Mappings: Windows - Security - 4627
Input | Value |
---|---|
Vendor | Microsoft |
Product | Windows |
Log Format | Windows |
Event ID Regex Pattern | Security-4627 |
Output | Value |
---|---|
Vendor | Microsoft |
Product | Windows |
Record Type | Audit |
Cloud SIEM Schema Field | Original Record Key | Notes |
---|---|---|
description | None | The static text This event generates with “4624(S) An account was successfully logged on” and shows the list of groups that the logged-on account belongs to. is populated in this schema field. |
device_hostname | Computer | |
logonType | EventData.LogonType | This is a lookup field. More info to come in the catalog later... |
timestamp | TimeCreated.SystemTime | We expect the orginal record value of TimeCreated.SystemTime is in the format yyyy-MM-dd'T'HH:mm:ss.SSSSSSSSSZ |
user_authDomain | EventData.TargetDomainName | |
user_userId | EventData.TargetUserSid | |
user_username | EventData.TargetUserName |