Contextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
| Name | Channel |
|---|---|
| auditd:SYSCALL | ssh logins or execve of remote commands |
| auditd:SYSCALL | execve,socket,connect,openat |
| auditd:USER_LOGIN | USER_LOGIN |
| azure:audit | Add delegated admin / Assign admin roles / Update application consent |
| azure:signinLogs | SAML-based login with anomalous issuer or NotOnOrAfter lifetime |
| esxi:auth | None |
| esxi:hostd | /var/log/hostd.log |
| gcp:audit | google.iam.credentials.generateAccessToken / serviceAccountTokenCreator |
| kubernetes:audit | Unauthorized container creation or kubelet exec logs |
| linux:syslog | None |
| linux:syslog | sssd / sudo logs |
| Logon Session | None |
| m365:signin | UserLogin |
| m365:unified | Abnormal user claims or unexpected elevated role assignment in SAML assertion |
| m365:unified | FileAccessed, SharingSet |
| macos:unifiedlog | LoginWindow context with associated PID linked to reopened plist paths |
| macos:unifiedlog | authd generating multiple MFA token requests |
| macos:unifiedlog | Remote login (ssh) or screen sharing authentication attempts |
| macos:unifiedlog | loginwindow or sshd |
| macos:unifiedlog | Group membership change for admin or wheel |
| macos:unifiedlog | Unusual Kerberos TGS-REQ without TGT or anomalous ticket lifetime |
| macos:unifiedlog | loginwindow, sshd |
| macos:unifiedlog | loginwindow or sshd events with external IP |
| macos:unifiedlog | process = 'sshd' |
| NSM:Connections | Successful sudo or ssh from unknown IPs |
| saas:okta | user.session.start, app.oauth2.as.authorize, policy.mfa.bypass |
| saas:okta | user.authentication.sso |
| saas:salesforce | ConnectedApp OAuth policy change / Login as user |
| WinEventLog:Security | EventCode=4672 |
| WinEventLog:Security | EventCode=4624, 4634, 4672, 4768, 4769 |
| WinEventLog:Security | EventCode=4624, 4625, 4768, 4769 |
| WinEventLog:Security | EventCode=4624, 4634, 4672, 4769 |
| WinEventLog:Security | EventCode=4624, 4672 |
| WinEventLog:Security | EventCode=4778, EventCode=4779 |
| WinEventLog:Security | EventCode=4800, 4801 |
| WinEventLog:Security | EventCode=4776,4771,4770 |
| WinEventLog:Security | EventCode=4624,4672 |
| WinEventLog:Security | EventCode=4624, 4672, 4634, 4768, 4769 |