Splunk Search

how to search for admins who make changes to their own accounts?

ajmach343
Explorer

I am trying to make a search that will fire only when an admin makes a change to their own account.

I want to know if a-johndoe gives multiple permissions to a-johndoe and NOT if a-johndoe gives permissions to a-janedoe. 

would i use an IF statement for this?

 

Thank you

Labels (1)
0 Karma

ajmach343
Explorer

apologies, this will be for windows event logs and Ivanti logs. 

0 Karma

PickleRick
SplunkTrust
SplunkTrust

What data are you talking about?

Splunk account changes? Windows Event Logs? Some (what) Linux audit logs?

If your data is CIM-normalized, you should use Change.Account_Management dataset.

0 Karma

ajmach343
Explorer

was able to figure it out!

needed to just use an IF statement. 

| eval testuser=if(admin=target,1,0)
| where testuser=1
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...