Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all articles
Browse latest Browse all 47296

query azure ad sign-in logs

$
0
0
I have indexed my Azure AD audit and sign-in logs: { [-] Level: 4 callerIpAddress: xxx.xxx.xxx.xxx category: SignInLogs correlationId: xxxxxxxxxxxxxxxxxx durationMs: 0 identity: My User location: IN operationName: Sign-in activity operationVersion: 1.0 properties: { [+] } resourceId: /tenants/xxxxxxxxxxxxxxxxxxxxx/providers/Microsoft.aadiam resultSignature: None resultType: 0 tenantId: xxxxxxxxxxxxxxxx time: 2020-01-08T15:59:39.0169752Z } so I get a nice event in splunk for each sign in, most people log in every day. I would like to create a query that would look at 120 days of sign ins and give me a list of everyone that has not signed in for the past 90 days. (for compliance reasons) anyone know how to set up a query like this? thanks, -ken

Viewing all articles
Browse latest Browse all 47296

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>