Quantcast
Channel: Latest Questions on Splunk Answers
Viewing all articles
Browse latest Browse all 13053

Help needed with Search to correlate Event Logs with Active Directory OU

$
0
0

Hello. I would like to create an alert anytime a privileged user account logs in to our domain. I can do separate searches for the information I want, but cannot seem to combine them to check two data sources. I am using Snare agents on Windows which go to a Syslog server that comes in to Splunk on TCP 514. I also have the SA for LDAP searching installed. I can do the following search which gives me logins and it returns just fine: sourcetype=snare_syslog (EventID="528" OR EventID="4624")

I can also do the following search within the ActiveDirectory source and get privileged level account information (we have any privileged level account within a OU named "Elevated": source="ActiveDirectory" distinguishedName=",OU=Elevated," This search provides only results that have a full username associated with a login instead of service accounts or null results.

My issue is...how do I combine these two, so Splunk with see a login, check to see if they are in an Elevated group, and then provide those results? I've tried doing multiple subsearches with no success. Any help would be greatly appreciated! Thank you.


Viewing all articles
Browse latest Browse all 13053

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>