Splunk Search

Is there a forensic-type report that handles AD user account properties for PCI and SSAE compliance?

dhaertel
Path Finder

Hello,
I'm looking for a way to track total property changes within an AD user's account. As an example, per PCI and SSAE requirements, user accounts must not be permanent, they must be set to expire in 89 days or fewer.

I was able to run the report that showed me a dozen or so users that were set to "not expire" which is great. I'd like to know however whether this user was setup that way originally or if another sysadmin had changed this status for whatever reason.

This brought up other uses, like tracking if a sysadmin has reset a password rather than having the user use our self help password reset portal, and obviously there are many more options to consider.

Basically we're looking for a forensic type report that handles AD user account properties. Is there something already that does this? Or would it mean writing my own?

0 Karma
1 Solution

dhaertel
Path Finder

Ok, so I'll add this to my original post. I found a pretty basic and generic search which I then created a report based on the windows event ID.

eventtype="wineventlog_windows" sourcetype="*inEventLog:*" (host="*" OR ComputerName="*") TaskCategory="*"  SourceName="*" EventCode="1102" Type="*"

I then just used this as a base, modified the EventCode to the ID I was tracking and voila, solid report for that function.

I found this very handy list of event codes and generated the ones I needed to see like user account lockouts, user deletions and creations, alert logs cleared (above code) and others that fit into my daily security checklist.

List of Event Codes

View solution in original post

0 Karma

dhaertel
Path Finder

Ok, so I'll add this to my original post. I found a pretty basic and generic search which I then created a report based on the windows event ID.

eventtype="wineventlog_windows" sourcetype="*inEventLog:*" (host="*" OR ComputerName="*") TaskCategory="*"  SourceName="*" EventCode="1102" Type="*"

I then just used this as a base, modified the EventCode to the ID I was tracking and voila, solid report for that function.

I found this very handy list of event codes and generated the ones I needed to see like user account lockouts, user deletions and creations, alert logs cleared (above code) and others that fit into my daily security checklist.

List of Event Codes

0 Karma

DalJeanis
Legend

@dhaertel - List of Event Codes?

here's a list of windows ones... https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx

0 Karma

dhaertel
Path Finder

Yea, I posted a link but am too new, it stripped out the actual address. That one I found was very good also.

But in the end, I setup a great set of daily reports and I just plow through them first thing in the morning and make my notes based on the reports.

0 Karma
Get Updates on the Splunk Community!

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...