Splunk Search

how to search for admins who make changes to their own accounts?

ajmach343
Explorer

I am trying to make a search that will fire only when an admin makes a change to their own account.

I want to know if a-johndoe gives multiple permissions to a-johndoe and NOT if a-johndoe gives permissions to a-janedoe. 

would i use an IF statement for this?

 

Thank you

Labels (1)
0 Karma

ajmach343
Explorer

apologies, this will be for windows event logs and Ivanti logs. 

0 Karma

PickleRick
SplunkTrust
SplunkTrust

What data are you talking about?

Splunk account changes? Windows Event Logs? Some (what) Linux audit logs?

If your data is CIM-normalized, you should use Change.Account_Management dataset.

0 Karma

ajmach343
Explorer

was able to figure it out!

needed to just use an IF statement. 

| eval testuser=if(admin=target,1,0)
| where testuser=1
0 Karma
Get Updates on the Splunk Community!

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL  The Splunk AI Assistant for SPL ...

Buttercup Games: Further Dashboarding Techniques (Part 5)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...

Customers Increasingly Choose Splunk for Observability

For the second year in a row, Splunk was recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for ...