Splunk Search

How to search an event ID for password expiration enabled

wingstopdgon
New Member

I am trying to search event logs for an event when a user password is set to not expire. But the alert I have setup flags for all account changes not just the one where the Don't expire password - enabled. Any assistance is appreciated.

Here is the search string I have.

source="WinEventLog:security" EventCode=4738
user=*
| eval Modifier=mvindex(Security_ID,0)
| eval AccountChanged=mvindex(Security_ID,1)
| eval ActionTaken=case(EventCode="4738","User Account Control")
| eval ActionHelper=case(EventCode="4738","Don't Expire Password - enabled")
| table _time, Modifier, ActionTaken, AccountChanged, ActionHelper

Tags (1)
0 Karma

pkeenan87
Communicator

The field should be parsing by default. Do you have the Splunk TA for Windows installed on the Search Head (Link: https://splunkbase.splunk.com/app/742/)? If so, this search should work:

index=<<your_index>> source="WinEventLog:security" EventCode=4738 Account_Expires="<never>"
0 Karma
Get Updates on the Splunk Community!

Detecting Brute Force Account Takeover Fraud with Splunk

This article is the second in a three-part series exploring advanced fraud detection techniques using Splunk. ...

Buttercup Games: Further Dashboarding Techniques (Part 9)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Buttercup Games: Further Dashboarding Techniques (Part 8)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...