Hello, With these sorts of issues it's best to work your way down to eliminate the possible causes. Take an exemplar broken search from the dashboard and try to run it manually: eventtype=msad-successful-user-logons If that doesn't work try to run the definition manually: eventtype=wineventlog_index_windows eventtype=wineventlog_security EventCode=4624 user!="*$" If that works, make sure the msad-successful-user-logons definition is correct and shared properly. If not, try expanding your index eventtype: (index=msad OR index=main) eventtype=wineventlog_security EventCode=4624 user!="*$" If that works, make sure your definition is correct and shared properly. If not, try expanding the wineventlog_security eventtype: (index=msad OR index=main) (search = source=WinEventLog:Security OR source=WMI:WinEventLog:Security OR source=XmlWinEventLog:Security) EventCode=4624 user!="*$" If that works, make sure Splunk_TA_windows is installed the wineventlog_security eventtype is working. If that doesn't work then your problem is not with the eventtype definitions, but rather with the data itself. Things to try: Do you have Splunk_TA_windows installed on your indexers/search heads? Are the source's renamed correctly as per TA_Windows ta-windows-fix-xml-source definition and the requirements of the wineventlog_security eventtype? Are your indexes correct and populated within the search timeframe? Finally, if you still can't get results, try stripping of key values from the search to check if the search is working: (index=msad OR index=main) (search = source=WinEventLog:Security OR source=WMI:WinEventLog:Security OR source=XmlWinEventLog:Security) If you get results, the problem is with the field extractions: EventCode=4624 user!="*$" check that Splunk_TA_windows is working as expected, check your inputs, props and transforms are all aligned. Good luck!
... View more