Files
hayabusa/rules/timeline-rules/Logons/4625-Logon-Failure.yml
Tanaka Zakku bad4429ad0 Rule tuning
2021-11-18 10:31:28 +09:00

14 lines
443 B
YAML

title: Logon Failure
description: Prints logon information
author: Zach Mathis
level: low
detection:
selection:
Channel: Security
EventID: 4625
falsepositives:
- normal system usage
output: 'User: %TargetUserName% : Type: %LogonType% : Workstation: %Workstation% : IP Address: %IpAddress% : SubStatus: %SubStatus% : AuthPackage: %AuthenticationPackageName%'
creation_date: 2021/11/17
updated_date: 2021/11/17