: Why is the search creating false positive alerts?

Ash
Engager

Hello,

I have created a search for failed logins for win,linux and network devices from authentication datamodel but this is generating lot of false positive alerts. Please help me to finetune this search

| from datamodel:"Authentication"."Failed_Authentication" | search NOT user IN ("sam","sunil")
| stats values(signature) as signature, dc(user) as "user_count", dc(dest) as "dest_count" latest(_raw) as orig_raw, count by "app","src",user
| where 'count'>=200 AND user_count=1 | head 5

 

Ash_0-1665678715131.png

 

Labels (1)
Tags (2)
0 Karma
Get Updates on the Splunk Community!

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

[Puzzles] Solve, Learn, Repeat: Nested loops in Event Conversion

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...