Hi All,
SPLUNK Version : 5.0.4
I have installed the Windows Security Operations Manager App in my Splunk Box and also i have been receiving events from one my my Windows Server. I have configured universal forwarder for forwarding logs from the Windows Server.
Following is the search query :
windowsindex
windowssourcetype
( EventCode=528 OR EventCode=4624) Logon_Type=10 | eval User = if(isnull(Account_Name), User_Name, mvindex(Account_Name,1)) | timechart count by User
Here when i search for the following it provides me result
windowsindex
windowssourcetype
( EventCode=528 OR EventCode=4624) Logon_Type=10
But when i add the following eval command it does not work.
eval User = if(isnull(Account_Name), User_Name, mvindex(Account_Name,1))
I have the same events coming into a Splunk 6.X box. there everything works fine.
Can someone please your thoughts on this.
Sample Device Logs:
LogName=Security
SourceName=Microsoft Windows security auditing.
EventCode=4624
EventType=0
Type=Information
ComputerName=tspm-xxx-win8-3.XX.sec
TaskCategory=Logon
OpCode=Info
RecordNumber=7732
Keywords=Audit Success
Message=An account was successfully logged on.
Subject:
Security ID: NT AUTHORITYSYSTEM
Account Name: TSPM-X-WIN8-3$
Account Domain: CMS
Logon ID: 0x3e7
Logon Type: 10
New Logon:
Security ID: CMSAdministrator
Account Name: administrator
Account Domain: CMS
Logon ID: 0xf404a
Logon GUID: {B7FDAF51-1A1B-881C-B2C5-F243F99AE501}
Process Information:
Process ID: 0xce4
Process Name: C:WindowsSystem32winlogon.exe
Network Information:
Workstation Name: XXXX-XXX-XX
Source Network Address: X.X.X.X
Source Port: 58775
Detailed Authentication Information:
Logon Process: User32
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.