Splunk Search

how to search for admins who make changes to their own accounts?

ajmach343
Explorer

I am trying to make a search that will fire only when an admin makes a change to their own account.

I want to know if a-johndoe gives multiple permissions to a-johndoe and NOT if a-johndoe gives permissions to a-janedoe. 

would i use an IF statement for this?

 

Thank you

Labels (1)
0 Karma

ajmach343
Explorer

apologies, this will be for windows event logs and Ivanti logs. 

0 Karma

PickleRick
SplunkTrust
SplunkTrust

What data are you talking about?

Splunk account changes? Windows Event Logs? Some (what) Linux audit logs?

If your data is CIM-normalized, you should use Change.Account_Management dataset.

0 Karma

ajmach343
Explorer

was able to figure it out!

needed to just use an IF statement. 

| eval testuser=if(admin=target,1,0)
| where testuser=1
0 Karma
Get Updates on the Splunk Community!

AppDynamics Summer Webinars

This summer, our mighty AppDynamics team is cooking up some delicious content on YouTube Live to satiate your ...

SOCin’ it to you at Splunk University

Splunk University is expanding its instructor-led learning portfolio with dedicated Security tracks at .conf25 ...

Credit Card Data Protection & PCI Compliance with Splunk Edge Processor

Organizations handling credit card transactions know that PCI DSS compliance is both critical and complex. The ...