Ual

Overview

Evidence: Ual Description: Collect Ual Category: System Platform: Windows Short Name: ual Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

Windows User Access Logging (UAL) provides detailed records of user access to system resources, including files, applications, and network resources. This data is essential for understanding resource access patterns and detecting unauthorized access.

Data Collected

This collector gathers structured data about user access logs.

User Access Logs Data

Field
Description
Example

ID

Primary key (auto-increment)

1

AuthenticatedUserName

Authenticated username

DOMAIN\Administrator

DBName

Database name

SystemIdentity

DBPath

Database path

C:\Windows\System32\LogFiles\SUM\SystemIdentity.mdb

DBYear

Database year

2023

RoleName

Role name

Administrator

RoleGUID

Role GUID

12345678-1234-1234-1234-123456789012

TenantID

Tenant ID

tenant-123

TotalAccesses

Total access count

150

InsertDate

Insert date

2023-10-15 14:30:25

LastAccess

Last access time

2023-10-15 14:30:25

Address

Source address

192.168.1.100

Days

Access days

2023-10-15,2023-10-16

Collection Method

This collector parses the necessary data from the ual table.

This collector collects files from the following locations:

  • C:\Windows\System32\LogFiles\WMI\

Usage

This evidence is crucial for forensic investigations as it provides user access and resource usage information. It helps investigators understand resource access patterns, detect unauthorized access, and investigate access-based attacks. The data can reveal resource access, user behavior, and potential security incidents. Analysts can use this information to identify access compromises, trace user activities, and assess Windows security posture.

Notes

This data may contain sensitive information that should be handled according to data protection requirements. Ensure proper chain of custody is maintained during collection and analysis.

Last updated

Was this helpful?