Splunk Search

Query to find the latest time entry for lastlogonTimestamp from AD logs for a list of users?

LintuMathews
Explorer

Hi

Can you please help with a query that will pick the latest time entry captured for lastlogonTimestamp from AD logs for a particular list of users

Tags (2)
1 Solution

LintuMathews
Explorer

Thanks, I used this query and it works:

index=msad lastLogonTimestamp | stats latest(lastLogonTimestamp) by employeeID

View solution in original post

LintuMathews
Explorer

Thanks, I used this query and it works:

index=msad lastLogonTimestamp | stats latest(lastLogonTimestamp) by employeeID

jodros
Builder

You could probably leverage the dedup command and key in on user. This would only show the most recent event for that user. You could also leverage a lookup table file for all of the users you are interested in.

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...