Splunk Search

CIM Authentication data model

splunkreal
Motivator

Hello,

I would like to know the aim of this default constraint :

(`cim_Authentication_indexes`) tag=authentication NOT (action=success user=*$)
action="success"
 
Especially what does it try to match with user=*$ ? User accounts ending with $ symbol like in Windows?
 
Thanks.
 
* If this helps, please upvote or accept solution 🙂 *
Labels (3)
Tags (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @splunkreal,

user names ending with $ are windows service accounts and usually they aren't relevant in authentication monitoring.

Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @splunkreal,

user names ending with $ are windows service accounts and usually they aren't relevant in authentication monitoring.

Ciao.

Giuseppe

PickleRick
SplunkTrust
SplunkTrust

As far as I remember, there are two kinds of account that have names ending with $ (in Windows - for other systems it's highly unlikely that there will be an account named this way; but it would be nice to account for that) - Managed Service Accounts (which @gcusello already mentioned) and computer accounts. Both of those account types are authenticated without using interactive authentication modes so they're irrelevant to the events you're looking for in this dataset.

Get Updates on the Splunk Community!

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...

Combine Multiline Logs into a Single Event with SOCK: a Step-by-Step Guide for ...

Combine multiline logs into a single event with SOCK - a step-by-step guide for newbies Olga Malita The ...

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...