Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique

Posted on October 22, 2025October 22, 2025 By CWS

When customers authenticate to Microsoft cloud providers, their actions generate authentication occasions recorded throughout a number of logging methods.

Microsoft Entra sign-in logs and Microsoft 365 audit logs seize an identical authentication occasions however signify this vital safety knowledge utilizing completely different codecs.

Safety analysts investigating incidents regularly encounter the UserAuthenticationMethod area in Microsoft 365 sign-in occasions, which shows cryptic numeric values corresponding to 16, 272, or 33554432 with out official documentation from Microsoft explaining their which means.

This undocumented area has posed challenges for safety groups making an attempt to investigate authentication patterns, determine suspicious login actions, or assess phishing-resistant authentication adoption.

The dearth of documentation meant incident responders working in environments the place solely Microsoft 365 audit logs had been out there struggled to know what authentication strategies customers employed throughout sign-in occasions.

By systematic correlation evaluation between Microsoft Entra sign-in logs and Microsoft 365 audit logs, Sekoia analysts found that the UserAuthenticationMethod area operates as a bitfield the place every bit place represents a definite authentication methodology.

This breakthrough permits safety professionals to decode these numeric values into human-readable authentication methodology descriptions.

The analysis crew mapped every bit place to particular authentication strategies by leveraging shared correlation identifiers between the logging methods.

Microsoft 365 audit logs comprise an InterSystemsId area whereas Entra ID logs embody a correlationId area, each referencing an identical authentication occasions.

By matching occasions throughout sources, researchers correlated numeric UserAuthenticationMethod values with detailed authentication methodology descriptions present in Entra ID’s authenticationMethodDetail fields.

Decoding the Bitfield Mapping Method

The bitfield construction permits a number of authentication strategies to seem concurrently in a single numeric worth.

As an illustration, worth 272 converts to binary as 100010000, activating bit 4 representing Password Hash Sync (decimal worth 16) and bit 8 representing by way of Staged Rollout (decimal worth 256), indicating “Password Hash Sync by way of Staged Rollout” because the authentication mechanism.

The mapping encompasses 28 documented bit positions, together with Password within the cloud at bit 0 (decimal 1), Momentary Entry Cross at bit 1, Seamless SSO at bit 2, Home windows Howdy for Enterprise at bit 18 (decimal 262144), and Passkey at bit 25 (decimal 33554432).

Nevertheless, a number of bits stay unmapped together with positions 5, 7, 9-17, 22, and 26.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Audit, Bitfield, Decoding, Events, Log, Mapping, Microsoft, Technique

Post navigation

Previous Post: Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
Next Post: Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition

Related Posts

Disney Agreed to Pay $10 Million for Collection Personal Data From Children Cyber Security News
Axis Communications Vulnerability Exposes Azure Storage Account Credentials Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support Cyber Security News
ScriptCase Vulnerabilities Let Attackers Execute Remote Code and Gain Server Access Cyber Security News
New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
  • Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
  • Here’s How to Solve It 
  • Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
  • Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
  • Here’s How to Solve It 
  • Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News