Hello I have the following fields on EventCode=4625 (failed login events), Fields: _time, Source_Network_Address,Account_Name,Workstation Name,EventCode And i want to create anomaly creation rules based on the source address field, to check if there is a relative high amount of failed login from the same source address. I am currently using a static threshold (...| where count > 50) but i want it to be dynamic to the week,weekends / morning night changes. Anyone can give me some direction or a query example? Thanks
... View more