Event ID 9003001 — Logon succeeded
Description
Logon succeeded
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
LogonType | — |
AccountName | — |
AccountDomain | — |
RemoteIP | — |
RemotePort | — |
IsLocalAdmin | — |
Detection Patterns #
Credential Access: Password Spraying
Defender-DeviceLogonEvents Event ID 9003001: Logon succeededANDEvent ID 9003002: Logon failedANDSecurity-Auditing Event ID 4624: An account was successfully logged on.ANDEvent ID 4625: An account failed to log on.
7 rules
Splunk
Kusto Query Language
Show 1 more (4 total)
Lateral Movement: Exploitation of Remote Services
Defender-DeviceLogonEvents Event ID 9003001: Logon succeeded→Security-Auditing Event ID 4624: An account was successfully logged on.
1 rule
Kusto Query Language
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-devicelogonevents-table