auth.all
Scope
This table collects information about various authentication events generated by different platforms, including cloud distributors, virtual private networks (VPNs), databases, firewalls, and application delivery services. Working with this table will help you detect credential access threats.
Send data to Devo
Among the 41 compatible data sources, the most popular and security-critical are:
Source tables
The information displayed is extracted from the following tables:
Table structure
This is the set of columns displayed by this union table, which is the result of the collection of columns present in all source tables:
Extra fields
Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.
Field | Type | Extra fields |
---|---|---|
eventdate |
|
|
source |
|
|
action |
|
|
machine |
|
|
hostname |
|
|
application |
|
|
domain |
|
|
user |
|
|
source_ip |
|
|
source_ipv4 |
|
|
source_hostname |
|
|
source_user |
|
|
username |
|
|
user_identity_username |
|
|
result |
|
|
message |
| ✓ |
hostchain |
| ✓ |
tag |
| ✓ |
Secure it
The following Exchange Alert Packs help monitor events from this table by specifically installing the included alerts:
Authentication Log Threat Detection Suite
Collective Defense Overview
Exploitation for Defense Evasion (MITRE Att&ck Technique: T1211)
Ping Identity MFA
Field transformations
Even though all source tables have several features in common, they have some particularities that make it necessary to undergo a set of transformations to harmonize them for the union table. The most common transformations comprise changes in the data type or the application of rules when several columns in the source table feed a single column in the union table. You can find below the detailed list of transformations in each source table.