Splunk Search

How to search for failed login then success with sourcetype="o365:management:activity"?

Nickbshaw
Observer

Currently using a manual verification of non US logins:

sourcetype="o365:management:activity"
| iplocation ActorIpAddress
| search Country!="United States"  action=success
| stats count by UserId, Operation, ActorIpAddress, Country, action
| sort -count 

I am wanting to create a search that will show failed logins followed by a success for a user regardless of source ip.

Thanks.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There's an example of that (and much more) in the Splunk Security Essentials app.  Look for "Basic Brute Force Detection".

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...