Auth Logs

Overview

Evidence: Auth Logs Description: Collect Auth Logs Category: System Platform: linux Short Name: authl Is Parsed: No Sent to Investigation Hub: No Collect File(s): Yes

Background

Linux auth logs record all authentication-related events including user logins, sudo commands, SSH access attempts, su commands, and PAM (Pluggable Authentication Modules) activities. Found primarily on Debian-based systems.

Data Collected

This collector gathers structured data about auth logs.

Collection Method

This collector gathers auth log files from /var/log/auth*, including rotated logs, which contain detailed authentication and authorization events.

Forensic Value

Auth logs are critical for investigating unauthorized access, privilege escalation, brute force attacks, SSH intrusions, and user activity. They provide essential evidence for security incident investigations and compliance auditing.

Last updated

Was this helpful?