input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<132>Dec 3 02:51:14 ip-10-1-16-76 drupal: https://shareholders.stark.com|1701571874|access denied|206.100.125.57|https://shareholders.stark.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Dec 3 02:51:14 ip-10-1-16-76 drupal: https://shareholders.stark.com|1701571874|access denied|206.100.125.57|https://shareholders.stark.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: ip-10-1-16-76
localstarttime: Dec 3 02:51:14
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1701571874
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 206.100.125.57 | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"238.154.103.81","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"charlie"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1677515757",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"110.0.5481.104\",\"epkey\":\"EPFEAQTY37XH27QWJVTG\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"238.154.103.81\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pensacola\",\"country\":\"United States\",\"state\":\"Florida\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIKQVT8SKWPB8J2K3BBQ\",\"name\":\"POS - Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"charlie@stark.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-27T16:35:57.063611+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1677515757,\"txid\":\"de2149f9-7564-45e4-ab70-df3e669751a2\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUIQLYUMQU2BQSFFL1RO\",\"name\":\"charlie\"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "POS - Production",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "238.154.103.81",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"238.154.103.81","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"charlie"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"238.154.103.81","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"charlie@stark.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"charlie"}} ::: program=Chrome ::: clientIP=238.154.103.81 ::: userName=charlie ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1677515757
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: POS - Production
messagetype: credential_access
streamName: DUO
clientIP: 238.154.103.81
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"57.230.78.169","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@umbrella.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"janedoe"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch | {
"program": "Chrome",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1677515757",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=remembered_device\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":\"Chrome\",\"browser_version\":\"110.0.5481.104\",\"epkey\":\"EPFEAQTY37XH27QWJVTG\",\"flash_version\":\"uninstalled\",\"hostname\":null,\"ip\":\"57.230.78.169\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":\"uninstalled\",\"location\":{\"city\":\"Pensacola\",\"country\":\"United States\",\"state\":\"Florida\"},\"os\":\"Windows\",\"os_version\":\"10\"},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":null,\"model_version\":null,\"policy_enabled\":true,\"reason\":\"Not requested\",\"trust_level\":\"UNSET\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIKQVT8SKWPB8J2K3BBQ\",\"name\":\"POS - Production\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"janedoe@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"remembered_device\",\"isotimestamp\":\"2023-02-27T16:35:57.063611+00:00\",\"ood_software\":null,\"reason\":\"remembered_device\",\"result\":\"success\",\"timestamp\":1677515757,\"txid\":\"de2149f9-7564-45e4-ab70-df3e669751a2\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUIQLYUMQU2BQSFFL1RO\",\"name\":\"janedoe\"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch",
"sensitivity": "normal",
"application": "POS - Production",
"messagetype": "credential_access",
"streamName": "DUO",
"clientIP": "57.230.78.169",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"57.230.78.169","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@umbrella.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"janedoe"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=remembered_device"] ::: localIP=null ::: message={"access_device":{"browser":"Chrome","browser_version":"110.0.5481.104","epkey":"EPFEAQTY37XH27QWJVTG","flash_version":"uninstalled","hostname":null,"ip":"57.230.78.169","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":"uninstalled","location":{"city":"Pensacola","country":"United States","state":"Florida"},"os":"Windows","os_version":"10"},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":null,"model_version":null,"policy_enabled":true,"reason":"Not requested","trust_level":"UNSET"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIKQVT8SKWPB8J2K3BBQ","name":"POS - Production"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"janedoe@umbrella.com","event_type":"authentication","factor":"remembered_device","isotimestamp":"2023-02-27T16:35:57.063611+00:00","ood_software":null,"reason":"remembered_device","result":"success","timestamp":1677515757,"txid":"de2149f9-7564-45e4-ab70-df3e669751a2","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUIQLYUMQU2BQSFFL1RO","name":"janedoe"}} ::: program=Chrome ::: clientIP=57.230.78.169 ::: userName=janedoe ::: created_at=1677515757 ::: streamName=DUO ::: application=POS - Production ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1677515757 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: Chrome
senderhost: localhost
severitylabel: critical
starttimeutc: 1677515757
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: POS - Production
messagetype: credential_access
streamName: DUO
clientIP: 57.230.78.169
userName: janedoe | Explain this syslog message |
<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "ip-10-1-16-76",
"localstarttime": "Nov 10 17:07:35",
"message": "<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1699636055",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "184.189.86.206"
} | Create a JSON artifact from the message |
<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Nov 10 17:07:35 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699636055|access denied|184.189.86.206|https://shareholders.oscorp.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: ip-10-1-16-76
localstarttime: Nov 10 17:07:35
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1699636055
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 184.189.86.206 | Explain this syslog message |
<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "ip-10-1-16-76",
"localstarttime": "Jan 1 19:07:16",
"message": "<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1704136036",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "16.65.81.182"
} | Create a JSON artifact from the message |
<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Jan 1 19:07:16 ip-10-1-16-76 drupal: https://shareholders.umbrella.com|1704136036|access denied|16.65.81.182|https://shareholders.umbrella.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: ip-10-1-16-76
localstarttime: Jan 1 19:07:16
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1704136036
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 16.65.81.182 | Explain this syslog message |
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Stream Position :20",
"trend micro_deep security agent",
"DPI Flags:8"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags",
"localstarttime": "Oct 1 08:15:18",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0E94916CB4FB",
"clientmac": "0E2E5A6C69C3",
"clientport": 41482,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"serverbytes": 167,
"streamName": "trend micro_deep security agent",
"clientIP": "242.181.129.195",
"serverIP": "194.163.218.51"
} | Create a JSON artifact from the message |
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=194.163.218.51 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=242.181.129.195 dst=194.163.218.51 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Stream Position :20', 'trend micro_deep security agent', 'DPI Flags:8']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 1 08:15:18
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0E94916CB4FB
clientmac: 0E2E5A6C69C3
clientport: 41482
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
serverbytes: 167
streamName: trend micro_deep security agent
clientIP: 242.181.129.195
serverIP: 194.163.218.51 | Explain this syslog message |
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags | {
"senderhost": "34.205.5.2",
"serverport": 443,
"severitylabel": "critical",
"tags": [
"TCP Flags:ACK PSH",
"trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels",
"DPI Note:HTTPTraffic",
"Detected HTTP Traffic Over Secured HTTPS Channels",
"rfc3164",
"Fragmentation Bits:DF 0",
"cef",
"DPI Stream Position :20",
"trend micro_deep security agent",
"DPI Flags:8"
],
"productids": [
30
],
"severitycode": 2,
"sourceinfo": "unknown",
"message": "<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1=\"HTTPTraffic\" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags",
"localstarttime": "Oct 1 08:15:18",
"sensitivity": "normal",
"localhostname": "deepsecurity",
"priority": 134,
"facilitylabel": "local0",
"messagetype": "Detected HTTP Traffic Over Secured HTTPS Channels",
"servermac": "0E94916CB4FB",
"clientmac": "0E2E5A6C69C3",
"clientport": 41482,
"vendorcode": "1003305",
"action": "IDS:Reset",
"protocol": 6,
"facilitycode": 16,
"serverbytes": 167,
"streamName": "trend micro_deep security agent",
"clientIP": "207.198.112.205",
"serverIP": "107.35.117.239"
} | Create a JSON artifact from the message |
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags | Product: Trend Deep Security
Vendor: Trend Micro | Identify this syslog message |
<134>Oct 1 08:15:18 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36136 cn1Label=Host ID dvc=107.35.117.239 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0E:94:91:6C:B4:FB smac=0E:2E:5A:6C:69:C3 TrendMicroDsFrameType=IP src=207.198.112.205 dst=107.35.117.239 in=167 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=41482 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=1 act=IDS:Reset cn3=20 cn3Label=DPI Packet Position cs5=20 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=8 cs6Label=DPI Flags | This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message:
senderhost: 34.205.5.2
serverport: 443
severitylabel: critical
tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Stream Position :20', 'trend micro_deep security agent', 'DPI Flags:8']
productids: [30]
severitycode: 2
sourceinfo: unknown
localstarttime: Oct 1 08:15:18
sensitivity: normal
localhostname: deepsecurity
priority: 134
facilitylabel: local0
messagetype: Detected HTTP Traffic Over Secured HTTPS Channels
servermac: 0E94916CB4FB
clientmac: 0E2E5A6C69C3
clientport: 41482
vendorcode: 1003305
action: IDS:Reset
protocol: 6
facilitycode: 16
serverbytes: 167
streamName: trend micro_deep security agent
clientIP: 207.198.112.205
serverIP: 107.35.117.239 | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t98.21.18.181\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"98.21.18.181","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52514,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t98.21.18.181\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"98.21.18.181\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793060",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "98.21.18.181",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t98.21.18.181\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"98.21.18.181","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t98.21.18.181\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"98.21.18.181","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52514
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793060
streamName: microsoft-windows-security-auditing
clientIP: 98.21.18.181
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t67.168.6.132\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.168.6.132","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52514,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t67.168.6.132\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"67.168.6.132\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793060",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "67.168.6.132",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t67.168.6.132\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.168.6.132","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t67.168.6.132\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"67.168.6.132","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52514
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793060
streamName: microsoft-windows-security-auditing
clientIP: 67.168.6.132
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t136.253.56.122\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.253.56.122","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52509,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t136.253.56.122\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"136.253.56.122\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793057",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "136.253.56.122",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t136.253.56.122\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.253.56.122","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t136.253.56.122\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"136.253.56.122","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52509
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793057
streamName: microsoft-windows-security-auditing
clientIP: 136.253.56.122
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t30.247.202.193\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"30.247.202.193","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52509,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t30.247.202.193\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"30.247.202.193\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793057",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "30.247.202.193",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t30.247.202.193\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"30.247.202.193","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t30.247.202.193\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"30.247.202.193","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52509
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793057
streamName: microsoft-windows-security-auditing
clientIP: 30.247.202.193
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t77.53.127.246\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"77.53.127.246","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52504,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t77.53.127.246\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"77.53.127.246\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793054",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "77.53.127.246",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t77.53.127.246\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"77.53.127.246","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t77.53.127.246\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"77.53.127.246","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52504
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793054
streamName: microsoft-windows-security-auditing
clientIP: 77.53.127.246
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t137.164.89.154\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"137.164.89.154","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52504,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t137.164.89.154\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"137.164.89.154\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793054",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "137.164.89.154",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t137.164.89.154\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"137.164.89.154","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t137.164.89.154\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"137.164.89.154","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52504
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793054
streamName: microsoft-windows-security-auditing
clientIP: 137.164.89.154
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t177.126.35.197\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.126.35.197","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52514,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tOSCORP\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t177.126.35.197\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"177.126.35.197\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"OSCORP\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793060",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "177.126.35.197",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t177.126.35.197\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.126.35.197","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tOSCORP\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t177.126.35.197\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"177.126.35.197","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"OSCORP","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52514
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793060
streamName: microsoft-windows-security-auditing
clientIP: 177.126.35.197
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t55.84.82.110\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.84.82.110","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52514,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.998Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tUMBRELLA\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t55.84.82.110\\n\\tSource Port:\\t\\t52514\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"55.84.82.110\",\"IpPort\":\"52514\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"UMBRELLA\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793060,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793060",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "55.84.82.110",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t55.84.82.110\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.84.82.110","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.998Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t55.84.82.110\n\tSource Port:\t\t52514\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"55.84.82.110","IpPort":"52514","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793060,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52514
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793060
streamName: microsoft-windows-security-auditing
clientIP: 55.84.82.110
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t161.84.116.114\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"161.84.116.114","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52509,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tACME\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t161.84.116.114\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"161.84.116.114\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"ACME\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793057",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "161.84.116.114",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t161.84.116.114\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"161.84.116.114","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tACME\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t161.84.116.114\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"161.84.116.114","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"ACME","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52509
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793057
streamName: microsoft-windows-security-auditing
clientIP: 161.84.116.114
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t23.132.199.137\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.132.199.137","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52509,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.912Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t23.132.199.137\\n\\tSource Port:\\t\\t52509\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"23.132.199.137\",\"IpPort\":\"52509\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793057,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793057",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "23.132.199.137",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t23.132.199.137\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.132.199.137","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.912Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t23.132.199.137\n\tSource Port:\t\t52509\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"23.132.199.137","IpPort":"52509","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793057,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52509
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793057
streamName: microsoft-windows-security-auditing
clientIP: 23.132.199.137
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t235.89.104.109\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.89.104.109","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52504,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tWAYNE\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t235.89.104.109\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"235.89.104.109\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"WAYNE\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793054",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "235.89.104.109",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t235.89.104.109\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.89.104.109","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tWAYNE\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t235.89.104.109\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"235.89.104.109","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"WAYNE","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52504
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793054
streamName: microsoft-windows-security-auditing
clientIP: 235.89.104.109
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t222.205.201.53\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.205.201.53","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | {
"action": "Logon",
"clientport": 52504,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-02T16:08:04.702Z\",\"agent\":{\"ephemeral_id\":\"0346535d-fcb0-41d0-b47d-12e03c86e3d3\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-02T16:08:05.784Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tUMBRELLA\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tMEDIA-CHAIRMANS\\n\\tSource Network Address:\\t222.205.201.53\\n\\tSource Port:\\t\\t52504\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"222.205.201.53\",\"IpPort\":\"52504\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"UMBRELLA\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"MEDIA-CHAIRMANS\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":704,\"thread\":{\"id\":2472}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":89793054,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "89793054",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "222.205.201.53",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t222.205.201.53\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.205.201.53","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-02T16:08:04.702Z","agent":{"ephemeral_id":"0346535d-fcb0-41d0-b47d-12e03c86e3d3","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-02T16:08:05.784Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tUMBRELLA\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tMEDIA-CHAIRMANS\n\tSource Network Address:\t222.205.201.53\n\tSource Port:\t\t52504\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"222.205.201.53","IpPort":"52504","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"UMBRELLA","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"MEDIA-CHAIRMANS"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":704,"thread":{"id":2472}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":89793054,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 52504
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 89793054
streamName: microsoft-windows-security-auditing
clientIP: 222.205.201.53
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"107.160.112.128","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Pewaynetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"fish@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"fish"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664390391",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "66.216.193.16",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=66.216.193.16 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"107.160.112.128\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"66.216.193.16\",\"key\":\"DP2BL85X6KR4J9B9B7N1\",\"location\":{\"city\":\"Pewaynetree City\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-301-1486\"},\"email\":\"fish@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:39:51.016656+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390391,\"txid\":\"684dce55-64bc-4014-b0db-0d3ee0de2c79\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUU41R9N3WD9GOEOFT6T\",\"name\":\"fish\"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "107.160.112.128",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"107.160.112.128","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Pewaynetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"fish@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"fish"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"107.160.112.128","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Pewaynetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"fish@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"fish"}} ::: program=null ::: clientIP=107.160.112.128 ::: userName=fish ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664390391
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 66.216.193.16
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 107.160.112.128
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"254.214.6.198","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Peacmetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"alice"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664390391",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "66.216.193.16",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=66.216.193.16 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"254.214.6.198\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"66.216.193.16\",\"key\":\"DP2BL85X6KR4J9B9B7N1\",\"location\":{\"city\":\"Peacmetree City\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"770-301-1486\"},\"email\":\"alice@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:39:51.016656+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390391,\"txid\":\"684dce55-64bc-4014-b0db-0d3ee0de2c79\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUU41R9N3WD9GOEOFT6T\",\"name\":\"alice\"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "254.214.6.198",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"254.214.6.198","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Peacmetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"alice"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=66.216.193.16 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"254.214.6.198","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"66.216.193.16","key":"DP2BL85X6KR4J9B9B7N1","location":{"city":"Peacmetree City","country":"United States","state":"Georgia"},"name":"770-301-1486"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:39:51.016656+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390391,"txid":"684dce55-64bc-4014-b0db-0d3ee0de2c79","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUU41R9N3WD9GOEOFT6T","name":"alice"}} ::: program=null ::: clientIP=254.214.6.198 ::: userName=alice ::: created_at=1664390391 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390391 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664390391
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 66.216.193.16
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 254.214.6.198
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.137.242.0","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@wayne.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"bob"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664391505",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=bypass_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"157.137.242.0\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Novel Access IP\",\"trust_level\":\"LOW\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"bob@wayne.com\",\"event_type\":\"authentication\",\"factor\":null,\"isotimestamp\":\"2022-09-28T18:58:25.402701+00:00\",\"ood_software\":null,\"reason\":\"bypass_user\",\"result\":\"success\",\"timestamp\":1664391505,\"txid\":\"1da936c8-afe7-4188-82d5-d3a92da7c698\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUYBV08W0XMY31EKUDDT\",\"name\":\"bob\"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "157.137.242.0",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.137.242.0","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@wayne.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"bob"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"157.137.242.0","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"bob@wayne.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"bob"}} ::: program=null ::: clientIP=157.137.242.0 ::: userName=bob ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664391505
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 157.137.242.0
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"241.120.115.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@stark.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"alice"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664391505",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "null",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=bypass_user\"] ::: localIP=null ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"241.120.115.6\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Novel Access IP\",\"trust_level\":\"LOW\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":null,\"key\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"name\":null},\"email\":\"alice@stark.com\",\"event_type\":\"authentication\",\"factor\":null,\"isotimestamp\":\"2022-09-28T18:58:25.402701+00:00\",\"ood_software\":null,\"reason\":\"bypass_user\",\"result\":\"success\",\"timestamp\":1664391505,\"txid\":\"1da936c8-afe7-4188-82d5-d3a92da7c698\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUYBV08W0XMY31EKUDDT\",\"name\":\"alice\"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "241.120.115.6",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"241.120.115.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@stark.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"alice"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=bypass_user"] ::: localIP=null ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"241.120.115.6","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Novel Access IP","trust_level":"LOW"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":null,"key":null,"location":{"city":null,"country":null,"state":null},"name":null},"email":"alice@stark.com","event_type":"authentication","factor":null,"isotimestamp":"2022-09-28T18:58:25.402701+00:00","ood_software":null,"reason":"bypass_user","result":"success","timestamp":1664391505,"txid":"1da936c8-afe7-4188-82d5-d3a92da7c698","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUYBV08W0XMY31EKUDDT","name":"alice"}} ::: program=null ::: clientIP=241.120.115.6 ::: userName=alice ::: created_at=1664391505 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664391505 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664391505
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: null
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 241.120.115.6
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"130.130.70.57","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"alice"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664390759",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "104.57.143.30",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=104.57.143.30 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"130.130.70.57\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"104.57.143.30\",\"key\":\"DPLEDCBGTCNYR4ZGYUWR\",\"location\":{\"city\":\"Lawrenceville\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-585-3819\"},\"email\":\"alice@acme.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:45:59.200307+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390759,\"txid\":\"be534145-29ea-4bdf-8b1a-c578a69b6a24\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUUXA1FSHP9SST6I3PAF\",\"name\":\"alice\"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "130.130.70.57",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"130.130.70.57","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"alice"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"130.130.70.57","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"alice@acme.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"alice"}} ::: program=null ::: clientIP=130.130.70.57 ::: userName=alice ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664390759
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 104.57.143.30
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 130.130.70.57
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"196.16.172.215","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"fish"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664390759",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "104.57.143.30",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=104.57.143.30 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"196.16.172.215\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"104.57.143.30\",\"key\":\"DPLEDCBGTCNYR4ZGYUWR\",\"location\":{\"city\":\"Lawrenceville\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-585-3819\"},\"email\":\"fish@stark.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:45:59.200307+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390759,\"txid\":\"be534145-29ea-4bdf-8b1a-c578a69b6a24\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DUUXA1FSHP9SST6I3PAF\",\"name\":\"fish\"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "196.16.172.215",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"196.16.172.215","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"fish"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=104.57.143.30 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"196.16.172.215","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"104.57.143.30","key":"DPLEDCBGTCNYR4ZGYUWR","location":{"city":"Lawrenceville","country":"United States","state":"Georgia"},"name":"912-585-3819"},"email":"fish@stark.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:45:59.200307+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390759,"txid":"be534145-29ea-4bdf-8b1a-c578a69b6a24","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DUUXA1FSHP9SST6I3PAF","name":"fish"}} ::: program=null ::: clientIP=196.16.172.215 ::: userName=fish ::: created_at=1664390759 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390759 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664390759
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 104.57.143.30
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 196.16.172.215
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"240.28.185.102","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"charlie"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664390688",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "75.146.93.165",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.146.93.165 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"240.28.185.102\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.146.93.165\",\"key\":\"DPVIFCUAU7XAF1ETBLS9\",\"location\":{\"city\":\"Savannah\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-663-7294\"},\"email\":\"charlie@wayne.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:44:48.168687+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390688,\"txid\":\"c41a55c4-524e-4a02-b42a-be52c7a4cbb4\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8YY3NECNP8JFXUSTWX\",\"name\":\"charlie\"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "240.28.185.102",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"240.28.185.102","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"charlie"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"240.28.185.102","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"charlie@wayne.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"charlie"}} ::: program=null ::: clientIP=240.28.185.102 ::: userName=charlie ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664390688
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 75.146.93.165
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 240.28.185.102
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"21.56.56.3","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"fish"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | {
"program": "null",
"senderhost": "localhost",
"severitylabel": "critical",
"starttimeutc": "1664390688",
"tags": [
"DUO",
"credential_access"
],
"productids": [
0
],
"severitycode": 2,
"sourceinfo": "unknown",
"localip": "75.146.93.165",
"sensitivity": "normal",
"application": "Microsoft RDP",
"messagetype": "credential_access",
"clienthostname": "TS03",
"message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=75.146.93.165 ::: message={\"access_device\":{\"browser\":null,\"browser_version\":null,\"epkey\":null,\"flash_version\":null,\"hostname\":\"TS03\",\"ip\":\"21.56.56.3\",\"is_encryption_enabled\":\"unknown\",\"is_firewall_enabled\":\"unknown\",\"is_password_set\":\"unknown\",\"java_version\":null,\"location\":{\"city\":null,\"country\":null,\"state\":null},\"os\":null,\"os_version\":null},\"adaptive_trust_assessments\":{\"more_secure_auth\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Normal level of trust; no detection of known attack pattern\",\"trust_level\":\"NORMAL\"},\"remember_me\":{\"features_version\":\"3.0\",\"model_version\":\"2022.07.19.001\",\"policy_enabled\":false,\"reason\":\"Known Access IP\",\"trust_level\":\"NORMAL\"}},\"alias\":\"\",\"application\":{\"key\":\"DIR75ZP575GMX3E3CEZE\",\"name\":\"Microsoft RDP\"},\"auth_device\":{\"ip\":\"75.146.93.165\",\"key\":\"DPVIFCUAU7XAF1ETBLS9\",\"location\":{\"city\":\"Savannah\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"912-663-7294\"},\"email\":\"fish@umbrella.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-28T18:44:48.168687+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1664390688,\"txid\":\"c41a55c4-524e-4a02-b42a-be52c7a4cbb4\",\"user\":{\"groups\":[\"DuoUsers (from AD sync \\\"AD Sync\\\")\"],\"key\":\"DU8YY3NECNP8JFXUSTWX\",\"name\":\"fish\"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch",
"streamName": "DUO",
"clientIP": "21.56.56.3",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"21.56.56.3","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"fish"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | Product: DUO
Vendor: DUO | Identify this syslog message |
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=75.146.93.165 ::: message={"access_device":{"browser":null,"browser_version":null,"epkey":null,"flash_version":null,"hostname":"TS03","ip":"21.56.56.3","is_encryption_enabled":"unknown","is_firewall_enabled":"unknown","is_password_set":"unknown","java_version":null,"location":{"city":null,"country":null,"state":null},"os":null,"os_version":null},"adaptive_trust_assessments":{"more_secure_auth":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Normal level of trust; no detection of known attack pattern","trust_level":"NORMAL"},"remember_me":{"features_version":"3.0","model_version":"2022.07.19.001","policy_enabled":false,"reason":"Known Access IP","trust_level":"NORMAL"}},"alias":"","application":{"key":"DIR75ZP575GMX3E3CEZE","name":"Microsoft RDP"},"auth_device":{"ip":"75.146.93.165","key":"DPVIFCUAU7XAF1ETBLS9","location":{"city":"Savannah","country":"United States","state":"Georgia"},"name":"912-663-7294"},"email":"fish@umbrella.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-28T18:44:48.168687+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1664390688,"txid":"c41a55c4-524e-4a02-b42a-be52c7a4cbb4","user":{"groups":["DuoUsers (from AD sync \"AD Sync\")"],"key":"DU8YY3NECNP8JFXUSTWX","name":"fish"}} ::: program=null ::: clientIP=21.56.56.3 ::: userName=fish ::: created_at=1664390688 ::: streamName=DUO ::: application=Microsoft RDP ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1664390688 ::: clientHostname=TS03 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message:
program: null
senderhost: localhost
severitylabel: critical
starttimeutc: 1664390688
tags: ['DUO', 'credential_access']
productids: [0]
severitycode: 2
sourceinfo: unknown
localip: 75.146.93.165
sensitivity: normal
application: Microsoft RDP
messagetype: credential_access
clienthostname: TS03
streamName: DUO
clientIP: 21.56.56.3
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"janedoe","email":"janedoe"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"janedoe","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"janedoe\",\"email\":\"janedoe\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"janedoe\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"69.177.195.46\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"69.177.195.46\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "69.177.195.46",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"janedoe","email":"janedoe"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"janedoe","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"janedoe","email":"janedoe"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"janedoe","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"69.177.195.46","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=69.177.195.46 ::: userName=janedoe ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 69.177.195.46
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"fish\",\"email\":\"fish\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"fish\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"115.175.121.214\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"115.175.121.214\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "115.175.121.214",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"fish","email":"fish"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"fish","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"115.175.121.214","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=115.175.121.214 ::: userName=fish ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 115.175.121.214
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"alice","email":"alice"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"alice","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"alice\",\"email\":\"alice\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"alice\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"252.104.142.5\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"252.104.142.5\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "252.104.142.5",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"alice","email":"alice"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"alice","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"alice","email":"alice"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://wayne.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://wayne.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://wayne.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"alice","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"252.104.142.5","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=252.104.142.5 ::: userName=alice ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 252.104.142.5
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"charlie","email":"charlie"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"charlie","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | {
"action": "FAILURE",
"georegion": "United States",
"message": "WitFoo-Artifact ::: tags=[\"description=Authenticate user with AD agent\",\"userDisplay=undefined | undefined\",\"reason=WitFoo.Switch(FAILURE)\"] ::: action=FAILURE ::: message={\"user\":{\"id\":\"00u176suj2KgPRj9K697\",\"status\":\"ACTIVE\",\"created\":\"2022-05-27T15:49:21.000Z\",\"activated\":\"2022-05-27T15:49:22.000Z\",\"statusChanged\":\"2023-05-03T17:47:47.000Z\",\"lastLogin\":\"2023-05-18T17:12:00.000Z\",\"lastUpdated\":\"2023-05-18T23:25:08.000Z\",\"passwordChanged\":\"2023-05-03T17:47:47.000Z\",\"type\":{\"id\":\"oty16ygr7f2XinpEr697\"},\"profile\":{\"firstName\":\"IT\",\"lastName\":\"Support\",\"mobilePhone\":null,\"secondEmail\":\"\",\"login\":\"charlie\",\"email\":\"charlie\"},\"credentials\":{\"password\":{},\"provider\":{\"type\":\"OKTA\",\"name\":\"OKTA\"}},\"_links\":{\"suspend\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend\",\"method\":\"POST\"},\"schema\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697\"},\"resetPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password\",\"method\":\"POST\"},\"forgotPassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password\",\"method\":\"POST\"},\"expirePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password\",\"method\":\"POST\"},\"changeRecoveryQuestion\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question\",\"method\":\"POST\"},\"self\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697\"},\"resetFactors\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors\",\"method\":\"POST\"},\"type\":{\"href\":\"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697\"},\"changePassword\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password\",\"method\":\"POST\"},\"deactivate\":{\"href\":\"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate\",\"method\":\"POST\"}}},\"event\":{\"actor\":{\"id\":\"00u176suj2KgPRj9K697\",\"type\":\"User\",\"alternateId\":\"charlie\",\"displayName\":\"IT Support\",\"detailEntry\":null},\"client\":{\"userAgent\":{\"rawUserAgent\":\"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)\",\"os\":\"Windows 8\",\"browser\":\"UNKNOWN\"},\"zone\":\"null\",\"device\":\"Computer\",\"id\":\"cappT0Hfy97F1BoO1UTR\",\"ipAddress\":\"183.69.40.2\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}}},\"device\":null,\"authenticationContext\":{\"authenticationProvider\":\"ACTIVE_DIRECTORY\",\"credentialProvider\":null,\"credentialType\":\"PASSWORD\",\"issuer\":null,\"interface\":null,\"authenticationStep\":0,\"externalSessionId\":\"trs4ZQiDLMoSUqEM0Kd9RGg1g\"},\"displayMessage\":\"Authenticate user with AD agent\",\"eventType\":\"user.authentication.auth_via_AD_agent\",\"outcome\":{\"result\":\"FAILURE\",\"reason\":\"Login Failed\"},\"published\":\"2023-08-23T20:27:23.871Z\",\"securityContext\":{\"asNumber\":22773,\"asOrg\":\"cox communications inc.\",\"isp\":\"cox communications inc.\",\"domain\":\"cox.net\",\"isProxy\":false},\"severity\":\"ERROR\",\"debugContext\":{\"debugData\":{\"requestId\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"dtHash\":\"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae\",\"requestUri\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult\",\"url\":\"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9\"}},\"legacyEventType\":\"app.ad.agent.user_auth.error\",\"transaction\":{\"type\":\"WEB\",\"id\":\"ZOZrq1qngnfF_gs31LeahwAABn4\",\"detail\":{\"requestApiTokenId\":\"00T4inn7xxrmTLuOw696\"}},\"uuid\":\"77da2f15-41f3-11ee-badb-bd4a8a652b04\",\"version\":\"0\",\"request\":{\"ipChain\":[{\"ip\":\"183.69.40.2\",\"geographicalContext\":{\"city\":\"San Diego\",\"state\":\"California\",\"country\":\"United States\",\"postalCode\":\"92101\",\"geolocation\":{\"lat\":32.7203,\"lon\":-117.1552}},\"version\":\"V4\",\"source\":null}]},\"target\":[{\"id\":\"0oa16yxhp6iUzuI2b697\",\"type\":\"AppInstance\",\"alternateId\":\"SDPB.LOCAL\",\"displayName\":\"Active Directory\",\"detailEntry\":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch",
"messagetype": "auth_failure",
"productids": [
6
],
"program": "UNKNOWN",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 2,
"severitylabel": "critical",
"sourceinfo": "unknown",
"tags": [
"userDisplay=undefined | undefined",
"reason=WitFoo.Switch(FAILURE)",
"Okta",
"description=Authenticate user with AD agent",
"auth_failure"
],
"vendorcode": "user.authentication.auth_via_AD_agent",
"streamName": "Okta",
"clientIP": "183.69.40.2",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"charlie","email":"charlie"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"charlie","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | Product: Okta
Vendor: Okta | Identify this syslog message |
WitFoo-Artifact ::: tags=["description=Authenticate user with AD agent","userDisplay=undefined | undefined","reason=WitFoo.Switch(FAILURE)"] ::: action=FAILURE ::: message={"user":{"id":"00u176suj2KgPRj9K697","status":"ACTIVE","created":"2022-05-27T15:49:21.000Z","activated":"2022-05-27T15:49:22.000Z","statusChanged":"2023-05-03T17:47:47.000Z","lastLogin":"2023-05-18T17:12:00.000Z","lastUpdated":"2023-05-18T23:25:08.000Z","passwordChanged":"2023-05-03T17:47:47.000Z","type":{"id":"oty16ygr7f2XinpEr697"},"profile":{"firstName":"IT","lastName":"Support","mobilePhone":null,"secondEmail":"","login":"charlie","email":"charlie"},"credentials":{"password":{},"provider":{"type":"OKTA","name":"OKTA"}},"_links":{"suspend":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/suspend","method":"POST"},"schema":{"href":"https://umbrella.okta.com/api/v1/meta/schemas/user/osc16ygr7f2XinpEr697"},"resetPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_password","method":"POST"},"forgotPassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/forgot_password","method":"POST"},"expirePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/expire_password","method":"POST"},"changeRecoveryQuestion":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_recovery_question","method":"POST"},"self":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697"},"resetFactors":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/reset_factors","method":"POST"},"type":{"href":"https://umbrella.okta.com/api/v1/meta/types/user/oty16ygr7f2XinpEr697"},"changePassword":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/credentials/change_password","method":"POST"},"deactivate":{"href":"https://umbrella.okta.com/api/v1/users/00u176suj2KgPRj9K697/lifecycle/deactivate","method":"POST"}}},"event":{"actor":{"id":"00u176suj2KgPRj9K697","type":"User","alternateId":"charlie","displayName":"IT Support","detailEntry":null},"client":{"userAgent":{"rawUserAgent":"Okta AD Agent/3.16.0 (Microsoft Windows NT 6.2.9200.0; .NET CLR 4.0.30319.42000; 64-bit OS; 64-bit Process; sslpinning=disabled)","os":"Windows 8","browser":"UNKNOWN"},"zone":"null","device":"Computer","id":"cappT0Hfy97F1BoO1UTR","ipAddress":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}}},"device":null,"authenticationContext":{"authenticationProvider":"ACTIVE_DIRECTORY","credentialProvider":null,"credentialType":"PASSWORD","issuer":null,"interface":null,"authenticationStep":0,"externalSessionId":"trs4ZQiDLMoSUqEM0Kd9RGg1g"},"displayMessage":"Authenticate user with AD agent","eventType":"user.authentication.auth_via_AD_agent","outcome":{"result":"FAILURE","reason":"Login Failed"},"published":"2023-08-23T20:27:23.871Z","securityContext":{"asNumber":22773,"asOrg":"cox communications inc.","isp":"cox communications inc.","domain":"cox.net","isProxy":false},"severity":"ERROR","debugContext":{"debugData":{"requestId":"ZOZrq1qngnfF_gs31LeahwAABn4","dtHash":"4aac8811b9ac79c6523518f111da1e6c70883fb115e00ad5a1750e1a3eee59ae","requestUri":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult","url":"/api/1/internal/app/activedirectory/0oa16yxhp6iUzuI2b697/agent/a53173qznyfOdAONy697/actionResult?responseId=4b4726a6-38cc-457a-9f22-bf0891869ca9"}},"legacyEventType":"app.ad.agent.user_auth.error","transaction":{"type":"WEB","id":"ZOZrq1qngnfF_gs31LeahwAABn4","detail":{"requestApiTokenId":"00T4inn7xxrmTLuOw696"}},"uuid":"77da2f15-41f3-11ee-badb-bd4a8a652b04","version":"0","request":{"ipChain":[{"ip":"183.69.40.2","geographicalContext":{"city":"San Diego","state":"California","country":"United States","postalCode":"92101","geolocation":{"lat":32.7203,"lon":-117.1552}},"version":"V4","source":null}]},"target":[{"id":"0oa16yxhp6iUzuI2b697","type":"AppInstance","alternateId":"SDPB.LOCAL","displayName":"Active Directory","detailEntry":null}]}} ::: program=UNKNOWN ::: clientIP=183.69.40.2 ::: userName=charlie ::: geoRegion=United States ::: created_at=2023-08-23T20:27:23.871Z ::: streamName=Okta ::: vendorCode=user.authentication.auth_via_AD_agent ::: messageType=auth_failure ::: pipelineName=Okta ::: severityCode=2 ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Okta by Okta. The following fields were extracted from the message:
action: FAILURE
georegion: United States
messagetype: auth_failure
productids: [6]
program: UNKNOWN
senderhost: kafka.precinct
sensitivity: normal
severitycode: 2
severitylabel: critical
sourceinfo: unknown
tags: ['userDisplay=undefined | undefined', 'reason=WitFoo.Switch(FAILURE)', 'Okta', 'description=Authenticate user with AD agent', 'auth_failure']
vendorcode: user.authentication.auth_via_AD_agent
streamName: Okta
clientIP: 183.69.40.2
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t241.74.198.24\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.74.198.24","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | {
"action": "Logon",
"clientport": 55929,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-06T11:13:25.086Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-06T11:13:26.191Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t241.74.198.24\\n\\tSource Port:\\t\\t55929\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"241.74.198.24\",\"IpPort\":\"55929\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":1332}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":453526063,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "453526063",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "241.74.198.24",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t241.74.198.24\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.74.198.24","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t241.74.198.24\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.74.198.24","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 55929
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 453526063
streamName: microsoft-windows-security-auditing
clientIP: 241.74.198.24
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t0.127.202.209\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"0.127.202.209","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | {
"action": "Logon",
"clientport": 55929,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-06T11:13:25.086Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-06T11:13:26.191Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.oscorp.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t0.127.202.209\\n\\tSource Port:\\t\\t55929\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"NORDC-DC-04.oscorp.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.oscorp.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"0.127.202.209\",\"IpPort\":\"55929\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":1332}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":453526063,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "453526063",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "0.127.202.209",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t0.127.202.209\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"0.127.202.209","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.oscorp.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t0.127.202.209\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"NORDC-DC-04.oscorp.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.oscorp.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"0.127.202.209","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 55929
messagetype: auth_failure
productids: [6]
senderhost: NORDC-DC-04.mingledorffs.com
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 453526063
streamName: microsoft-windows-security-auditing
clientIP: 0.127.202.209
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t116.207.226.42\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.207.226.42","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | {
"action": "Logon",
"clientport": 55929,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-06T11:13:25.086Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-06T11:13:26.191Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.acme.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t116.207.226.42\\n\\tSource Port:\\t\\t55929\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"NORDC-DC-04.acme.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.acme.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"116.207.226.42\",\"IpPort\":\"55929\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":1332}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":453526063,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "NORDC-DC-04.mingledorffs.com",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "453526063",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "116.207.226.42",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t116.207.226.42\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.207.226.42","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.