Linux
Log Triage:
Read Audit.log files:
ausearch -if /path/to/your/audit.log
# can specify date range by -st -et (start / end)
Sessions:
sudo grep -rniE "session opened for|accepted password|new session|not in sudoers" -i /var/log/
Login logs:
stored within either wtmp or utmp, can be executed as:
last #for the local system
#or
last -f /path/to/wtmp
Last updated