I need to identify how many authorizations (active directory domain logins) per day on average we have per domain controller. Can you please determine what may be the best Splunk query to run that won’t give me too much unwanted data within the search? I am currently using the search string:
index=dclog EventCode=4624 | table _time Process_Name EventCode Account_Domain Account_Name
What is the best search query string to use with Splunk to get the last 24 hours of successful domain logons?”
Without knowing what data is unwanted, it is rather difficult to determine how to filter out data. However, assuming that you only want domain logons, you will probably want to either only include domain names that you know or filter out the local domains.
As an example:
index=dclog EventCode=4624 Account_Domain!="WORKGROUP" earliest=-24h@h | table _time Process_Name EventCode Account_Domain Account_Name
Without knowing what data is unwanted, it is rather difficult to determine how to filter out data. However, assuming that you only want domain logons, you will probably want to either only include domain names that you know or filter out the local domains.
As an example:
index=dclog EventCode=4624 Account_Domain!="WORKGROUP" earliest=-24h@h | table _time Process_Name EventCode Account_Domain Account_Name