I would put in the same report the "TOP logon failures" and below the table with _time and all failures.
The TOP search:
action=failure eventtype="Logon Failure" NOT | top user Source_Network_Address Workstation_Name ComputerName | rename user as User, ComputerName as Destination | where count > 30
you can do it in an dashboard with two panels
first panel you put the "TOP logon failures"
and second panel you the table with _time and all failures.
you can do it in an dashboard with two panels
first panel you put the "TOP logon failures"
and second panel you the table with _time and all failures.
Good idea. I will do this.
But there is some form of a query and bring TOP Table?
A simple way would be to use a subsearch
action=failure eventtype="Logon Failure" [action=failure eventtype="Logon Failure" | top user Source_Network_Address Workstation_Name ComputerName | search count > 30 | fields user]
Alternatively combine the two
action=failure eventtype="Logon Failure" | stats values(_time) count by user,Source_Network_Address,Workstation_Name,ComputerName | search count > 30
Good idea. Be sure to have a look at the Splunk tutorial here: http://docs.splunk.com/Documentation/Splunk/6.3.2/SearchTutorial/WelcometotheSearchTutorial
It has a section on how to make dashboards.