VPN Gateway Logs
NetworkAuthentication & AccessNetwork CaptureSIEM / Log Aggregator
Location
VPN concentrator logs (Cisco AnyConnect, Palo Alto GlobalProtect, OpenVPN, WireGuard)Description
VPN authentication and session logs recording user identity, source IP, connection duration, assigned internal IP, bytes transferred, and authentication method (certificate, MFA, password).
Forensic Value
VPN logs are critical for identifying initial access via stolen VPN credentials, which is a top attack vector for ransomware operators. Concurrent VPN sessions from the same account but different source IPs confirm credential compromise. Sessions from residential proxy or VPS IP ranges (not matching the user typical ISP) indicate attacker access. The assigned internal IP links VPN access to subsequent internal activity in firewall and endpoint logs.
Tools Required
SIEM (Splunk, Elastic)VPN management consolegrepGeoIP lookup tools
Collection Commands
Splunk
index=vpn sourcetype=vpn_logs earliest=-30d | stats count, values(src_ip), dc(src_ip) by user | where dc(src_ip) > 3 | sort -dc(src_ip)
Cisco ASA
show vpn-sessiondb anyconnect | include Username|Login Time|Duration|Public IP | more
OpenVPN
cat /var/log/openvpn/status.log && grep "VERIFY OK\|VERIFY ERROR\|client-connect\|client-disconnect" /var/log/openvpn/openvpn.log > vpn_auth_events.txt
MITRE ATT&CK Techniques
T1133T1078T1110T1078.001T1021.001