Splunk Search

How to do the query for jumpcloud - bruteforce from svchost?

Izz-
New Member

index=* success="false" process_name="C:\\Windows\\System32\\svchost.exe"
| stats count as failedAttempts by user
| sort -failedAttempts

index=* success="false" process_name="C:\\Windows\\System32\\svchost.exe"
| timechart count by user
| sort by _time

I tried do both query but I'm stuck...Need any guidance, thank you 🙂

Labels (1)
0 Karma

woodcock
Esteemed Legend

Your fields are not correct.  You did not show us sample event data.  You did not tell us what "thing' generated the data.  You did not tell us what sourcetype it is.  You did not tell us what source it is.  You did not tell us what ModInput you are using.  You did not tell us what TA you are using.

0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...