Splunk Search

How can I create a search to run a report on Administrator Accounts that are used to access the internet?

Onuorahc
New Member

How can I create a search to run a report on Administrator Accounts that are used to access the internet

Tags (1)
0 Karma

woodcock
Esteemed Legend

OK, try something like this:

sourcetype=bluecoat account_name="SA*" | stats count latest(_time) AS LastAccess by account_name
0 Karma

tskinnerivsec
Contributor

We need to know what types of logs you have available. If you have authenticated proxy logs, they would be helpful. Some firewalls provide authentication information as well, such as Palo Alto firewalls. The most common source of logs for this type of reporting are proxy logs.

0 Karma

woodcock
Esteemed Legend

There is no way to answer this question without MUCH more context. What logs do you have? Is there a way to distinguish "administrator"?

0 Karma

Onuorahc
New Member

Yes, there is bluecoat proxy log...

0 Karma

Onuorahc
New Member

Syslog and each account name has: "SA" before it. Eg., "SAlun031"

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...