Click on the event to check it on www.eventid.netAudit events over time`event_sources` ("Audit Success" OR "Audit Failure") AND $Computer$ AND $keyword$ $nopriv$ $nocomputer$ $Audit_Type$
| fillnull
| timechart count$interval.earliest$$interval.latest$Accounts with 3 or more failed logons`event_sources` Failure_Reason=* ("Audit Failure") AND $Computer$ AND $keyword$ $nopriv$ Message != "*privilege*" Account_Name != "*$*"
| table host, Account_Name, Failure_Reason
| stats count by Account_Name
| where count > 2$interval.earliest$$interval.latest$1Audit Failure events by computer`event_sources` "Audit Failure" AND $Computer$ AND $keyword$ $nocomputer$ $nopriv$
| fillnull
| stats count by host$interval.earliest$$interval.latest$1Distinct Accounts`event_sources` AND $Computer$ AND $keyword$ $nopriv$ $nocomputer$ TaskCategory=Logon $Audit_Type$
| stats dc(Account_Name)$interval.earliest$$interval.latest$1Logon Successful Audits`event_sources` AND $keyword$ $nopriv$ $nocomputer$ TaskCategory=Logon
| stats count$interval.earliest$$interval.latest$1Logon Audit Failure events`event_sources` AND $Computer$ AND $keyword$ $nocomputer$ $nopriv$ Failure_Reason=* ("Audit Failure")
| stats count$interval.earliest$$interval.latest$
search?q=`event_sources` Failure_Reason=* * ("Audit Failure") AND $Computer$ AND $keyword$ Message != "*privilege*" Account_Name != "*$*" | stats count&earliest=$interval.earliest$&latest=$interval.latest$
New Local Admins`event_sources`AND $Computer$ AND $keyword$ $nocomputer$ $nopriv$
| transaction Security_ID maxspan=180m
| search EventCode=4720 OR (EventCode=4732 Administrators)
| stats count$interval.earliest$$interval.latest$1Events Summary
`event_sources` AND $Computer$ AND $keyword$ $nopriv$ $nocomputer$ $Audit_Type$
| fillnull
| eval Type=if(Keywords=="Audit Success",Keywords, Type)
| eval Type=if(Keywords=="Audit Failure",Keywords, Type)
| stats earliest(_time) as First latest(_time) as Last max(Message) as Sample_Message count by host, EventCode, Type
| sort -count host, EventCode, Type, Sample_message
| rename EventCode as "EventId"
| fieldformat First=strftime(First,"%x %X") | fieldformat Last=strftime(Last,"%x %X")$interval.earliest$$interval.latest$
https://www.eventid.net/display.asp?eventid=$row.EventId$&source=$row.SourceName$&app=SplunkEvId
Audit Failure Events
`event_sources` AND $Computer$ AND $keyword$ $nocomputer$ $nopriv$ AND "Audit Failure"
| fillnull
| eval user=mvindex(Account_Name,1)
| table _time, host, EventCode, Message, user, Failure_Reason, Source_Workstation, Caller_Process_Name
| rename EventCode as "EventId", Caller_Process_Name as Process$interval.earliest$$interval.latest$
Accounts successfully logged on`event_sources`AND $Computer$ AND $keyword$ $nocomputer$ $nopriv$ AND TaskCategory=Logon AND NOT Account_Name="*ANONYMOUS*"
| timechart count$interval.earliest$$interval.latest$Audit Success Events