Splunk Search

How to do the query for jumpcloud - bruteforce from svchost?

Izz-
New Member

index=* success="false" process_name="C:\\Windows\\System32\\svchost.exe"
| stats count as failedAttempts by user
| sort -failedAttempts

index=* success="false" process_name="C:\\Windows\\System32\\svchost.exe"
| timechart count by user
| sort by _time

I tried do both query but I'm stuck...Need any guidance, thank you 🙂

Labels (1)
0 Karma

woodcock
Esteemed Legend

Your fields are not correct.  You did not show us sample event data.  You did not tell us what "thing' generated the data.  You did not tell us what sourcetype it is.  You did not tell us what source it is.  You did not tell us what ModInput you are using.  You did not tell us what TA you are using.

0 Karma
Get Updates on the Splunk Community!

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Splunk Education Goes to Washington | Splunk GovSummit 2024

If you’re in the Washington, D.C. area, this is your opportunity to take your career and Splunk skills to the ...