Hello there!
The rule itself gives a warning each time the authentication of a user is correct.
Here is the form in which it is configured:
<!-- Attack signatures -->
<group name="syslog,attacks,">
<rule id="40101" level="12">
<if_group>authentication_success</if_group>
<user>$SYS_USERS</user>
<description>System user successfully logged to the system.</description>
<mitre>
<id>T1078</id>
</mitre>
<group>invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.8,gdpr_IV_35.7.d,gdpr_IV_32.2,hipaa_164.312.b,nist_800_53_AU.14,nist_800_53_AC.7,tsc_CC6.1,tsc_CC6.8,tsc_CC7.2,tsc_CC7.3,</group>
</rule>
The alert is arriving to you by mail for the level that composes
it, you must have configured that the alerts of that level are sent to
your mail.
Can you verify which agent is affected by this alert?
Regards,
Emiliano.