Windows User Account Activity Delete User (via Splunk)

info Nessus Network Monitor Plugin ID 710005

Synopsis

SIEM Pull Service has detected via Splunk query that, on this Windows system, a user account was deleted.

Description

SIEM Pull Service has detected via Splunk query that, on this Windows system, a user account was deleted. The query used was (sourcetype="WinEventLog:Security" AND Message="A user account was deleted*")

Solution

N/A

Plugin Details

Severity: Info

ID: 710005

Family: Policy

Published: 8/20/2004

Updated: 5/18/2018