Security

Top 10 Failed Login

nebyouadane
New Member

Hi
I would like to find my Top 10 Failed login when I run this search. What should I add to get the right result? Here is the query I have to far. (this search gives me all the Failed Login, I just need to know how to search for Top command)

eventtype=msad-failed-user-logons | fields src_host,src_ip,src_nt_domain,user | eval src_ip=replace(src_ip,"::ffff:","") | ip-to-host | stats values(src_nt_domain) AS "Domain(s)", count AS Count, values(src_host) AS "Host(s)", values(src_ip) AS "IP(s)", sparkline AS "Failure activity" by user | sort -Count | rename user as "Username"

Tags (4)
0 Karma

dmaislin_splunk
Splunk Employee
Splunk Employee

You already did the sort -Count, so just complete your search with a | head 10

0 Karma
Get Updates on the Splunk Community!

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...

Adoption of Infrastructure Monitoring at Splunk

  Splunk's Growth Engineering team showcases one of their first Splunk product adoption-Splunk Infrastructure ...

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...