Currently we are setting up Graylog to monitor Active Directory account logins / logouts and lockouts
I have searched all through the forums and couldn’t find an answer so I apologise if this has already been answered elsewhere
So far the failed logins are triggering an alert which is working however its only displaying the AD user name and not the AD domain name. This is based off windows event id 4771
I tried to set it up to group by field TargetUserName and TargetDomainName but this stopped the alert from working. If i have only TargetUserName it works but then no AD domain on the alert which is needed
You could create a pipeline rule which adds a domain field to the message or you could just include the source of the message which as you said, would be the domain controller.