Account Provisioning Activity
Details | Query |
Monitor All Activity in the last hour |
|
Monitor Selective Activity in the last hour This is like ‘Monitor All Activity in the last hour’ but will remove any events that do not need immediate attention, but also reveal any new events. |
|
Focus on a specific identity This is useful for the admin to run in the UI on-demand. Tip: Search on common terms, such as sAMAccountName, Display Name and Employee ID to yield full results |
|
Events: Failed Consider building automated alerts/incidents to check if action is required. |
|
Account Activity Failed Consider building automated alerts/incidents to check if action is required. |
|
Account Activity Failed specific source Consider building automated alerts/incidents to check if action is required. |
|
Account Creations Useful for Business Intelligence and Reporting / Trend Analysis. |
|
Account Creations specific source Useful for Business Intelligence and Reporting / Trend Analysis. |
|
Account Disablements Useful for Business Intelligence and Reporting / Trend Analysis. |
|
Account Enablements Useful for Business Intelligence and Reporting / Trend Analysis. |
|
Account Entitlement Add Useful for Business Intelligence and Reporting / Trend Analysis. |
|
Account Entitlement Removal Useful for Business Intelligence and Reporting / Trend Analysis. |
|
Need to understand why mark some as Passed even they contain errors |
|
Provisioning Activity because of a change of Lifecycle State. Useful for Business Intelligence and Reporting. |
|
All Provisioning Activity resulting in Manual Tasks Useful for Business Intelligence and Reporting / Trend Analysis. |
|
All Provisioning Activity also resulting in Manual Tasks This is a useful catch-all. |
|
find entitlements outdife a Role - stand alone | @access(source.name:SAP* AND standalone:true) |
find users with specific Role | @access(name:"RoleName") |
find identities where attribute is not null | attributes.sapusername.exact:* |
find identities where attribute is XXX | attributes.sapusername.exact:YANIV |
find identities where attribute is null |
|
Lifecycle State
Details | Query |
Specific State Useful for Business Intelligence and Reporting and Compliance Checking |
|
Lifecycle State not set Data Integrity and Compliance Checking. All regular identities should have an LCS. |
|
Recent Lifecycle State change Useful for Business Intelligence / Reporting / Compliance Checking / Trend Analysis |
|
LCS Transition from one state to another Useful for Business Intelligence / Reporting / Compliance Checking / Trend Analysis |
|
Compare Lifecycle State to Account State i.e AD enabled but Leaver. Use this for Compliance Checking. |
|
Non-active users with active accounts Use this for Compliance Checking. |
|
Non-active Identity owning a Role, Access Profiles, Governance Group or Source. Tip: Use the Identity ID on a sub-sequent Search to identify the object that needs a new owner. Use this for internal governance. |
|
Identities who are not active and have elevated permissions. Use this for internal governance. |
|
Attribute Sync
Details | Query |
Check results for specific source Useful for Business Intelligence / Reporting / Trend Analysis |
|
Check results for specific source attribute Useful for Business Intelligence / Reporting / Trend Analysis |
|
Check Sync failures in last day Use this for monitoring. Requires action. |
|
Identities General Data
Details | Query |
All identities Tip: Create a saved search of all/most columns available. Download the report and use a spreadsheet to slice and dice data; and see common values in certain columns (i.e., all locations). |
|
Identities with specific Identity Profile Focus on identities in a specific profile or use a NOT condition to filter out. |
|
Specific Attribute with wildcard Filter identities by specific identity attributes. Use AND / OR conditions as needed. Can also be used in a Targeted Access Certification. |
|
Find all identities with a last name which starts with A through M (uses regex). |
|
Start Date within the next two weeks Useful for Business Intelligence / Reporting |
|
Start Date within the last two weeks Useful for Business Intelligence / Reporting |
|
Identities with specific Tag Useful for Business Intelligence / Reporting |
|
Missing Key Data Use this for monitoring. Requires action. |
|
Identities in Error Use this for monitoring. Requires action. |
|
Identities with No Manager Use this for monitoring. Requires action. |
|
Identities who are Managers Useful for Business Intelligence / Reporting |
|
Identities recently modified Useful for Business Intelligence / Reporting |
|
Identities which were recently created Useful for Business Intelligence / Reporting |
|
Identities with a specific start date or end dates Useful for Business Intelligence / Reporting |
|
Find common identities which share manager by display name or ID Useful for Business Intelligence / Reporting |
|
Identities who have authenticated at least once. Do not confuse this with Lifecycle Status. NOTE: Useful for tracking who is using the system and who never has. |
|
Identities with Manually Correlated Accounts Useful for the System Administrator |
|
Identities with AD accounts which have had a password set within a certain period (using AD passwordLastSet timestamp) |
|
Active identities that have anything listed in their personal email attribute |
|
Note: (Elastic) Search uses 'now' as a keyword for current time and date. It also supports date math with the following:
- y (year)
- M (month)
- w (week)
- d (day)
- h (hour)
- m (minute)
- s (second)
It also supports operations:
- - (subtraction)
- + (addition)
- / (round)
So if you say now-1d that is yesterday, and now+1w is next week.
Identity Access Data
These queries are useful for locating identities with specific access and starting a Targeted Access Certification.
Details | Query |
Specific Access Search |
|
Specific Role Search |
|
Specific Entitlement Search |
|
Conflicting Roles Can be used in SoD General Policies |
|
Conflicting Access Can be used in SoD General Policies |
|
Identities with many accounts |
|
Authoritative Source
Details | Query |
Identities Created by a specific Authoritative source in past 7 Days. Useful for Business Intelligence / Reporting |
|
Identities with no AD account on specific Authoritative Source Useful for Business Intelligence / Reporting / Compliance |
|
Recently dropped identities because of the account no longer appearing in the aggregation Useful for Business Intelligence / Reporting |
|
Security: General
The following events are candidates for SIEM.
Details | Query |
Query to see important Security events from the last day. |
|
Track IP addresses of those attempted to start the SSO process in the last 48 hours. |
|
Users successfully authenticated in the last 48 hours. Tip: This is helpful to monitor traffic by end Users and ensure only authorized users are accessing the system. |
|
Track successful Step-up MFA authentication for users. |
|
API Credential Updates |
|
Security: IdentityNow User Level Permissions
The following Searches are used to see who has access above the ‘standard end user’ permissions.
Tip: Run regular Access Certifications for these permissions.
Details | Query |
Identities with Elevated Permissions |
|
Identities withSpecific Elevated Permissions Example: Org Admin. Swap ORG_ADMIN with any other User Permission. |
|
Events: IdentityNow Permissions Granted to Users by whom. |
|
Identities who are not active and have elevated permissions. Use this for internal governance. |
|
Email Notifications Sent
Tip: In the Search Events UI, add the Info column to see the subject line.
Details | Query |
All email sent in the last hour |
|
Specific email subject line sent |
|
Send to specific email address |
|
Access Request
Details | Query |
Specific Emails Sent Useful to see Approval Notifications, Reminders etc. |
|
SDIM Ticket Requests Pending Tip: Useful to see track manual tickets. |
|
Specific Requestor Useful to track requests by a specific identity. |
|
Access Request Approval Forwarded |
|
Access Sunset Removal Temporary Access removed after expiry. |
|
All Access Request Activity Tip: This is a useful catch-all. |
|
Specific Source |
|
Access Certification
These are not substitutes for the campaign reports, but can be used for additional information.
Details | Query |
All Certification Events |
|
All Access Certification Events and Activity |
|
Sign-offs from the last day. |
|
Reassignment |
|
Campaign Creation |
|
Campaign Completion |
|
Access Remediation |
|
Campaign Activation |
|
Campaign Deletion |
|
Update Certification Campaign Filter |
|
Pending Revokes (usually disconnected SDIM sources) |
|
Provisioning Activity, not Pending and not successful (i.e., Failed). |
|
Aggregation and Scheduled Tasks
Details | Query |
Failed Aggregations Tip: Add this to Automated Monitoring and Alerting. |
|
8am and 8pm Scheduled Refresh not Started or Completed Useful for tracking (average) durations and (average) number of identities updated. |
|
Search Subscription Executed Information only. |
|
Configuration
These queries are useful to see configurations that have been created to updated and by whom.
Details | Query |
Creation/Update/Deletion of Access Items like Roles and Access Profiles in them last 90 days. |
|
Non-Employee Lifecycle Management (NELM) |
|
Source Configuration Events in the last 90 days |
|
All main System Config with certain events excluded. |
|
Workflow Configuration |
|
Public References
https://documentation.sailpoint.com/saas/help/search/index.html
Internal References
https://sailpoint.atlassian.net/l/cp/3Hb7Pcqz
https://sailpoint.atlassian.net/l/cp/CcXQkQtS
https://sailpoint.atlassian.net/l/cp/tY4WC11s
more info:
workflow to remove all leavers standing access - inside there is query for stand alone access
https://developer.sailpoint.com/discuss/t/workflow-to-remove-all-leavers-standing-access/13025
https://documentation.sailpoint.com/saas/help/search/building-query.html