Event Name - UserLogonFailed2

UserLogonFailed2 will aggregate data from Falcon and Windows ETW when available (assuming you're using a more modern Windows operating system) and UserLongFailed will rely exclusively on Falcon data.

Description

Platforms: Linux, ChromeOS, macOS

Platforms: Windows

An event that indicates that a local user attempted to logon, but failed due to bad password. LogonTime is the last successful logon time. The remote information will be present only if the logon originated over the network. RawProcessId will attribute a pid if relevant.

Fields: Linux, ChromeOS, macOS

Field

Description

ContextTimeStamp

System time of event creation.

UserName

LogonTime

LogonType

Values:

  • INTERACTIVE (2)

  • NETWORK (3)

  • BATCH (4)

  • SERVICE (5)

  • PROXY (6)

  • UNLOCK (7)

  • NETWORK_CLEARTEXT (8)

  • NEW_CREDENTIALS (9)

  • REMOTE_INTERACTIVE (10)

  • CACHED_INTERACTIVE (11)

  • CACHED_REMOTE_INTERACTIVE (12)

  • CACHED_UNLOCK (13)

UID

Unix User Identifier.

UserIsAdmin

Set to TRUE if this user is a local admin.

PasswordLastSet

RemoteAddressIP4

RemoteAddressIP6

Last updated

Was this helpful?