
Summary
This detection rule is designed to identify user log-off events in a Windows environment, specifically monitoring Event IDs 4634 and 4647. These events indicate that a user has logged off from the system, which is a key interaction that may be relevant during forensic investigations. By correlating log-off events with other user activity logs, security analysts can develop a timeline of user actions, potentially uncover unauthorized access or other suspicious behaviors. The rule is categorized as informational, suggesting that it provides valuable context that should be reviewed but does not necessarily signal an immediate threat. This functionality is critical in environments where user activity is scrutinized for compliance, misconduct, or incident response scenarios.
Categories
- Windows
- Endpoint
Data Sources
- User Account
- Application Log
- Logon Session
Created: 2022-10-14