Hi @APaul Looking into CloudTrail's options for the type field, I don't see an option for "Consolepassword" : https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-user-identity.html#cloudtrail-event-reference-user-identity-fields All types though do not differentiate consoel vs. API operation, just where did it come from, i.e. other account, AD, IAM, assumed role etc. I think using JSON rule for eventtype might be more beneficial. More info on AWS page, look for eventType: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-record-contents.html AwsApiCall – An API was called. AwsServiceEvent – The service generated an event related to your trail. For example, this can occur when another account made a call with a resource that you own. AwsConsoleSignin – A user in your account (root, IAM, federated, SAML, or SwitchRole) signed in to the AWS Management Console. So consider doing: event where cloud.type = 'aws' AND operation = 'CreateInstanceSnapshot' AND json.rule = $.eventType = "AwsApiCall" In addition, you can add a filter to include specific email addresses with MATCHES or excluding specific known users from the output. Did that help?
... View more