Skip to main content
Skip table of contents

Session Type [7.2]

The type of session described in the log (for example, console, CLI, or web). This field is free text.  

This field is not available in LogRhythm versions earlier than 7.2.1.

Data Type

String (128 characters)

Aliases

UseAlias

Client Console Full Name

Session Type

Client Console Short Name

Session Type

Web Console Tab/Name

Session Type

Elasticsearch Field Name

sessionType

Rule Builder Column Name

SessionType

Regex Pattern

<sessiontype>

NetMon Name

Not applicable

Field Relationships

Common Applications

  • Windows security log lists all types of sessions (logon type)
  • Linux authentication methods

Use Case

Tracking how users are interacting with a system.

MPE/Data Masking Manipulations

Not applicable.

Usage Standards

  • SessionType can exist without Session.
  • Session can exist without a defined Session Type.

Examples

  • Linux Host

10 15 2010 10:50:31 1.1.1.1 <SAU1:INFO> Oct 15 10:50:30 USABLDRRECFLOW01: [ID 702911 Host7] 700 Auth_method_success, Username: pete.store, Auth method: keyboard-interactive, Session-Id: 10707

Keyboard-Interactive parses into Session Type.

  • Windows Event Log

<Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Security-Auditing' Guid='{2222222-5478-4994-a5ba-3e3b0328c30d}'/><EventID>4624</EventID><Version>0</Version><Level>Information</Level><Task>Logon</Task><Opcode>Info</Opcode><Keywords>Audit Success</Keywords><TimeCreated SystemTime='2016-02-09T00:45:00.703363000Z'/><EventRecordID>2269912024</EventRecordID><Correlation/><Execution ProcessID='520' ThreadID='12080'/><Channel>Security</Channel><Computer> USABLDRRECFLOW01</Computer><Security/></System><EventData><Data Name='SubjectUserSid'>NT AUTHORITY\SYSTEM</Data><Data Name='SubjectUserName'>USBO1PDC02$</Data><Data Name='SubjectDomainName'>SAFAWARE</Data><Data Name='SubjectLogonId'>0x3e7</Data><Data Name='TargetUserSid'>NT AUTHORITY\SYSTEM</Data><Data Name='TargetUserName'>SYSTEM</Data><Data Name='TargetDomainName'>NT AUTHORITY</Data><Data Name='TargetLogonId'>0x3e7</Data><Data Name='LogonType'>5</Data><Data Name='LogonProcessName'>Advapi  </Data><Data Name='AuthenticationPackageName'>Negotiate</Data><Data Name='WorkstationName'></Data><Data Name='LogonGuid'>{00000000-0000-0000-0000-000000000000}</Data><Data Name='TransmittedServices'>-</Data><Data Name='LmPackageName'>-</Data><Data Name='KeyLength'>0</Data><Data Name='ProcessId'>0x200</Data><Data Name='ProcessName'>C:\Windows\System32\services.exe</Data><Data Name='IpAddress'>-</Data><Data Name='IpPort'>-</Data></EventData></Event>

LogonType parses into Session Type. Establishes the LogonID as a Service. Service session can be tracked with Session 0x3e7.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.