Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Identity Analytics |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
A machine account successfully logged in to a VPN service.
Attacker's Goals
Use an account that was possibly compromised in the past to gain access to the network and access privileged resources.
Investigative actions
- See whether the service login was successful.
- Check whether the account has done any administrative actions it should not usually do.
- Look for more logins and authentications by the account throughout the network.