AUDIT_USER_TIMESTAMPS
This check queries for inactive accounts by looking at the user timestamps.
Usage
<custom_item>
type: AUDIT_USER_TIMESTAMPS
description: "Users not logged in past 7 or more days."
value_type: POLICY_DAY
value_data: "7"
timestamp: "LogonTime"
ignore_users: "Admin*,foo"
check_type: CHECK_GREATER_THAN_OR_EQUAL
</custom_item>
The keyword timestamp allows following values:
LogonTime
LogoffTime
KickoffTime
PassLastSet
PassCanChange
PassMustChange
ACB
Considerations:
- By default, accounts that are disabled, or those for which passwords cannot change or never expire are excluded from the result. They can be included as follows:
include_users: "password never expires" || "cannot change password" || "disabled"
-
By default only those users with SID ranges within “SMB Use Host SID to Enumerate Local Users/SMB Use Domain SID to Enumerate Users” preference range.
Examples
The check also has the capability to exclude certain users from the result via the ignore_users
directive:
<custom_item>
type: AUDIT_USER_TIMESTAMPS
description: "Password not changed in last 90 days"
value_type: POLICY_DAY
value_data: "90"
timestamp: "PassLastSet"
ignore_users: "Admin*,foo"
check_type: CHECK_GREATER_THAN_OR_EQUAL
</custom_item>