Monitoring and alerting for activities of expired user accounts

Hello,

When it comes to insider threats and user activity monitoring, I see a very common use case that works extremely well across multiple industries. I want to share it with you in this blog post.

Monitoring and alerting for activities of expired user accounts

windows-account-expires

Your company can have a lot of different user accounts – not just the internal employed worker. There might be more focus on external contractors who move in and out more often or even B2B portals with intellectual property exchange.

If you need to monitor expired accounts, it comes down to the following:

You need to have the username, expire date and user activity data. To get the expire date information is some homework.

Here are two pieces advice:

Once you have done this, you have already enhanced your visibility and security maturity for your company. From there, you can keep on top of unauthorized activities and find any broken business processes.

Enterprise Security - Expired Identities

What you’ll discover when an event is generated?

Enterprise Security - Expired Identities Correlation Search The Splunk App for Enterprise Security is shipped with this use case out of the box and brings you templates and mechanism to built the identity lists, predefined dashboard as well as a correlation search that triggers.

Happy Splunking,

Matthias

Related Articles

Staff Picks for Splunk Security Reading July 2021
Security
2 Minute Read

Staff Picks for Splunk Security Reading July 2021

These monthly postings will feature the favorite security-centric presentations, white papers and customer case studies from various peeps in the Splunk (or not) security world that WE think everyone should read. If you would like to read other months, please take a peek at previous posts in the "Staff Picks" series!
Baseline Hunting with the PEAK Framework
Security
9 Minute Read

Baseline Hunting with the PEAK Framework

Splunker David Bianco provides an in-depth look at baseline hunts, also known as Exploratory Data Analysis (EDA) hunts.
Playbook: Investigate IP Address Performing Reconnaissance Activity
Security
1 Minute Read

Playbook: Investigate IP Address Performing Reconnaissance Activity

Phantom can receive reconnaissance alerts and automate key investigation steps to increase efficiency and speed decision making.