Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique

Posted on October 22, 2025October 22, 2025 By CWS

When customers authenticate to Microsoft cloud providers, their actions generate authentication occasions recorded throughout a number of logging methods.

Microsoft Entra sign-in logs and Microsoft 365 audit logs seize an identical authentication occasions however signify this vital safety knowledge utilizing completely different codecs.

Safety analysts investigating incidents regularly encounter the UserAuthenticationMethod area in Microsoft 365 sign-in occasions, which shows cryptic numeric values corresponding to 16, 272, or 33554432 with out official documentation from Microsoft explaining their which means.

This undocumented area has posed challenges for safety groups making an attempt to investigate authentication patterns, determine suspicious login actions, or assess phishing-resistant authentication adoption.

The dearth of documentation meant incident responders working in environments the place solely Microsoft 365 audit logs had been out there struggled to know what authentication strategies customers employed throughout sign-in occasions.

By systematic correlation evaluation between Microsoft Entra sign-in logs and Microsoft 365 audit logs, Sekoia analysts found that the UserAuthenticationMethod area operates as a bitfield the place every bit place represents a definite authentication methodology.

This breakthrough permits safety professionals to decode these numeric values into human-readable authentication methodology descriptions.

The analysis crew mapped every bit place to particular authentication strategies by leveraging shared correlation identifiers between the logging methods.

Microsoft 365 audit logs comprise an InterSystemsId area whereas Entra ID logs embody a correlationId area, each referencing an identical authentication occasions.

By matching occasions throughout sources, researchers correlated numeric UserAuthenticationMethod values with detailed authentication methodology descriptions present in Entra ID’s authenticationMethodDetail fields.

Decoding the Bitfield Mapping Method

The bitfield construction permits a number of authentication strategies to seem concurrently in a single numeric worth.

As an illustration, worth 272 converts to binary as 100010000, activating bit 4 representing Password Hash Sync (decimal worth 16) and bit 8 representing by way of Staged Rollout (decimal worth 256), indicating “Password Hash Sync by way of Staged Rollout” because the authentication mechanism.

The mapping encompasses 28 documented bit positions, together with Password within the cloud at bit 0 (decimal 1), Momentary Entry Cross at bit 1, Seamless SSO at bit 2, Home windows Howdy for Enterprise at bit 18 (decimal 262144), and Passkey at bit 25 (decimal 33554432).

Nevertheless, a number of bits stay unmapped together with positions 5, 7, 9-17, 22, and 26.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Audit, Bitfield, Decoding, Events, Log, Mapping, Microsoft, Technique

Post navigation

Previous Post: Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
Next Post: Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition

Related Posts

11 Best SysAdmin Tools – 2025 Cyber Security News
Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure Cyber Security News
Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code Cyber Security News
CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits Cyber Security News
Exploiting ECS Protocol on EC2 to Exfiltrate Cross-Task IAM and Execution Role Credentials Cyber Security News
Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code
  • TARmageddon Flaw in Popular Rust Library Leads to RCE
  • New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials
  • Critical Vulnerabilities Patched in TP-Link’s Omada Gateways
  • Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code
  • TARmageddon Flaw in Popular Rust Library Leads to RCE
  • New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials
  • Critical Vulnerabilities Patched in TP-Link’s Omada Gateways
  • Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News