Hi @darphboubou , I haven't event samples so I cannot see the field in interesting fields panel, so, running the main search index=windows EventCode=3000 source="WinEventLog:Microsoft-Windows-SMBServer/Audit" which fields do you have in Interesting Fields panel? Choose the ones to use for stats searches: e.g. if you want the number for user or for host, you could run something like: index=windows EventCode=3000 source="WinEventLog:Microsoft-Windows-SMBServer/Audit"
| stats count BY user or index=windows EventCode=3000 source="WinEventLog:Microsoft-Windows-SMBServer/Audit"
| chart count OVER user BY host then choose the fields to display in a table search: index=windows EventCode=3000 source="WinEventLog:Microsoft-Windows-SMBServer/Audit"
| table _time host user domain action ... As I said the most valuable job is to know what to search, then you can learn how to search in Splunk using the Search Tutorial. Saving these searches in different dashboard's panels, you'll have your dashboard, to monitor your Use Case Ciao. Giuseppe
... View more