The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples:
This data component can be collected through the following measures:
Get-EventLog -LogName Security -InstanceId 4624/var/log/utmp, /var/log/wtmp, or /var/log/auth.log for logon events.last or who commands to parse login records./var/log/asl.log or Apple Unified Logs using the log show command.log show --predicate 'eventMessage contains "Authentication succeeded"' --infoaz monitor log-analytics query -w <workspace_id> --analytics-query "AzureActivity | where ActivityStatus == 'Success' and OperationName == 'Sign-in'"| Name | Channel |
|---|---|
| auditd:SYSCALL | capset or setns |
| AWS:CloudTrail | ConsoleLogin, AssumeRole, ListResources |
| AWS:CloudTrail | ConsoleLogin |
| AWS:CloudTrail | Web console logins using session cookies without corresponding MFA event |
| AWS:CloudTrail | ConsoleLogin: If IdP backed by cloud provider, Console login from new IP/agent after correlated endpoint compromise |
| AWS:CloudTrail | SendSSHPublicKey, StartSession (SSM), EC2InstanceConnect |
| AWS:CloudTrail | Temporary security credentials used to authenticate into management console or APIs |
| AWS:CloudTrail | AWS ConsoleLogin, StartSession |
| AWS:CloudTrail | GetConsoleOutput |
| AWS:CloudTrail | sudden role assumption after credential file access |
| AWS:CloudTrail | AssumeRole,AssumeRoleWithSAML,AssumeRoleWithWebIdentity |
| azure:ad | SignInEvents |
| azure:signin | UserLoginSuccess, TokenIssued |
| azure:signin | Microsoft.Compute/virtualMachines/serialConsole/connect/action |
| azure:signinlogs | Abnormal sign-in from scripting tools (PowerShell, AADInternals) |
| azure:signinlogs | Suspicious login to cloud mailbox system |
| azure:signinlogs | Failed MFA attempts, unusual conditional access triggers, login attempts from unexpected IP ranges |
| azure:signinlogs | InteractiveUserLogin: Discovery behavior linked to privileged logins from atypical IP ranges |
| azure:signinlogs | InteractiveUser, ServicePrincipalSignIn |
| azure:signinlogs | InteractiveUser, NonInteractiveUser |
| azure:signinlogs | UserLogin, ConditionalAccessPolicyEvaluated |
| CloudTrail:Signin | SAML login without corresponding IdP authentication log |
| esxi:auth | Shell login or escalation |
| esxi:vmkernel | vim.fault.*, DCUI login, SSH shell |
| gcp:audit | LoginAudit, DriveAudit |
| gcp:audit | cloud.ssh.publicKey.inserted, compute.instances.osLogin |
| gcp:audit | admin.googleapis.com |
| linux:auth | User login event followed by unexpected process tree |
| linux:syslog | sshd: Accepted password/publickey |
| linux:syslog | authentication success after file access |
| linux:syslog | auth.log / secure.log |
| linux:syslog | Accepted publickey/password for * from * port * ssh2 |
| linux:syslog | None |
| Logon Session | None |
| m365:sharepoint | File access with forged or anomalous SAML claims |
| m365:signin | SignInSuccess, RoleAssignmentRead |
| m365:signin | Token usage events with device/user mismatch |
| m365:signinlogs | UserLogin: Discovery operations shortly after account logins from new geolocations |
| m365:signinlogs | UserLoggedIn |
| m365:unified | UserLoggedIn |
| m365:unified | ViewAdminReport |
| macos:unifiedlog | UserLoggedIn |
| macos:unifiedlog | Authentication inconsistencies where commands are executed without corresponding login events |
| macos:unifiedlog | authentication |
| macos:unifiedlog | Session reuse without new auth event |
| macos:unifiedlog | Access to Keychain items or browser credential stores |
| macos:unifiedlog | eventMessage CONTAINS 'screensharingd' or 'AuthorizationRefCreate' |
| macos:unifiedlog | Keychain or user login post-access |
| macos:unifiedlog | authentication plugin load or modification events |
| macos:unifiedlog | loginwindow or sshd successful login events |
| networkdevice:Firewall | Login from untrusted IP, or new admin account accessing firewall console/API |
| NSM:Connections | Mismatch between recorded user logon and active sessions (e.g., wtmp/utmp entries without corresponding authentication in auth.log) |
| NSM:Connections | Missing new login event but session activity continues |
| NSM:Connections | Accepted publickey for user from unusual IP or without tty |
| NSM:Connections | simultaneous or anomalous logon sessions across multiple systems |
| Okta:SystemLog | user.authentication.sso, app.oauth.grant |
| saas:access | Multiple concurrent logins using same cookie from different locations |
| saas:auth | LoginSuccess, APIKeyUse, AdminAction |
| saas:auth | Login, TokenGranted: Discovery actions tied to anomalous login sessions or tokens |
| saas:confluence | logon |
| saas:github | Login from unusual IP, device fingerprint, or location; access token creation from new client |
| saas:okta | user.session.start |
| saas:okta | session.token.reuse |
| saas:zoom | Zoom Admin Dashboard accessed from unfamiliar IP/device |
| WinEventLog:Security | EventCode=4624 |
| WinEventLog:Security | EventCode=4624, 4648 |
| WinEventLog:Security | EventCode=4624 with LogonType=9 or smartcard logon |
| WinEventLog:Security | EventCode=4624 (LogonType=10 or 3), EventCode=4648 |
| WinEventLog:Security | EventCode=4624 (LogonType=3) |
| WinEventLog:Security | Anomalous logon without MFA enforcement |
| WinEventLog:Security | EventCode=4624 (LogonType=10), EventCode=4648 |
| WinEventLog:Security | EventCode=4624, 4672, 4648 |
| WinEventLog:Security | 4624 |
| WinEventLog:Security | EventCode=4624,4648, 4672 |
| WinEventLog:Security | EventCode=4624,4648,4672,4769 |
| WinEventLog:Security | EventID=4624 |
| WinEventLog:Security | EventCode=4624, 4634 |