Detection rules › Sigma

User Logoff Event

Severity
informational
Author
frack113
Source
upstream

Detects a user log-off activity. Could be used for example to correlate information during forensic investigations

MITRE ATT&CK coverage

TacticTechniques
ImpactT1531 Account Access Removal

Event coverage

ProviderEvent IDTitle
Security-Auditing4634An account was logged off.
Security-Auditing4647User initiated logoff.

Stages and Predicates

Stage 1: selection