Monitoring and alerting for activities of expired user accounts

Security Matthias Maier

Hello,

When it comes to insider threats and user activity monitoring, I see a very common use case that works extremely well across multiple industries. I want to share it with you in this blog post.

Monitoring and alerting for activities of expired user accounts

windows-account-expires

Your company can have a lot of different user accounts – not just the internal employed worker. There might be more focus on external contractors who move in and out more often or even B2B portals with intellectual property exchange.

If you need to monitor expired accounts, it comes down to the following:

You need to have the username, expire date and user activity data. To get the expire date information is some homework.

Here are two pieces advice:

Once you have done this, you have already enhanced your visibility and security maturity for your company. From there, you can keep on top of unauthorized activities and find any broken business processes.

Enterprise Security - Expired Identities

What you’ll discover when an event is generated?

Enterprise Security - Expired Identities Correlation Search The Splunk App for Enterprise Security is shipped with this use case out of the box and brings you templates and mechanism to built the identity lists, predefined dashboard as well as a correlation search that triggers.

Happy Splunking,

Matthias

Related Articles

Splunk SOAR Playbooks: Conducting an Azure New User Census
Security
3 Minute Read

Splunk SOAR Playbooks: Conducting an Azure New User Census

Learn how to use automated playbooks to monitor new user accounts to ensure that threat actors like Hafnium cannot leverage the Active Directory system to exploit vulnerabilities.
Use Cloud Infrastructure Data Model to Detect Container Implantation (MITRE T1525)
Security
7 Minute Read

Use Cloud Infrastructure Data Model to Detect Container Implantation (MITRE T1525)

Using cloud infrastructure data model to detect possible container implantation (Mitre Cloud Matrix technique T1525)
A Path to Proactive Security Through Automation
Security
2 Minute Read

A Path to Proactive Security Through Automation

The sheer number of cyberattacks launched against organizations every year is massive and growing. Learn how automation can help your security team chart a new path forward.