Splunk Search

Is there a forensic-type report that handles AD user account properties for PCI and SSAE compliance?

dhaertel
Path Finder

Hello,
I'm looking for a way to track total property changes within an AD user's account. As an example, per PCI and SSAE requirements, user accounts must not be permanent, they must be set to expire in 89 days or fewer.

I was able to run the report that showed me a dozen or so users that were set to "not expire" which is great. I'd like to know however whether this user was setup that way originally or if another sysadmin had changed this status for whatever reason.

This brought up other uses, like tracking if a sysadmin has reset a password rather than having the user use our self help password reset portal, and obviously there are many more options to consider.

Basically we're looking for a forensic type report that handles AD user account properties. Is there something already that does this? Or would it mean writing my own?

0 Karma
1 Solution

dhaertel
Path Finder

Ok, so I'll add this to my original post. I found a pretty basic and generic search which I then created a report based on the windows event ID.

eventtype="wineventlog_windows" sourcetype="*inEventLog:*" (host="*" OR ComputerName="*") TaskCategory="*"  SourceName="*" EventCode="1102" Type="*"

I then just used this as a base, modified the EventCode to the ID I was tracking and voila, solid report for that function.

I found this very handy list of event codes and generated the ones I needed to see like user account lockouts, user deletions and creations, alert logs cleared (above code) and others that fit into my daily security checklist.

List of Event Codes

View solution in original post

0 Karma

dhaertel
Path Finder

Ok, so I'll add this to my original post. I found a pretty basic and generic search which I then created a report based on the windows event ID.

eventtype="wineventlog_windows" sourcetype="*inEventLog:*" (host="*" OR ComputerName="*") TaskCategory="*"  SourceName="*" EventCode="1102" Type="*"

I then just used this as a base, modified the EventCode to the ID I was tracking and voila, solid report for that function.

I found this very handy list of event codes and generated the ones I needed to see like user account lockouts, user deletions and creations, alert logs cleared (above code) and others that fit into my daily security checklist.

List of Event Codes

0 Karma

DalJeanis
Legend

@dhaertel - List of Event Codes?

here's a list of windows ones... https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx

0 Karma

dhaertel
Path Finder

Yea, I posted a link but am too new, it stripped out the actual address. That one I found was very good also.

But in the end, I setup a great set of daily reports and I just plow through them first thing in the morning and make my notes based on the reports.

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...