Defender-DeviceLogonEvents
4 events across 4 channels
| Event ID | Title | Channel |
|---|---|---|
| 9003000 | Logon activity (any) | DeviceLogonEvents |
| 9003001 | Logon succeeded | LogonSuccess |
| 9003002 | Logon failed | LogonFailed |
| 9003003 | Logon attempted (no result yet) | LogonAttempted |
Event ID 9003000 — Logon activity (any)
Description
Logon activity (any)
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
ActionType | — |
LogonType | — |
AccountName | — |
AccountDomain | — |
AccountSid | — |
RemoteIP | — |
RemotePort | — |
IsLocalAdmin | — |
InitiatingProcessFileName | — |
FailureReason | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-devicelogonevents-table
Event ID 9003001 — Logon succeeded
#Description
Logon succeeded
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
LogonType | — |
AccountName | — |
AccountDomain | — |
RemoteIP | — |
RemotePort | — |
IsLocalAdmin | — |
Detection Patterns #
Credential Access: Password Spraying
Defender-DeviceLogonEvents Event ID 9003001: Logon succeededANDEvent ID 9003002: Logon failedANDSecurity-Auditing Event ID 4624: An account was successfully logged on.ANDEvent ID 4625: An account failed to log on.
7 rules
Splunk
Kusto Query Language
Show 1 more (4 total)
Lateral Movement: Exploitation of Remote Services
Defender-DeviceLogonEvents Event ID 9003001: Logon succeeded→Security-Auditing Event ID 4624: An account was successfully logged on.
1 rule
Kusto Query Language
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-devicelogonevents-table
Event ID 9003002 — Logon failed
#Description
Logon failed
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
LogonType | — |
AccountName | — |
AccountDomain | — |
RemoteIP | — |
FailureReason | — |
Detection Patterns #
Credential Access: Password Spraying
Defender-DeviceLogonEvents Event ID 9003001: Logon succeededANDEvent ID 9003002: Logon failedANDSecurity-Auditing Event ID 4624: An account was successfully logged on.ANDEvent ID 4625: An account failed to log on.
7 rules
Splunk
Kusto Query Language
Show 1 more (4 total)
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-devicelogonevents-table
Event ID 9003003 — Logon attempted (no result yet)
Description
Logon attempted (no result yet)
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
LogonType | — |
AccountName | — |
RemoteIP | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-devicelogonevents-table