Splunk Search

How to search for failed login then success with sourcetype="o365:management:activity"?

Nickbshaw
Observer

Currently using a manual verification of non US logins:

sourcetype="o365:management:activity"
| iplocation ActorIpAddress
| search Country!="United States"  action=success
| stats count by UserId, Operation, ActorIpAddress, Country, action
| sort -count 

I am wanting to create a search that will show failed logins followed by a success for a user regardless of source ip.

Thanks.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There's an example of that (and much more) in the Splunk Security Essentials app.  Look for "Basic Brute Force Detection".

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...