-
-
Save Kielx/335de238de82b0c9b1b46a3a2450625e to your computer and use it in GitHub Desktop.
windows event logs cheat sheet
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
# PS : ChatGPT makes mistakes, consider "trust but verify" principle | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#Events to Monitor | |
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#run | |
eventvwr.msc Event viewer | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
Event Viewer(Local)-Windows Logs (shutdown / restart ) | |
#In order to find out what user stopped the Windows Event Log, you can use the following PowerShell commands, ChatGPT | |
PS HKLM:\> Stop-Service -Name "eventlog" -Force | |
PS HKLM:\> Start-Service -Name "eventlog" | |
PS HKLM:\> Get-WinEvent -FilterHashtable @{LogName='Security'; ID=1100} -MaxEvents 50 | |
ProviderName: Microsoft-Windows-Eventlog | |
TimeCreated Id LevelDisplayName Message | |
----------- -- ---------------- ------- | |
2/18/2023 2:35:13 AM 1100 Information The event logging service has shut down. | |
2/18/2023 1:41:43 AM 1100 Information The event logging service has shut down. | |
2/15/2023 9:59:07 AM 1100 Information The event logging service has shut down. | |
2/10/2023 8:04:13 AM 1100 Information The event logging service has shut down. | |
2/9/2023 11:43:27 PM 1100 Information The event logging service has shut down. | |
------------------------------------------------------------------------------------------------------------------------------- | |
Event ID --> MITRE ATT&CK Technique Mapping | |
Event ID Description Importance for Defenders Example MITRE ATT&CK Technique | |
1102 Security Log cleared May indicate an attacker is attempting to cover their tracks by clearing the security log (e.g., security log cleared after an unauthorized admin logon) T1070 Indicator Removal on Host | |
4624 Successful account Logon Helps identify unauthorized or suspicious logon attempts, and track user activity on the network (e.g., logons during off-hours from unusual hosts) T1078 - Valid Accounts | |
4625 Failed account Logon Indicates potential brute-force attacks or unauthorized attempts to access a system (e.g., multiple failed logons from a single source in a short time) T1110 Brute Force | |
4648 Logon attempt with explicit credentials May suggest credential theft or improper use of accounts (e.g., an attacker creates a new token for an account after compromising cleartext credentials) T1134 - Access Token Manipulation | |
4662 An operation was performed on an object Helps track access to critical objects in Active Directory, which could indicate unauthorized activity (e.g., an attacker performs a DCSync attack by performing replication from an unusual host) T1530 - Data from Local System | |
4663 Access to an object was requested Monitors attempts to perform specific actions on sensitive objects like files, processes, and registry keys, which could indicate unauthorized access (e.g., an attacker attempts to read a file or folder which has been specifically configured for auditing) T1222 - File Permissions Modification | |
4670 Permissions on an object were changed Helps detect potential tampering with sensitive files or unauthorized privilege escalation (e.g., a low-privileged user modifying permissions on a sensitive file to gain access) T1078 - Valid Accounts | |
4672 Administrator privileges assigned to a new Logon Helps detect privilege escalation and unauthorized admin account usage (e.g., a standard user suddenly granted admin rights without a change request) T1078 - Valid Accounts | |
4698 A scheduled task was created Helps detect malicious scheduled task creation and could indicate persistence, privilege escalation, or lateral movement (e.g., an attacker creates a scheduled task that runs a beacon periodically) T1053 Scheduled Task/Job | |
4720 New user account created Monitors for unauthorized account creation or potential insider threats (e.g., a new account created outside of normal business hours without HR approval) T1136 Create Account | |
4724 An attempt was made to reset an account's password Monitors for unauthorized password resets, which could indicate account takeover (e.g., an attacker resetting the password of a high-privileged account) T1098 - Account Manipulation | |
4728 Member added to a security-enabled global group Tracks changes to important security groups, which could indicate unauthorized privilege escalation (e.g., an attacker adds a user to the "Domain Admins" group) T1098 - Account Manipulation | |
4732 Member added to a security-enabled Local group Monitors changes to local security groups, which could suggest unauthorized access or privilege escalation (e.g., an attacker adds a user to the "Administrators" local group) T1098 - Account Manipulation | |
4768 A Kerberos authentication ticket was requested (TGT Request) Monitors initial authentication requests to track user logons, and helps identify potential abuse of the Kerberos protocol (e.g., an attacker compromises the NTLM hash of a privileged account and performs an overpass-the-hash attack which requests a TGT from an unusual host) T1558 - Steal or Forge Kerberos Tickets | |
4769 A Kerberos service ticket was requested Monitors for potential Kerberoasting attacks or other suspicious activities targeting the Kerberos protocol (e.g., a sudden increase in requests for unique services from a single user) T1558 - Steal or Forge Kerberos Tickets | |
4776 The domain controller attempted to validate the credentials Helps identify failed or successful attempts to validate credentials against the domain controller, which could indicate unauthorized access or suspicious authentication activity (e.g., an unusual number of failed validations from a single IP address) T1110 | |
------------------------------------------------------------------------------------------------------------------------------- | |
#Applies to: Windows Server 2022, Windows Server 2019, Windows Server | |
#Best Practices for Securing Active Directory | |
The "Legacy Windows Event ID" column lists the corresponding event ID in legacy versions of Windows such as client computers running Windows XP or earlier and servers running Windows Server 2003 or earlier. | |
Current Windows Event ID Legacy Windows Event ID Potential Criticality Event Summary | |
4618 N/A High A monitored security event pattern has occurred. | |
4649 N/A High A replay attack was detected. May be a harmless false positive due to misconfiguration error. | |
4719 612 High System audit policy was changed. | |
4765 N/A High SID History was added to an account. | |
4766 N/A High An attempt to add SID History to an account failed. | |
4794 N/A High An attempt was made to set the Directory Services Restore Mode. | |
4897 801 High Role separation enabled: | |
4964 N/A High Special groups have been assigned to a new logon. | |
5124 N/A High A security setting was updated on the OCSP Responder Service | |
N/A 550 Medium to High Possible denial-of-service (DoS) attack | |
1102 517 Medium to High The audit log was cleared | |
4621 N/A Medium Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded. | |
4675 N/A Medium SIDs were filtered. | |
4692 N/A Medium Backup of data protection master key was attempted. | |
4693 N/A Medium Recovery of data protection master key was attempted. | |
4706 610 Medium A new trust was created to a domain. | |
4713 617 Medium Kerberos policy was changed. | |
4714 618 Medium Encrypted data recovery policy was changed. | |
4715 N/A Medium The audit policy (SACL) on an object was changed. | |
4716 620 Medium Trusted domain information was modified. | |
4724 628 Medium An attempt was made to reset an account's password. | |
4727 631 Medium A security-enabled global group was created. | |
4735 639 Medium A security-enabled local group was changed. | |
4737 641 Medium A security-enabled global group was changed. | |
4739 643 Medium Domain Policy was changed. | |
4754 658 Medium A security-enabled universal group was created. | |
4755 659 Medium A security-enabled universal group was changed. | |
4764 667 Medium A security-disabled group was deleted | |
4764 668 Medium A group's type was changed. | |
4780 684 Medium The ACL was set on accounts which are members of administrators groups. | |
4816 N/A Medium RPC detected an integrity violation while decrypting an incoming message. | |
4865 N/A Medium A trusted forest information entry was added. | |
4866 N/A Medium A trusted forest information entry was removed. | |
4867 N/A Medium A trusted forest information entry was modified. | |
4868 772 Medium The certificate manager denied a pending certificate request. | |
4870 774 Medium Certificate Services revoked a certificate. | |
4882 786 Medium The security permissions for Certificate Services changed. | |
4885 789 Medium The audit filter for Certificate Services changed. | |
4890 794 Medium The certificate manager settings for Certificate Services changed. | |
4892 796 Medium A property of Certificate Services changed. | |
4896 800 Medium One or more rows have been deleted from the certificate database. | |
4906 N/A Medium The CrashOnAuditFail value has changed. | |
4907 N/A Medium Auditing settings on object were changed. | |
4908 N/A Medium Special Groups Logon table modified. | |
4912 807 Medium Per User Audit Policy was changed. | |
4960 N/A Medium IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations. | |
4961 N/A Medium IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer. | |
4962 N/A Medium IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay. | |
4963 N/A Medium IPsec dropped an inbound clear text packet that should have been secured. This is usually due to the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attempt. | |
4965 N/A Medium IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by malfunctioning hardware that is corrupting packets. If these errors persist, verify that the packets sent from the remote computer are the same as those received by this computer. This error may also indicate interoperability problems with other IPsec implementations. In that case, if connectivity is not impeded, then these events can be ignored. | |
4976 N/A Medium During Main Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. | |
4977 N/A Medium During Quick Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. | |
4978 N/A Medium During Extended Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation. | |
4983 N/A Medium An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted. | |
4984 N/A Medium An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted. | |
5027 N/A Medium The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy. | |
5028 N/A Medium The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy. | |
5029 N/A Medium The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy. | |
5030 N/A Medium The Windows Firewall Service failed to start. | |
5035 N/A Medium The Windows Firewall Driver failed to start. | |
5037 N/A Medium The Windows Firewall Driver detected critical runtime error. Terminating. | |
5038 N/A Medium Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error. | |
5120 N/A Medium OCSP Responder Service Started | |
5121 N/A Medium OCSP Responder Service Stopped | |
5122 N/A Medium A configuration entry changed in OCSP Responder Service | |
5123 N/A Medium A configuration entry changed in OCSP Responder Service | |
5376 N/A Medium Credential Manager credentials were backed up. | |
5377 N/A Medium Credential Manager credentials were restored from a backup. | |
5453 N/A Medium An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started. | |
5480 N/A Medium IPsec Services failed to get the complete list of network interfaces on the computer. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem. | |
5483 N/A Medium IPsec Services failed to initialize RPC server. IPsec Services could not be started. | |
5484 N/A Medium IPsec Services has experienced a critical failure and has been shut down. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks. | |
5485 N/A Medium IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem. | |
5827 N/A Medium The Netlogon service denied a vulnerable Netlogon secure channel connection from a machine account. | |
5828 N/A Medium The Netlogon service denied a vulnerable Netlogon secure channel connection using a trust account. | |
6145 N/A Medium One or more errors occurred while processing security policy in the Group Policy objects. | |
6273 N/A Medium Network Policy Server denied access to a user. | |
6274 N/A Medium Network Policy Server discarded the request for a user. | |
6275 N/A Medium Network Policy Server discarded the accounting request for a user. | |
6276 N/A Medium Network Policy Server quarantined a user. | |
6277 N/A Medium Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy. | |
6278 N/A Medium Network Policy Server granted full access to a user because the host met the defined health policy. | |
6279 N/A Medium Network Policy Server locked the user account due to repeated failed authentication attempts. | |
6280 N/A Medium Network Policy Server unlocked the user account. | |
- 640 Medium General account database changed | |
- 619 Medium Quality of Service Policy changed | |
24586 N/A Medium An error was encountered converting volume | |
24592 N/A Medium An attempt to automatically restart conversion on volume %2 failed. | |
24593 N/A Medium Metadata write: Volume %2 returning errors while trying to modify metadata. If failures continue, decrypt volume | |
24594 N/A Medium Metadata rebuild: An attempt to write a copy of metadata on volume %2 failed and may appear as disk corruption. If failures continue, decrypt volume. | |
4608 512 Low Windows is starting up. | |
4609 513 Low Windows is shutting down. | |
4610 514 Low An authentication package has been loaded by the Local Security Authority. | |
4611 515 Low A trusted logon process has been registered with the Local Security Authority. | |
4612 516 Low Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. | |
4614 518 Low A notification package has been loaded by the Security Account Manager. | |
4615 519 Low Invalid use of LPC port. | |
4616 520 Low The system time was changed. | |
4622 N/A Low A security package has been loaded by the Local Security Authority. | |
4624 528,540 Low An account was successfully logged on. | |
4625 529-537,539 Low An account failed to log on. | |
4634 538 Low An account was logged off. | |
4646 N/A Low IKE DoS-prevention mode started. | |
4647 551 Low User initiated logoff. | |
4648 552 Low A logon was attempted using explicit credentials. | |
4650 N/A Low An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not used. | |
4651 N/A Low An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication. | |
4652 N/A Low An IPsec Main Mode negotiation failed. | |
4653 N/A Low An IPsec Main Mode negotiation failed. | |
4654 N/A Low An IPsec Quick Mode negotiation failed. | |
4655 N/A Low An IPsec Main Mode security association ended. | |
4656 560 Low A handle to an object was requested. | |
4657 567 Low A registry value was modified. | |
4658 562 Low The handle to an object was closed. | |
4659 N/A Low A handle to an object was requested with intent to delete. | |
4660 564 Low An object was deleted. | |
4661 565 Low A handle to an object was requested. | |
4662 566 Low An operation was performed on an object. | |
4663 567 Low An attempt was made to access an object. | |
4664 N/A Low An attempt was made to create a hard link. | |
4665 N/A Low An attempt was made to create an application client context. | |
4666 N/A Low An application attempted an operation: | |
4667 N/A Low An application client context was deleted. | |
4668 N/A Low An application was initialized. | |
4670 N/A Low Permissions on an object were changed. | |
4671 N/A Low An application attempted to access a blocked ordinal through the TBS. | |
4672 576 Low Special privileges assigned to new logon. | |
4673 577 Low A privileged service was called. | |
4674 578 Low An operation was attempted on a privileged object. | |
4688 592 Low A new process has been created. | |
4689 593 Low A process has exited. | |
4690 594 Low An attempt was made to duplicate a handle to an object. | |
4691 595 Low Indirect access to an object was requested. | |
4694 N/A Low Protection of auditable protected data was attempted. | |
4695 N/A Low Unprotection of auditable protected data was attempted. | |
4696 600 Low A primary token was assigned to process. | |
4697 601 Low Attempt to install a service | |
4698 602 Low A scheduled task was created. | |
4699 602 Low A scheduled task was deleted. | |
4700 602 Low A scheduled task was enabled. | |
4701 602 Low A scheduled task was disabled. | |
4702 602 Low A scheduled task was updated. | |
4704 608 Low A user right was assigned. | |
4705 609 Low A user right was removed. | |
4707 611 Low A trust to a domain was removed. | |
4709 N/A Low IPsec Services was started. | |
4710 N/A Low IPsec Services was disabled. | |
4711 N/A Low May contain any one of the following: PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer. PAStore Engine applied Active Directory storage IPsec policy on the computer. PAStore Engine applied local registry storage IPsec policy on the computer. PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer. PAStore Engine failed to apply Active Directory storage IPsec policy on the computer. PAStore Engine failed to apply local registry storage IPsec policy on the computer. PAStore Engine failed to apply some rules of the active IPsec policy on the computer. PAStore Engine failed to load directory storage IPsec policy on the computer. PAStore Engine loaded directory storage IPsec policy on the computer. PAStore Engine failed to load local storage IPsec policy on the computer. PAStore Engine loaded local storage IPsec policy on the computer.PAStore Engine polled for changes to the active IPsec policy and detected no changes. | |
4712 N/A Low IPsec Services encountered a potentially serious failure. | |
4717 621 Low System security access was granted to an account. | |
4718 622 Low System security access was removed from an account. | |
4720 624 Low A user account was created. | |
4722 626 Low A user account was enabled. | |
4723 627 Low An attempt was made to change an account's password. | |
4725 629 Low A user account was disabled. | |
4726 630 Low A user account was deleted. | |
4728 632 Low A member was added to a security-enabled global group. | |
4729 633 Low A member was removed from a security-enabled global group. | |
4730 634 Low A security-enabled global group was deleted. | |
4731 635 Low A security-enabled local group was created. | |
4732 636 Low A member was added to a security-enabled local group. | |
4733 637 Low A member was removed from a security-enabled local group. | |
4734 638 Low A security-enabled local group was deleted. | |
4738 642 Low A user account was changed. | |
4740 644 Low A user account was locked out. | |
4741 645 Low A computer account was changed. | |
4742 646 Low A computer account was changed. | |
4743 647 Low A computer account was deleted. | |
4744 648 Low A security-disabled local group was created. | |
4745 649 Low A security-disabled local group was changed. | |
4746 650 Low A member was added to a security-disabled local group. | |
4747 651 Low A member was removed from a security-disabled local group. | |
4748 652 Low A security-disabled local group was deleted. | |
4749 653 Low A security-disabled global group was created. | |
4750 654 Low A security-disabled global group was changed. | |
4751 655 Low A member was added to a security-disabled global group. | |
4752 656 Low A member was removed from a security-disabled global group. | |
4753 657 Low A security-disabled global group was deleted. | |
4756 660 Low A member was added to a security-enabled universal group. | |
4757 661 Low A member was removed from a security-enabled universal group. | |
4758 662 Low A security-enabled universal group was deleted. | |
4759 663 Low A security-disabled universal group was created. | |
4760 664 Low A security-disabled universal group was changed. | |
4761 665 Low A member was added to a security-disabled universal group. | |
4762 666 Low A member was removed from a security-disabled universal group. | |
4767 671 Low A user account was unlocked. | |
4768 672,676 Low A Kerberos authentication ticket (TGT) was requested. | |
4769 673 Low A Kerberos service ticket was requested. | |
4770 674 Low A Kerberos service ticket was renewed. | |
4771 675 Low Kerberos pre-authentication failed. | |
4772 672 Low A Kerberos authentication ticket request failed. | |
4774 678 Low An account was mapped for logon. | |
4775 679 Low An account could not be mapped for logon. | |
4776 680,681 Low The domain controller attempted to validate the credentials for an account. | |
4777 N/A Low The domain controller failed to validate the credentials for an account. | |
4778 682 Low A session was reconnected to a Window Station. | |
4779 683 Low A session was disconnected from a Window Station. | |
4781 685 Low The name of an account was changed: | |
4782 N/A Low The password hash an account was accessed. | |
4783 667 Low A basic application group was created. | |
4784 N/A Low A basic application group was changed. | |
4785 689 Low A member was added to a basic application group. | |
4786 690 Low A member was removed from a basic application group. | |
4787 691 Low A nonmember was added to a basic application group. | |
4788 692 Low A nonmember was removed from a basic application group. | |
4789 693 Low A basic application group was deleted. | |
4790 694 Low An LDAP query group was created. | |
4793 N/A Low The Password Policy Checking API was called. | |
4800 N/A Low The workstation was locked. | |
4801 N/A Low The workstation was unlocked. | |
4802 N/A Low The screen saver was invoked. | |
4803 N/A Low The screen saver was dismissed. | |
4864 N/A Low A namespace collision was detected. | |
4869 773 Low Certificate Services received a resubmitted certificate request. | |
4871 775 Low Certificate Services received a request to publish the certificate revocation list (CRL). | |
4872 776 Low Certificate Services published the certificate revocation list (CRL). | |
4873 777 Low A certificate request extension changed. | |
4874 778 Low One or more certificate request attributes changed. | |
4875 779 Low Certificate Services received a request to shut down. | |
4876 780 Low Certificate Services backup started. | |
4877 781 Low Certificate Services backup completed. | |
4878 782 Low Certificate Services restore started. | |
4879 783 Low Certificate Services restore completed. | |
4880 784 Low Certificate Services started. | |
4881 785 Low Certificate Services stopped. | |
4883 787 Low Certificate Services retrieved an archived key. | |
4884 788 Low Certificate Services imported a certificate into its database. | |
4886 790 Low Certificate Services received a certificate request. | |
4887 791 Low Certificate Services approved a certificate request and issued a certificate. | |
4888 792 Low Certificate Services denied a certificate request. | |
4889 793 Low Certificate Services set the status of a certificate request to pending. | |
4891 795 Low A configuration entry changed in Certificate Services. | |
4893 797 Low Certificate Services archived a key. | |
4894 798 Low Certificate Services imported and archived a key. | |
4895 799 Low Certificate Services published the CA certificate to Active Directory Domain Services. | |
4898 802 Low Certificate Services loaded a template. | |
4902 N/A Low The Per-user audit policy table was created. | |
4904 N/A Low An attempt was made to register a security event source. | |
4905 N/A Low An attempt was made to unregister a security event source. | |
4909 N/A Low The local policy settings for the TBS were changed. | |
4910 N/A Low The Group Policy settings for the TBS were changed. | |
4928 N/A Low An Active Directory replica source naming context was established. | |
4929 N/A Low An Active Directory replica source naming context was removed. | |
4930 N/A Low An Active Directory replica source naming context was modified. | |
4931 N/A Low An Active Directory replica destination naming context was modified. | |
4932 N/A Low Synchronization of a replica of an Active Directory naming context has begun. | |
4933 N/A Low Synchronization of a replica of an Active Directory naming context has ended. | |
4934 N/A Low Attributes of an Active Directory object were replicated. | |
4935 N/A Low Replication failure begins. | |
4936 N/A Low Replication failure ends. | |
4937 N/A Low A lingering object was removed from a replica. | |
4944 N/A Low The following policy was active when the Windows Firewall started. | |
4945 N/A Low A rule was listed when the Windows Firewall started. | |
4946 N/A Low A change has been made to Windows Firewall exception list. A rule was added. | |
4947 N/A Low A change has been made to Windows Firewall exception list. A rule was modified. | |
4948 N/A Low A change has been made to Windows Firewall exception list. A rule was deleted. | |
4949 N/A Low Windows Firewall settings were restored to the default values. | |
4950 N/A Low A Windows Firewall setting has changed. | |
4951 N/A Low A rule has been ignored because its major version number was not recognized by Windows Firewall. | |
4952 N/A Low Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced. | |
4953 N/A Low A rule has been ignored by Windows Firewall because it could not parse the rule. | |
4954 N/A Low Windows Firewall Group Policy settings have changed. The new settings have been applied. | |
4956 N/A Low Windows Firewall has changed the active profile. | |
4957 N/A Low Windows Firewall did not apply the following rule: | |
4958 N/A Low Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer: | |
4979 N/A Low IPsec Main Mode and Extended Mode security associations were established. | |
4980 N/A Low IPsec Main Mode and Extended Mode security associations were established. | |
4981 N/A Low IPsec Main Mode and Extended Mode security associations were established. | |
4982 N/A Low IPsec Main Mode and Extended Mode security associations were established. | |
4985 N/A Low The state of a transaction has changed. | |
5024 N/A Low The Windows Firewall Service has started successfully. | |
5025 N/A Low The Windows Firewall Service has been stopped. | |
5031 N/A Low The Windows Firewall Service blocked an application from accepting incoming connections on the network. | |
5032 N/A Low Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network. | |
5033 N/A Low The Windows Firewall Driver has started successfully. | |
5034 N/A Low The Windows Firewall Driver has been stopped. | |
5039 N/A Low A registry key was virtualized. | |
5040 N/A Low A change has been made to IPsec settings. An Authentication Set was added. | |
5041 N/A Low A change has been made to IPsec settings. An Authentication Set was modified. | |
5042 N/A Low A change has been made to IPsec settings. An Authentication Set was deleted. | |
5043 N/A Low A change has been made to IPsec settings. A Connection Security Rule was added. | |
5044 N/A Low A change has been made to IPsec settings. A Connection Security Rule was modified. | |
5045 N/A Low A change has been made to IPsec settings. A Connection Security Rule was deleted. | |
5046 N/A Low A change has been made to IPsec settings. A Crypto Set was added. | |
5047 N/A Low A change has been made to IPsec settings. A Crypto Set was modified. | |
5048 N/A Low A change has been made to IPsec settings. A Crypto Set was deleted. | |
5050 N/A Low An attempt to programmatically disable the Windows Firewall using a call to InetFwProfile.FirewallEnabled(False) | |
5051 N/A Low A file was virtualized. | |
5056 N/A Low A cryptographic self test was performed. | |
5057 N/A Low A cryptographic primitive operation failed. | |
5058 N/A Low Key file operation. | |
5059 N/A Low Key migration operation. | |
5060 N/A Low Verification operation failed. | |
5061 N/A Low Cryptographic operation. | |
5062 N/A Low A kernel-mode cryptographic self test was performed. | |
5063 N/A Low A cryptographic provider operation was attempted. | |
5064 N/A Low A cryptographic context operation was attempted. | |
5065 N/A Low A cryptographic context modification was attempted. | |
5066 N/A Low A cryptographic function operation was attempted. | |
5067 N/A Low A cryptographic function modification was attempted. | |
5068 N/A Low A cryptographic function provider operation was attempted. | |
5069 N/A Low A cryptographic function property operation was attempted. | |
5070 N/A Low A cryptographic function property modification was attempted. | |
5125 N/A Low A request was submitted to the OCSP Responder Service | |
5126 N/A Low Signing Certificate was automatically updated by the OCSP Responder Service | |
5127 N/A Low The OCSP Revocation Provider successfully updated the revocation information | |
5136 566 Low A directory service object was modified. | |
5137 566 Low A directory service object was created. | |
5138 N/A Low A directory service object was undeleted. | |
5139 N/A Low A directory service object was moved. | |
5140 N/A Low A network share object was accessed. | |
5141 N/A Low A directory service object was deleted. | |
5152 N/A Low The Windows Filtering Platform blocked a packet. | |
5153 N/A Low A more restrictive Windows Filtering Platform filter has blocked a packet. | |
5154 N/A Low The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections. | |
5155 N/A Low The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections. | |
5156 N/A Low The Windows Filtering Platform has allowed a connection. | |
5157 N/A Low The Windows Filtering Platform has blocked a connection. | |
5158 N/A Low The Windows Filtering Platform has permitted a bind to a local port. | |
5159 N/A Low The Windows Filtering Platform has blocked a bind to a local port. | |
5378 N/A Low The requested credentials delegation was disallowed by policy. | |
5440 N/A Low The following callout was present when the Windows Filtering Platform Base Filtering Engine started. | |
5441 N/A Low The following filter was present when the Windows Filtering Platform Base Filtering Engine started. | |
5442 N/A Low The following provider was present when the Windows Filtering Platform Base Filtering Engine started. | |
5443 N/A Low The following provider context was present when the Windows Filtering Platform Base Filtering Engine started. | |
5444 N/A Low The following sublayer was present when the Windows Filtering Platform Base Filtering Engine started. | |
5446 N/A Low A Windows Filtering Platform callout has been changed. | |
5447 N/A Low A Windows Filtering Platform filter has been changed. | |
5448 N/A Low A Windows Filtering Platform provider has been changed. | |
5449 N/A Low A Windows Filtering Platform provider context has been changed. | |
5450 N/A Low A Windows Filtering Platform sublayer has been changed. | |
5451 N/A Low An IPsec Quick Mode security association was established. | |
5452 N/A Low An IPsec Quick Mode security association ended. | |
5456 N/A Low PAStore Engine applied Active Directory storage IPsec policy on the computer. | |
5457 N/A Low PAStore Engine failed to apply Active Directory storage IPsec policy on the computer. | |
5458 N/A Low PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer. | |
5459 N/A Low PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer. | |
5460 N/A Low PAStore Engine applied local registry storage IPsec policy on the computer. | |
5461 N/A Low PAStore Engine failed to apply local registry storage IPsec policy on the computer. | |
5462 N/A Low PAStore Engine failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem. | |
5463 N/A Low PAStore Engine polled for changes to the active IPsec policy and detected no changes. | |
5464 N/A Low PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services. | |
5465 N/A Low PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully. | |
5466 N/A Low PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied. | |
5467 N/A Low PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used. | |
5468 N/A Low PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used. | |
5471 N/A Low PAStore Engine loaded local storage IPsec policy on the computer. | |
5472 N/A Low PAStore Engine failed to load local storage IPsec policy on the computer. | |
5473 N/A Low PAStore Engine loaded directory storage IPsec policy on the computer. | |
5474 N/A Low PAStore Engine failed to load directory storage IPsec policy on the computer. | |
5477 N/A Low PAStore Engine failed to add quick mode filter. | |
5479 N/A Low IPsec Services has been shut down successfully. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks. | |
5632 N/A Low A request was made to authenticate to a wireless network. | |
5633 N/A Low A request was made to authenticate to a wired network. | |
5712 N/A Low A Remote Procedure Call (RPC) was attempted. | |
5888 N/A Low An object in the COM+ Catalog was modified. | |
5889 N/A Low An object was deleted from the COM+ Catalog. | |
5890 N/A Low An object was added to the COM+ Catalog. | |
6008 N/A Low The previous system shutdown was unexpected | |
6144 N/A Low Security policy in the Group Policy objects has been applied successfully. | |
6272 N/A Low Network Policy Server granted access to a user. | |
N/A 561 Low A handle to an object was requested. | |
N/A 563 Low Object open for delete | |
N/A 625 Low User Account Type Changed | |
N/A 613 Low IPsec policy agent started | |
N/A 614 Low IPsec policy agent disabled | |
N/A 615 Low IPsec policy agent | |
N/A 616 Low IPsec policy agent encountered a potential serious failure | |
24577 N/A Low Encryption of volume started | |
24578 N/A Low Encryption of volume stopped | |
24579 N/A Low Encryption of volume completed | |
24580 N/A Low Decryption of volume started | |
24581 N/A Low Decryption of volume stopped | |
24582 N/A Low Decryption of volume completed | |
24583 N/A Low Conversion worker thread for volume started | |
24584 N/A Low Conversion worker thread for volume temporarily stopped | |
24588 N/A Low The conversion operation on volume %2 encountered a bad sector error. Please validate the data on this volume | |
24595 N/A Low Volume %2 contains bad clusters. These clusters will be skipped during conversion. | |
24621 N/A Low Initial state check: Rolling volume conversion transaction on %2. | |
5049 N/A Low An IPsec Security Association was deleted. | |
5478 N/A Low IPsec Services has started successfully. | |
------------------------------------------------------------------------------------------------------------------------------- | |
Event ID 7030 is useful for monitoring and tracking the start of services on a Windows system. It can be used to ensure that critical services are starting as expected, troubleshoot service-related issues, and detect changes in the behavior of services. By monitoring Event ID 7030, administrators can stay informed about the status of important services and take appropriate actions in case of service-related events. | |
Event ID 7030 in Windows is a system event that is logged when a service is started or stopped. This event is logged by the System event log. | |
The event ID 7030 contains the following information: | |
The name of the service that was started or stopped | |
The status of the service (started or stopped) | |
The username of the user who started or stopped the service | |
The time and date that the service was started or stopped | |
Event ID 7030 can be used to track the activity of services on a system. This can be useful for monitoring for malicious activity, such as the unauthorized start or stop of services. | |
Here are some of the things that you can do with event ID 7030: | |
Monitor for the start or stop of services by suspicious users or from suspicious locations. | |
Track the start or stop of services that are associated with known malware. | |
Identify services that are started or stopped by legitimate applications but are being used for malicious purposes. | |
Event ID 7030 is a valuable tool for security professionals. By monitoring this event, you can gain insights into the activity on your system and identify potential threats. | |
Here are some specific examples of malicious activity that can be detected by event ID 7030: | |
A malicious user could start a service that is used to steal data from the system. | |
A malicious user could stop a service that is used to protect the system from malware. | |
A malware program could start a service that is used to spread itself to other systems. | |
If you see event ID 7030 for a service that you do not recognize or that is started or stopped by a suspicious user, you should investigate further. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
. Event ID 7045 in Windows is a system event that is logged when a new service is installed on the system. This event is logged by the System event log. | |
The event ID 7045 contains the following information: | |
The name of the service that was installed | |
The account that installed the service | |
The path to the service executable file | |
The time and date that the service was installed | |
Event ID 7045 can be used to track the installation of new services on a system. This can be useful for monitoring for malicious activity, such as the installation of malware. | |
Here are some of the things that you can do with event ID 7045: | |
Monitor for the installation of new services by suspicious users or from suspicious locations. | |
Track the installation of new services that are associated with known malware. | |
Identify services that are installed by legitimate applications but are being used for malicious purposes. | |
Event ID 7045 is a valuable tool for security professionals. By monitoring this event, you can gain insights into the activity on your system and identify potential threats. | |
Here are some specific examples of malicious activity that can be detected by event ID 7045: | |
A malicious user could install a service that is used to steal data from the system. | |
A malicious user could install a service that is used to disable security features. | |
A malware program could install a service that is used to spread itself to other systems. | |
If you see event ID 7045 for a service that you do not recognize or that is installed by a suspicious user, you should investigate further. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#ChatGPT | |
Chainsaw is a powerful log viewer tool that can be used for Windows event investigations. It is an open-source software developed by Apache and can be downloaded for free. Chainsaw can help you quickly and efficiently analyze Windows event logs, identify patterns, and troubleshoot issues. Here are the steps to use Chainsaw for Windows event investigations: | |
Download and install Chainsaw: First, you need to download the latest version of Chainsaw from the Apache website and install it on your computer. | |
Export the Windows event logs: Next, you need to export the Windows event logs from the target machine. To do this, open the Event Viewer on the target machine, select the event logs you want to export, right-click, and select "Save All Events As." Choose the file type as "evt" or "evtx" and save the file to a location accessible from your computer. | |
Import the Windows event logs into Chainsaw: Launch Chainsaw and go to File > Load Log4j/Logback Logs. Select the exported Windows event log file and click "Open." The Windows event logs will now be displayed in Chainsaw. | |
Filter the Windows event logs: Chainsaw provides a powerful filtering mechanism that allows you to quickly identify specific events of interest. To filter the Windows event logs, go to the "Filter" tab in Chainsaw and define the filter criteria based on the event ID, source, severity, or any other attribute of the Windows event logs. | |
Analyze the Windows event logs: Once the logs are filtered, you can analyze them to identify patterns or troubleshoot issues. Chainsaw provides several features that can help you in this regard, such as sorting the logs based on various attributes, grouping similar events together, or highlighting events that match specific criteria. | |
Export the results: Once you have analyzed the logs, you may need to export the results for further investigation or reporting. Chainsaw provides several export options, such as exporting the filtered logs to a CSV file or exporting the entire log session to a file. | |
In summary, Chainsaw is a powerful tool that can help you quickly and efficiently analyze Windows event logs. By following the steps outlined above, you can use Chainsaw to filter, analyze, and export the logs to troubleshoot issues, identify patterns, and improve the overall security of your Windows environment | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#ChatGPT | |
Sure, here are a few examples of how to use Chainsaw to troubleshoot issues in a Windows environment: | |
Identifying Windows service failures: When a Windows service fails, it can be challenging to identify the root cause. Chainsaw can help you quickly identify the service failure by filtering the Windows event logs based on the service name and event ID. For example, you can filter the logs for event ID 7031, which indicates that a service has stopped unexpectedly, and then look for the corresponding service name in the logs. Once you have identified the service, you can investigate further to identify the cause of the failure, such as a configuration issue or a dependency problem. | |
Analyzing user login issues: When users have trouble logging in to a Windows environment, it can be helpful to analyze the Windows event logs to identify any error messages or authentication failures. Chainsaw can help you quickly filter the logs for failed login attempts or other login-related events. For example, you can filter the logs for event ID 4625, which indicates a failed login attempt, and then look for the corresponding username or IP address in the logs. Once you have identified the source of the login issue, you can investigate further to identify the root cause, such as a password mismatch or a network connectivity problem. | |
Troubleshooting network connectivity issues: When network connectivity issues occur in a Windows environment, it can be challenging to identify the source of the problem. Chainsaw can help you quickly filter the Windows event logs for network-related events, such as DNS lookup failures or TCP/IP connection failures. For example, you can filter the logs for event ID 1101, which indicates a DNS lookup failure, and then look for the corresponding hostname or IP address in the logs. Once you have identified the network-related event, you can investigate further to identify the cause of the problem, such as a misconfigured DNS server or a firewall blocking traffic. | |
Investigating security-related events: Security-related events can be critical to investigate to ensure the security of a Windows environment. Chainsaw can help you filter the logs for security-related events, such as failed login attempts or malware detection events. For example, you can filter the logs for event ID 4625, which indicates a failed login attempt, and then look for the corresponding username or IP address in the logs. Once you have identified the security-related event, you can investigate further to identify the cause of the problem, such as an attempted brute-force attack or a compromised user account. | |
In summary, Chainsaw can be a powerful tool to troubleshoot issues in a Windows environment by allowing you to quickly filter and analyze the Windows event logs. By using Chainsaw to investigate specific use cases, such as identifying service failures, analyzing login issues, troubleshooting network connectivity, or investigating security-related events, you can improve the overall security and stability of your Windows environment. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#ChatGPT | |
Sure, I can explain how to convert an EVTX file into a CSV file in Excel. | |
An EVTX file is a Windows event log file, and Excel does not support importing EVTX files directly. However, you can use the "Event Viewer" tool in Windows to export the EVTX file as a CSV file, which can then be opened and edited in Excel. | |
Here are the steps to convert an EVTX file to a CSV file using Event Viewer and Excel: | |
Open Event Viewer: Click on the Windows Start button and type "Event Viewer" in the search box. Click on the "Event Viewer" app to launch it. | |
Export the EVTX file: In the Event Viewer, select the log file you want to export (e.g., "Application" or "Security"), and then click "Action" from the menu bar. Select "Export Log" and choose a location to save the exported file. In the "Save as type" drop-down list, select "CSV (Comma delimited)" and give the file a name. | |
Open the CSV file in Excel: Open Excel and go to the "Data" tab. Click on "From Text/CSV" and select the CSV file you exported from Event Viewer. Follow the prompts to import the file into Excel. Make sure to select the appropriate delimiter (comma) in the import wizard. | |
Convert the data into a table: Once the data is imported into Excel, select the entire table (Ctrl + A) and click on the "Format as Table" button in the "Styles" section of the "Home" tab. Choose a table style that you prefer. | |
Edit and analyze the data: The converted CSV data is now ready for editing and analysis in Excel. You can sort, filter, and analyze the data using Excel's built-in tools. | |
That's it! By following these steps, you can easily convert an EVTX file into a CSV file and open it in Excel for further analysis. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#ChatGPT | |
Sure, as a Windows forensics analyzer, I can explain how to create event baselines with the COUNTIF function in Excel when investigating security-related events on Windows 10. | |
Creating event baselines can help you identify changes in the Windows event logs over time and detect potential security incidents. To create an event baseline with the COUNTIF function in Excel, follow these steps: | |
Export the Windows event logs: First, you need to export the Windows event logs from the target machine. To do this, open the Event Viewer on the target machine, select the event logs you want to export, right-click, and select "Save All Events As." Choose the file type as "evt" or "evtx" and save the file to a location accessible from your computer. | |
Import the Windows event logs into Excel: Launch Excel and go to the "Data" tab. Click on "From Text/CSV" and select the exported Windows event log file. Follow the prompts to import the Windows event logs into Excel. | |
Filter the Windows event logs: Once the logs are imported, filter the logs for the specific event IDs or event sources that you want to create a baseline for. For example, you can filter the logs for event ID 4624, which indicates a successful login event. | |
Use the COUNTIF function: After filtering the logs, you can use the COUNTIF function in Excel to count the number of occurrences of each event ID or event source. To use the COUNTIF function, select a cell where you want to display the count, then enter the formula "=COUNTIF(range, criteria)." In the "range" field, select the filtered event log column that contains the event IDs or event sources. In the "criteria" field, enter the specific event ID or event source that you want to count. For example, to count the number of successful login events (event ID 4624), you can enter "=COUNTIF(A:A,4624)" in a cell. | |
Create a baseline chart: Once you have calculated the counts for each event ID or event source, you can create a baseline chart in Excel to visualize the changes over time. To create a chart, select the cells with the counts, then go to the "Insert" tab and select the chart type that you want to use. For example, you can use a line chart to show the trend of the counts over time. | |
Analyze the baseline chart: After creating the baseline chart, you can use it to identify any changes in the Windows event logs over time. For example, if you notice a sudden spike in the number of failed login events, it may indicate a potential security incident that needs further investigation. | |
In summary, using the COUNTIF function in Excel can help you create event baselines and identify potential security incidents in Windows event logs. By following the steps outlined above, you can filter the logs, use the COUNTIF function to count the occurrences of specific events, create a baseline chart, and analyze the chart to detect any changes over time. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#Windows Logs > System, ChatGPT | |
Event ID 1030 #logged when the Group Policy settings cannot be read,when the Group Policy object (GPO) is corrupted, or when the computer is unable to access the domain controller | |
Event ID 1058 #occurs when the computer is unable to access the Sysvol share, which stores the Group Policy templates and scripts | |
Event ID 1704 #This event indicates that the GPO was successfully applied to the client computer | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#ChatGPT | |
In the Event Viewer window that opens, navigate to the "Windows Logs" folder on the left-hand side, and select the "System" log. | |
Look for events with the "Event ID 7036" which indicates that a service has entered the running or stopped state. | |
Look for events with the "Event ID 7009" which indicates that a service timeout has occurred. | |
Look for events with the "Event ID 7011" which indicates that a service did not respond within the specified time. | |
Look for events with the "Event ID 7024" which indicates that the service terminated with service-specific error. | |
Look for events with the "Event ID 7023" which indicates that the service terminated with the following error: The service terminated with the following service-specific error: Incorrect function. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
Event ID 41 : The system has rebooted without cleanly shutting down first. | |
Event ID 44,43,19,20 : any anti-malware software is installed,any anti-malware software is installed | |
Event ID 1074: The system has been shutdown properly by a user or process. "The process X has initiated the restart / shutdown of computer on behalf of user Y for the following reason: Z." Indicates that an application or a user initiated a restart or shutdown. | |
Event ID 1076: "The reason supplied by user X for the last unexpected shutdown of this computer is: Y." Records when the first user with shutdown privileges logs on to the computer after an unexpected restart or shutdown and supplies a reason for the occurrence.Follows after Event ID 6008 and means that the first user with shutdown privileges logged on to the server after an unexpected restart or shutdown and specified the cause. | |
Event ID 6005: “The event log service was started.” Indicates the system startup. | |
Event ID 6006: “The event log service was stopped.” Indicates the proper system shutdown. | |
Event ID 6008: "The previous system shutdown was unexpected." The previous system shutdown was unexpected. | |
Event ID 6009: Indicates the Windows product name, version, build number, service pack number, and operating system type detected at boot time. | |
Event ID 6013: Displays the uptime of the computer.The system uptime in seconds. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
Event Viewer(Domain Controller)-Windows Logs-Security | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
1100 The event logging service has shut down | |
1101 Audit events have been dropped by the transport. | |
1102 The audit log was cleared | |
1104 The security Log is now full | |
1105 Event log automatic backup | |
1108 The event logging service encountered an error | |
4608 Windows is starting up | |
4609 Windows is shutting down | |
4610 An authentication package has been loaded by the Local Security Authority | |
4611 A trusted logon process has been registered with the Local Security Authority | |
4612 Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits. | |
4614 A notification package has been loaded by the Security Account Manager. | |
4615 Invalid use of LPC port | |
4616 The system time was changed. | |
4618 A monitored security event pattern has occurred | |
4621 Administrator recovered system from CrashOnAuditFail | |
4622 A security package has been loaded by the Local Security Authority. | |
========================================================================================================== | |
#detect abnormal and possibly unauthorized insider activity, like a logon from an inactive or restricted account, users logging on outside of normal working hours, concurrent logons to many resources | |
4624 # target computer not a domain member,(Successfull logon),An account was successfully logged on | |
========================================================================================================== | |
#ChatGPT | |
Event ID 4624 is a security event that gets generated in the Microsoft Windows event log every time a user successfully logs on to a computer or server. The event provides important details about the user's logon, such as the user account name, logon type, and logon timestamp. | |
Logon types are numeric codes that indicate the type of logon that was performed. There are several different logon types, including: | |
Interactive (logon at the console of the computer) | |
Network (logon via a network connection) | |
Batch (logon via a scheduled task) | |
Service (logon via a Windows service) | |
RemoteInteractive (logon via a Remote Desktop or Terminal Services session) | |
CachedInteractive (logon using cached credentials) | |
The logon type is specified in the event's Logon Type field. Knowing the logon type can help you understand how the user logged on and what resources they may have accessed during their session. | |
For example, if the logon type is 2, it indicates that the user logged on via a network connection, which could mean that they accessed a network share or used a remote desktop connection. If the logon type is 3, it indicates that the user logged on by means of a batch job or scheduled task. | |
By reviewing the Event ID 4624 log entries, system administrators can monitor and track user activity on their networks, including identifying suspicious or unauthorized access attempts. | |
========================================================================================================== | |
Clearing Event Logs | |
ID | |
Level Event Log Event Source | |
Event Log Service Shutdown 1100 Information Security Microsoft-Windows-EventLog | |
Event Log was Cleared 104 Information System Microsoft-Windows-EventLog | |
Event Log was Cleared 1102 Information Security Microsoft-Windows-EventLog | |
========================================================================================================== | |
========================================================================================================== | |
Boot Events | |
Event ID Description Log Name | |
6006 Shutdown time of the machine. System | |
6005 Start-up time of the machine. System | |
12 | |
Informational event used to record the OS startup. | |
The BootMode flag [0,1,2] tells us the type of Boot. | |
System | |
ID Level Event Log Event Source | |
Shutdown Initiate Failed 1074 Warning User32 User32 | |
Windows Shutdown 13 Information System Microsoft-Windows-Kernel-General | |
Windows Startup 12 Information System Microsoft-Windows-Kernel-General | |
BootMode Value Description | |
0 Normal start-up | |
1 Safe Mode | |
2 Safe Mode with Networking | |
========================================================================================================== | |
Software and Service Installation | |
ID Level Event Log Event Source | |
New Application Installation 903, 904 Information Microsoft-Windows-Application-Experience/Program-Inventory Microsoft-Windows-Application-Experience | |
New Kernel Filter Driver 6 Information System Microsoft-Windows-FilterManager | |
New MSI File Installed 1022, 1033 Information Application MsiInstaller | |
New Windows Service 7045 Information System Microsoft-Windows-FilterManager | |
Removed Application 907, 908 Information Microsoft-Windows-Application-Experience/Program-Inventory Microsoft-Windows-Application-Experience | |
Service Start Failure 7000 Error System Service Control Manager | |
Summary of Software Activities 800 Information Microsoft-Windows-Application-Experience/Program-Inventory Microsoft-Windows-Application-Experience | |
Update Packages Installed 2 Information Setup Microsoft-Windows-Servicing | |
Updated Application 905, 906 Information Microsoft-Windows-Application-Experience/Program-Inventory Microsoft-Windows-Application-Experience | |
Windows Update Installed 19 Information System | |
========================================================================================================== | |
Account Usage | |
ID Level Event Log Event Source | |
Account Lockouts 4740 Information Security Microsoft-Windows-Security-Auditing | |
Account Login with Explicit Credentials 4648 Information Security Microsoft-Windows-Security-Auditing | |
Account Name Changed 4781 Information Security Microsoft-Windows-Security-Auditing | |
Account removed from Local Sec. Grp. 4733 Information Security Microsoft-Windows-Security-Auditing | |
Credential Authentication 4776 Information Security Microsoft-Windows-Security-Auditing | |
Credentials backed up 5376 Information Security Microsoft-Windows-Security-Auditing | |
Credentials restored 5377 Information Security Microsoft-Windows-Security-Auditing | |
Failed User Account Login 4625 Information Security Microsoft-Windows-Security-Auditing | |
Logoff Event 4634 Information Security Microsoft-Windows-Security-Auditing | |
Logon with Special Privs 4672 Information Security Microsoft-Windows-Security-Auditing | |
New User Account Created 4720 Information Security Microsoft-Windows-Security-Auditing | |
New User Account Enabled 4722 Information Security Microsoft-Windows-Security-Auditing | |
Password Hash Accessed 4782 Information Security Microsoft-Windows-Security-Auditing | |
Password Policy Checking API called 4793 Information Security Microsoft-Windows-Security-Auditing | |
Security-enabled Group Created 4731 Information Security Microsoft-Windows-Security-Auditing | |
Security-Enabled group Modification 4735 Information Security Microsoft-Windows-Security-Auditing | |
SID History add attempted on Account 4766 Information Security Microsoft-Windows-Security-Auditing | |
SID History added to Account 4765 Information Security Microsoft-Windows-Security-Auditing | |
Successful User Account Login 4624 Information Security Microsoft-Windows-Security-Auditing | |
User Account Deleted 4726 Information Security Microsoft-Windows-Security-Auditing | |
User Account Disabled 4725 Information Security Microsoft-Windows-Security-Auditing | |
User Account Unlocked 4767 Information Security Microsoft-Windows-Security-Auditing | |
User Added to Privileged Group 4728, 4732, 4756 Information Security Microsoft-Windows-Security-Auditing | |
User Right Assigned 4704 Information Security Microsoft-Windows-Security-Auditing | |
========================================================================================================== | |
Application Crashes | |
. Categories of crashes include Blue Screen of Death (BSOD), Windows Error Reporting (WER), Application Crash, and Application Hang events. If the organization is actively using the Microsoft Enhanced Mitigation Experience Toolkit (EMET), then EMET logs can also be collected. | |
ID Level Event Log Event Source | |
App Crash 1000 Error Application Application Error | |
App Error 1000 Error Application Application Error | |
App Hang 1002 Error Application Application Hang | |
BSOD 1001 Error System Microsoft-Windors-WER-SystemErrorReporting | |
WER 1001 Information Application Windows Error Reporting | |
========================================================================================================== | |
Logon Type Explanation | |
2 Logon via console | |
3 Network Logon. A user or computer logged on to this computer from the network | |
4 Batch Logon | |
5 Windows Service Logon | |
7 Credentials used to unlock screen | |
8 Network logon sending credentials (cleartext) | |
9 Different credentials used than logon user | |
10 Remote Interactive logon (RDP) | |
11 Cached credentials used to logon | |
12 Cached remote interactive | |
13 Cached Unlock (Similar to logon type 7) | |
========================================================================================================== | |
#ChatGPT | |
In the Microsoft Windows event log, logon types are numeric codes that indicate the type of logon that was performed. These logon types can help system administrators and security professionals to understand how users are accessing a system and to identify potential security issues. | |
Here are the different logon types and their corresponding numeric codes: | |
Interactive (logon at keyboard and screen): This logon type occurs when a user logs on to a system interactively, by typing their username and password at the keyboard. This logon type is assigned the numeric code 2. | |
Network (i.e. connection to shared folder on this computer from elsewhere on network or IIS logon): This logon type occurs when a user accesses resources on a remote system over the network, such as connecting to a shared folder or accessing a web application using IIS. This logon type is assigned the numeric code 3. | |
Batch (i.e. scheduled task): This logon type occurs when a scheduled task is executed. This logon type is assigned the numeric code 4. | |
Service (Service startup): This logon type occurs when a service is started. This logon type is assigned the numeric code 5. | |
RemoteInteractive (Terminal Services, Remote Desktop or Remote Assistance): This logon type occurs when a user connects to a system remotely using a remote desktop or terminal services client. This logon type is assigned the numeric code 10. | |
CachedInteractive (logon with cached domain credentials): This logon type occurs when a user logs on to a system using cached domain credentials. This logon type is assigned the numeric code 11. | |
Understanding the different logon types and their corresponding numeric codes can be useful for monitoring system access, troubleshooting issues, and identifying potential security threats. | |
========================================================================================================== | |
#ChatGPT | |
In Windows Server logs, the Logon Type field indicates the type of logon that was used when a user or a computer logged on to the system. The Logon Type values are defined as follows: | |
0: System logon (generated by the system when it starts) | |
2: Interactive logon (when a user logs on at the console or through a remote desktop session) | |
3: Network logon (when a user logs on to the system over the network) | |
4: Batch logon (when a batch job runs on the system) | |
5: Service logon (when a service starts and logs on to the system) | |
6: Proxy logon (when a service logs on using a proxy account) | |
7: Unlock logon (generated when a workstation is unlocked) | |
8: Network clear text logon (when a user logs on over the network using clear text authentication) | |
9: New credentials logon (when a user reuses an existing token to log on with new credentials) | |
10: Remote interactive logon (when a user logs on remotely using Remote Desktop Services) | |
The logon types are used by Windows to record and track logon activity on the system. They can help administrators to identify the source of logon events and to detect potential security breaches, such as unauthorized logon attempts. | |
The logon types are also used by some security tools and solutions, such as SIEMs and log management platforms, to analyze and correlate logon events with other security-related events on the system, such as privilege escalation, file access, and network traffic. By understanding the relationships between logon types and other security events, administrators can gain a better understanding of the security posture of their systems and take appropriate actions to protect them from threats. | |
========================================================================================================== | |
#ChatGPT | |
Interactive logon is a logon type in Windows Server logs that indicates when a user logs on to the system at the console or through a remote desktop session. In other words, it refers to the process of logging on to a system by physically or remotely interacting with it. | |
When a user logs on interactively, they typically provide their username and password to the system. The system then authenticates the user's credentials and creates a new session for the user, which provides access to resources and services on the system. | |
Interactive logon can occur at the console of the system, which is the physical device that hosts the operating system, or through a remote desktop session, which allows users to connect to the system over a network and interact with it as if they were sitting in front of the console. Remote desktop sessions are typically used for remote administration, remote access to applications, or telecommuting. | |
Interactive logon is an important logon type to track and monitor in Windows Server logs, as it can indicate when users are accessing the system and what resources and services they are accessing. By analyzing interactive logon events, administrators can identify potential security risks, such as unauthorized access attempts, failed logon attempts, or suspicious activity. They can also use interactive logon events to troubleshoot issues related to user access and session management on the system. | |
========================================================================================================== | |
#ChatGPT | |
The difference between a remote desktop session and Remote Desktop Services (RDS) with respect to the logon types "Interactive logon" and "Remote interactive logon" is as follows: | |
Interactive logon: This logon type refers to the process of logging on to a system by physically or remotely interacting with it. When a user logs on interactively, they typically provide their username and password to the system, and a new session is created for them. This type of logon can occur at the console of the system or through a remote desktop session. | |
Remote interactive logon: This logon type specifically refers to the process of logging on remotely to a system using Remote Desktop Services (RDS). RDS is a role service in Windows Server that enables users to remotely access Windows-based desktops, applications, and data over a network connection. When a user logs on remotely using RDS, they typically connect to a server that hosts the RDS role service, provide their credentials, and a new session is created for them on the server. | |
So, the key difference between a remote desktop session and RDS is that the former refers to the general process of accessing a system remotely, while the latter is a specific technology that enables remote access to Windows-based desktops, applications, and data. In terms of logon types, both interactive logon and remote interactive logon involve the creation of a new session for the user, but the latter specifically requires the use of RDS technology to establish the remote connection. | |
It's worth noting that Remote Desktop Services includes additional logon types beyond Remote interactive logon, such as Remote Desktop Services: Session logon and Remote Desktop Services: Console logon, which are used to differentiate between different types of remote sessions established through RDS. | |
========================================================================================================== | |
#ChatGPT | |
You can filter security events with ID 4624 that include logon type 10 using Computer Management as follows: | |
Open Computer Management: Press Windows key + X, and then click on Computer Management. | |
In the console tree, expand "Event Viewer" and then expand "Windows Logs". | |
Right-click on "Security" and select "Filter Current Log". | |
In the "Filter Current Log" dialog box, click on the "XML" tab. | |
In the "XML" tab, check the box for "Edit query manually" and paste the following XML query into the text box: | |
mathematica | |
<QueryList> | |
<Query Id="0" Path="Security"> | |
<Select Path="Security"> | |
*[System[(EventID=4624)]] and | |
*[EventData[Data[@Name='LogonType']='10']] | |
</Select> | |
</Query> | |
</QueryList> | |
Click on "OK" to apply the filter. The Security log will now display only events that match the filter criteria. | |
Note: The XML query used in this example filters for events with ID 4624 and logon type 10. You can modify the query to filter for different criteria as needed. | |
========================================================================================================== | |
#ChatGPT | |
To filter security events with ID 4624 that include logon type 10 and account name David using Computer Management, you can follow these steps: | |
<QueryList> | |
<Query Id="0" Path="Security"> | |
<Select Path="Security"> | |
*[System[(EventID=4624)]] and | |
*[EventData[Data[@Name='LogonType']='10'] and Data[@Name='TargetUserName']='David'] | |
</Select> | |
</Query> | |
</QueryList> | |
========================================================================================================== | |
#ChatGPT | |
<QueryList> | |
<Query Id="0" Path="Security"> | |
<Select Path="Security"> | |
*[System[(EventID=4624)]] | |
and | |
*[EventData[Data[@Name='TargetUserName'] and (Data='David')]] | |
and | |
*[EventData[Data[@Name='LogonType'] and (Data='10')]] | |
</Select> | |
</Query> | |
</QueryList> | |
========================================================================================================== | |
#detect possible brute-force, dictionary, and other password guess attacks, which are characterized by a sudden spike in failed logons | |
4625 # target computer not a domain member,(Failed logon) An account failed to log on | |
4626 User/Device claims information | |
4627 Group membership information. | |
4634 An account was logged off | |
4646 IKE DoS-prevention mode started | |
4647 User initiated logoff | |
4648 A logon was attempted using explicit credentials,Remote Access | |
4649 A replay attack was detected | |
4650 An IPsec Main Mode security association was established | |
4651 An IPsec Main Mode security association was established | |
4652 An IPsec Main Mode negotiation failed | |
4653 An IPsec Main Mode negotiation failed | |
4654 An IPsec Quick Mode negotiation failed | |
4655 An IPsec Main Mode security association ended | |
4656 A handle to an object was requested | |
4657 A registry value was modified | |
4658 The handle to an object was closed | |
4659 A handle to an object was requested with intent to delete | |
4660 An object was deleted | |
4661 A handle to an object was requested | |
4662 An operation was performed on an object | |
4663 An attempt was made to access an object | |
4664 An attempt was made to create a hard link | |
4665 An attempt was made to create an application client context. | |
4666 An application attempted an operation | |
4667 An application client context was deleted | |
4668 An application was initialized | |
#Attackers often elevate privileges and change permissions to perform ransomware attacks or move laterally | |
#enable the object's audit policy, especially for "Write DAC"/"Change Permissions" or "Take Ownership" permissions | |
4670 Permissions on an object were changed,A user changing an object’s access control list triggers,Tracking who (or what) takes ownership | |
4671 An application attempted to access a blocked ordinal through the TBS | |
#a possible pass-the-hash or other elevation of privilege attacks, such as using a tool like Mimikatz,Combined with event 4624, which shows a user has logged into an account | |
4672 Special privileges assigned to new logon | |
4673 A privileged service was called | |
4674 An operation was attempted on a privileged object | |
4675 SIDs were filtered | |
4688 A new process has been created | |
4689 A process has exited | |
4690 An attempt was made to duplicate a handle to an object | |
4691 Indirect access to an object was requested | |
4692 Backup of data protection master key was attempted | |
4693 Recovery of data protection master key was attempted | |
4694 Protection of auditable protected data was attempted | |
4695 Unprotection of auditable protected data was attempted | |
4696 A primary token was assigned to process | |
4697 A service was installed in the system | |
4698 A scheduled task was created | |
4699 A scheduled task was deleted | |
4700 A scheduled task was enabled | |
4701 A scheduled task was disabled | |
4702 A scheduled task was updated | |
4703 A token right was adjusted | |
4704 A user right was assigned | |
4705 A user right was removed | |
4706 A new trust was created to a domain | |
4707 A trust to a domain was removed | |
4709 IPsec Services was started | |
4710 IPsec Services was disabled | |
4711 PAStore Engine (1%) | |
4712 IPsec Services encountered a potentially serious failure | |
4713 Kerberos policy was changed | |
4714 Encrypted data recovery policy was changed | |
4715 The audit policy (SACL) on an object was changed | |
4716 Trusted domain information was modified | |
4717 System security access was granted to an account | |
4718 System security access was removed from an account | |
4719 System audit policy was changed | |
4720 A user account was created | |
4722 A user account was enabled | |
4723 An attempt was made to change an account's password | |
4724 An attempt was made to reset an accounts password | |
4725 A user account was disabled | |
4726 A user account was deleted | |
4727 A security-enabled global group was created | |
4728 A member was added to a security-enabled global group | |
4729 A member was removed from a security-enabled global group | |
4730 A security-enabled global group was deleted | |
4731 A security-enabled local group was created | |
4732 A member was added to a security-enabled local group | |
4733 A member was removed from a security-enabled local group | |
4734 A security-enabled local group was deleted | |
4735 A security-enabled local group was changed | |
4737 A security-enabled global group was changed | |
4738 A user account was changed | |
4739 Domain Policy was changed | |
4740 A user account was locked out | |
4741 A computer account was created | |
4742 A computer account was changed | |
4743 A computer account was deleted | |
4744 A security-disabled local group was created | |
4745 A security-disabled local group was changed | |
4746 A member was added to a security-disabled local group | |
4747 A member was removed from a security-disabled local group | |
4748 A security-disabled local group was deleted | |
4749 A security-disabled global group was created | |
4750 A security-disabled global group was changed | |
4751 A member was added to a security-disabled global group | |
4752 A member was removed from a security-disabled global group | |
4753 A security-disabled global group was deleted | |
4754 A security-enabled universal group was created | |
4755 A security-enabled universal group was changed | |
4756 A member was added to a security-enabled universal group | |
4757 A member was removed from a security-enabled universal group | |
4758 A security-enabled universal group was deleted | |
4759 A security-disabled universal group was created | |
4760 A security-disabled universal group was changed | |
4761 A member was added to a security-disabled universal group | |
4762 A member was removed from a security-disabled universal group | |
4763 A security-disabled universal group was deleted | |
4764 A groups type was changed | |
4765 SID History was added to an account | |
4766 An attempt to add SID History to an account failed | |
4767 A user account was unlocked | |
#Group Policy Management Console(Domain Controller)-group policy settings - Computer Configuration/Policies/WindowsSettings/Security Settings/Advanced Audit Policy Configuration/AuditPolicies/ Audit Other Account Logon Events - set to success and failure | |
4768 #A Kerberos authentication ticket (TGT) was requested | |
4769 A Kerberos service ticket was requested | |
4770 A Kerberos service ticket was renewed | |
#Group Policy Management Console(Domain Controller)-group policy settings - Computer Configuration/Policies/WindowsSettings/Security Settings/Advanced Audit Policy Configuration/AuditPolicies/Audit Kerberos Authentication service>set to success and failure | |
4771 #logon the attempt with a domain account,authentication failure,Kerberos pre-authentication failed | |
4772 A Kerberos authentication ticket request failed | |
4773 A Kerberos service ticket request failed | |
4774 An account was mapped for logon | |
4775 An account could not be mapped for logon | |
#Group Policy Management Console(Domain Controller)- group policy settings - Computer Configuration/Policies/WindowsSettings/Security Settings/Advanced Audit Policy Configuration/AuditPolicies/Account Logon/Audit Credential Validation- set to Failures | |
4776 #failed RDP connections,logon attempt with a domain account,authentication failure,The domain controller attempted to validate the credentials for an account | |
4777 The domain controller failed to validate the credentials for an account | |
4778 A session was reconnected to a Window Station | |
4779 A session was disconnected from a Window Station | |
4780 The ACL was set on accounts which are members of administrators groups | |
4781 The name of an account was changed | |
4782 The password hash an account was accessed | |
4783 A basic application group was created | |
4784 A basic application group was changed | |
4785 A member was added to a basic application group | |
4786 A member was removed from a basic application group | |
4787 A non-member was added to a basic application group | |
4788 A non-member was removed from a basic application group.. | |
4789 A basic application group was deleted | |
4790 An LDAP query group was created | |
4791 A basic application group was changed | |
4792 An LDAP query group was deleted | |
4793 The Password Policy Checking API was called | |
4794 An attempt was made to set the Directory Services Restore Mode administrator password | |
4797 An attempt was made to query the existence of a blank password for an account | |
4798 A user's local group membership was enumerated. | |
4799 A security-enabled local group membership was enumerated | |
4800 The workstation was locked | |
4801 The workstation was unlocked | |
4802 The screen saver was invoked | |
4803 The screen saver was dismissed | |
4816 RPC detected an integrity violation while decrypting an incoming message | |
4817 Auditing settings on object were changed. | |
4818 Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy | |
4819 Central Access Policies on the machine have been changed | |
4820 A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions | |
4821 A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions | |
4822 NTLM authentication failed because the account was a member of the Protected User group | |
4823 NTLM authentication failed because access control restrictions are required | |
4824 Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group | |
4825 A user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group | |
4826 Boot Configuration Data loaded | |
4830 SID History was removed from an account | |
4864 A namespace collision was detected | |
4865 A trusted forest information entry was added | |
4866 A trusted forest information entry was removed | |
4867 A trusted forest information entry was modified | |
4868 The certificate manager denied a pending certificate request | |
4869 Certificate Services received a resubmitted certificate request | |
4870 Certificate Services revoked a certificate | |
4871 Certificate Services received a request to publish the certificate revocation list (CRL) | |
4872 Certificate Services published the certificate revocation list (CRL) | |
4873 A certificate request extension changed | |
4874 One or more certificate request attributes changed. | |
4875 Certificate Services received a request to shut down | |
4876 Certificate Services backup started | |
4877 Certificate Services backup completed | |
4878 Certificate Services restore started | |
4879 Certificate Services restore completed | |
4880 Certificate Services started | |
4881 Certificate Services stopped | |
4882 The security permissions for Certificate Services changed | |
4883 Certificate Services retrieved an archived key | |
4884 Certificate Services imported a certificate into its database | |
4885 The audit filter for Certificate Services changed | |
4886 Certificate Services received a certificate request | |
4887 Certificate Services approved a certificate request and issued a certificate | |
4888 Certificate Services denied a certificate request | |
4889 Certificate Services set the status of a certificate request to pending | |
4890 The certificate manager settings for Certificate Services changed. | |
4891 A configuration entry changed in Certificate Services | |
4892 A property of Certificate Services changed | |
4893 Certificate Services archived a key | |
4894 Certificate Services imported and archived a key | |
4895 Certificate Services published the CA certificate to Active Directory Domain Services | |
4896 One or more rows have been deleted from the certificate database | |
4897 Role separation enabled | |
4898 Certificate Services loaded a template | |
4899 A Certificate Services template was updated | |
4900 Certificate Services template security was updated | |
4902 The Per-user audit policy table was created | |
4904 An attempt was made to register a security event source | |
4905 An attempt was made to unregister a security event source | |
4906 The CrashOnAuditFail value has changed | |
4907 Auditing settings on object were changed | |
4908 Special Groups Logon table modified | |
4909 The local policy settings for the TBS were changed | |
4910 The group policy settings for the TBS were changed | |
4911 Resource attributes of the object were changed | |
4912 Per User Audit Policy was changed | |
4913 Central Access Policy on the object was changed | |
4928 An Active Directory replica source naming context was established | |
4929 An Active Directory replica source naming context was removed | |
4930 An Active Directory replica source naming context was modified | |
4931 An Active Directory replica destination naming context was modified | |
4932 Synchronization of a replica of an Active Directory naming context has begun | |
4933 Synchronization of a replica of an Active Directory naming context has ended | |
4934 Attributes of an Active Directory object were replicated | |
4935 Replication failure begins | |
4936 Replication failure ends | |
4937 A lingering object was removed from a replica | |
4944 The following policy was active when the Windows Firewall started | |
4945 A rule was listed when the Windows Firewall started | |
4946 A change has been made to Windows Firewall exception list. A rule was added | |
4947 A change has been made to Windows Firewall exception list. A rule was modified | |
4948 A change has been made to Windows Firewall exception list. A rule was deleted | |
4949 Windows Firewall settings were restored to the default values | |
4950 A Windows Firewall setting has changed | |
4951 A rule has been ignored because its major version number was not recognized by Windows Firewall | |
4952 Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall | |
4953 A rule has been ignored by Windows Firewall because it could not parse the rule | |
4954 Windows Firewall Group Policy settings has changed. The new settings have been applied | |
4956 Windows Firewall has changed the active profile | |
4957 Windows Firewall did not apply the following rule | |
4958 Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer | |
4960 IPsec dropped an inbound packet that failed an integrity check | |
4961 IPsec dropped an inbound packet that failed a replay check | |
4962 IPsec dropped an inbound packet that failed a replay check | |
4963 IPsec dropped an inbound clear text packet that should have been secured | |
4964 Special groups have been assigned to a new logon | |
4965 IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). | |
4976 During Main Mode negotiation, IPsec received an invalid negotiation packet. | |
4977 During Quick Mode negotiation, IPsec received an invalid negotiation packet. | |
4978 During Extended Mode negotiation, IPsec received an invalid negotiation packet. | |
4979 IPsec Main Mode and Extended Mode security associations were established. | |
4980 IPsec Main Mode and Extended Mode security associations were established | |
4981 IPsec Main Mode and Extended Mode security associations were established | |
4982 IPsec Main Mode and Extended Mode security associations were established | |
4983 An IPsec Extended Mode negotiation failed | |
4984 An IPsec Extended Mode negotiation failed | |
4985 The state of a transaction has changed | |
5024 The Windows Firewall Service has started successfully | |
5025 The Windows Firewall Service has been stopped | |
5027 The Windows Firewall Service was unable to retrieve the security policy from the local storage | |
5028 The Windows Firewall Service was unable to parse the new security policy. | |
5029 The Windows Firewall Service failed to initialize the driver | |
5030 The Windows Firewall Service failed to start | |
5031 The Windows Firewall Service blocked an application from accepting incoming connections on the network. | |
5032 Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network | |
5033 The Windows Firewall Driver has started successfully | |
5034 The Windows Firewall Driver has been stopped | |
5035 The Windows Firewall Driver failed to start | |
5037 The Windows Firewall Driver detected critical runtime error. Terminating | |
5038 Code integrity determined that the image hash of a file is not valid | |
5039 A registry key was virtualized. | |
5040 A change has been made to IPsec settings. An Authentication Set was added. | |
5041 A change has been made to IPsec settings. An Authentication Set was modified | |
5042 A change has been made to IPsec settings. An Authentication Set was deleted | |
5043 A change has been made to IPsec settings. A Connection Security Rule was added | |
5044 A change has been made to IPsec settings. A Connection Security Rule was modified | |
5045 A change has been made to IPsec settings. A Connection Security Rule was deleted | |
5046 A change has been made to IPsec settings. A Crypto Set was added | |
5047 A change has been made to IPsec settings. A Crypto Set was modified | |
5048 A change has been made to IPsec settings. A Crypto Set was deleted | |
5049 An IPsec Security Association was deleted | |
5050 An attempt to programmatically disable the Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE | |
5051 A file was virtualized | |
5056 A cryptographic self test was performed | |
5057 A cryptographic primitive operation failed | |
5058 Key file operation | |
5059 Key migration operation | |
5060 Verification operation failed | |
5061 Cryptographic operation | |
5062 A kernel-mode cryptographic self test was performed | |
5063 A cryptographic provider operation was attempted | |
5064 A cryptographic context operation was attempted | |
5065 A cryptographic context modification was attempted | |
5066 A cryptographic function operation was attempted | |
5067 A cryptographic function modification was attempted | |
5068 A cryptographic function provider operation was attempted | |
5069 A cryptographic function property operation was attempted | |
5070 A cryptographic function property operation was attempted | |
5071 Key access denied by Microsoft key distribution service | |
5120 OCSP Responder Service Started | |
5121 OCSP Responder Service Stopped | |
5122 A Configuration entry changed in the OCSP Responder Service | |
5123 A configuration entry changed in the OCSP Responder Service | |
5124 A security setting was updated on OCSP Responder Service | |
5125 A request was submitted to OCSP Responder Service | |
5126 Signing Certificate was automatically updated by the OCSP Responder Service | |
5127 The OCSP Revocation Provider successfully updated the revocation information | |
5136 A directory service object was modified | |
5137 A directory service object was created | |
5138 A directory service object was undeleted | |
5139 A directory service object was moved | |
5140 A network share object was accessed | |
5141 A directory service object was deleted | |
5142 A network share object was added. | |
5143 A network share object was modified | |
5144 A network share object was deleted. | |
5145 A network share object was checked to see whether client can be granted desired access | |
5146 The Windows Filtering Platform has blocked a packet | |
5147 A more restrictive Windows Filtering Platform filter has blocked a packet | |
5148 The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded. | |
5149 The DoS attack has subsided and normal processing is being resumed. | |
5150 The Windows Filtering Platform has blocked a packet. | |
5151 A more restrictive Windows Filtering Platform filter has blocked a packet. | |
5152 The Windows Filtering Platform blocked a packet | |
5153 A more restrictive Windows Filtering Platform filter has blocked a packet | |
5154 The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections | |
5155 The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections | |
5156 The Windows Filtering Platform has allowed a connection | |
5157 The Windows Filtering Platform has blocked a connection | |
5158 The Windows Filtering Platform has permitted a bind to a local port | |
5159 The Windows Filtering Platform has blocked a bind to a local port | |
5168 Spn check for SMB/SMB2 fails. | |
5169 A directory service object was modified | |
5170 A directory service object was modified during a background cleanup task | |
5376 Credential Manager credentials were backed up | |
5377 Credential Manager credentials were restored from a backup | |
5378 The requested credentials delegation was disallowed by policy | |
5379 Credential Manager credentials were read | |
5380 Vault Find Credential | |
5381 Vault credentials were read | |
5382 Vault credentials were read | |
5440 The following callout was present when the Windows Filtering Platform Base Filtering Engine started | |
5441 The following filter was present when the Windows Filtering Platform Base Filtering Engine started | |
5442 The following provider was present when the Windows Filtering Platform Base Filtering Engine started | |
5443 The following provider context was present when the Windows Filtering Platform Base Filtering Engine started | |
5444 The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started | |
5446 A Windows Filtering Platform callout has been changed | |
5447 A Windows Filtering Platform filter has been changed | |
5448 A Windows Filtering Platform provider has been changed | |
5449 A Windows Filtering Platform provider context has been changed | |
5450 A Windows Filtering Platform sub-layer has been changed | |
5451 An IPsec Quick Mode security association was established | |
5452 An IPsec Quick Mode security association ended | |
5453 An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started | |
5456 PAStore Engine applied Active Directory storage IPsec policy on the computer | |
5457 PAStore Engine failed to apply Active Directory storage IPsec policy on the computer | |
5458 PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer | |
5459 PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer | |
5460 PAStore Engine applied local registry storage IPsec policy on the computer | |
5461 PAStore Engine failed to apply local registry storage IPsec policy on the computer | |
5462 PAStore Engine failed to apply some rules of the active IPsec policy on the computer | |
5463 PAStore Engine polled for changes to the active IPsec policy and detected no changes | |
5464 PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services | |
5465 PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully | |
5466 PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead | |
5467 PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy | |
5468 PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes | |
5471 PAStore Engine loaded local storage IPsec policy on the computer | |
5472 PAStore Engine failed to load local storage IPsec policy on the computer | |
5473 PAStore Engine loaded directory storage IPsec policy on the computer | |
5474 PAStore Engine failed to load directory storage IPsec policy on the computer | |
5477 PAStore Engine failed to add quick mode filter | |
5478 IPsec Services has started successfully | |
5479 IPsec Services has been shut down successfully | |
5480 IPsec Services failed to get the complete list of network interfaces on the computer | |
5483 IPsec Services failed to initialize RPC server. IPsec Services could not be started | |
5484 IPsec Services has experienced a critical failure and has been shut down | |
5485 IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces | |
5632 A request was made to authenticate to a wireless network | |
5633 A request was made to authenticate to a wired network | |
5712 A Remote Procedure Call (RPC) was attempted | |
5888 An object in the COM+ Catalog was modified | |
5889 An object was deleted from the COM+ Catalog | |
5890 An object was added to the COM+ Catalog | |
6144 Security policy in the group policy objects has been applied successfully | |
6145 One or more errors occured while processing security policy in the group policy objects | |
6272 Network Policy Server granted access to a user | |
6273 Network Policy Server denied access to a user | |
6274 Network Policy Server discarded the request for a user | |
6275 Network Policy Server discarded the accounting request for a user | |
6276 Network Policy Server quarantined a user | |
6277 Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy | |
6278 Network Policy Server granted full access to a user because the host met the defined health policy | |
6279 Network Policy Server locked the user account due to repeated failed authentication attempts | |
6280 Network Policy Server unlocked the user account | |
6281 Code Integrity determined that the page hashes of an image file are not valid... | |
6400 BranchCache: Received an incorrectly formatted response while discovering availability of content. | |
6401 BranchCache: Received invalid data from a peer. Data discarded. | |
6402 BranchCache: The message to the hosted cache offering it data is incorrectly formatted. | |
6403 BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data. | |
6404 BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate. | |
6405 BranchCache: %2 instance(s) of event id %1 occurred. | |
6406 %1 registered to Windows Firewall to control filtering for the following: | |
6407 %1 | |
6408 Registered product %1 failed and Windows Firewall is now controlling the filtering for %2. | |
6409 BranchCache: A service connection point object could not be parsed | |
6410 Code integrity determined that a file does not meet the security requirements to load into a process. This could be due to the use of shared sections or other issues | |
6416 A new external device was recognized by the system. | |
6417 The FIPS mode crypto selftests succeeded | |
6418 The FIPS mode crypto selftests failed | |
6419 A request was made to disable a device | |
6420 A device was disabled | |
6421 A request was made to enable a device | |
6422 A device was enabled | |
6423 The installation of this device is forbidden by system policy | |
6424 The installation of this device was allowed, after having previously been forbidden by policy | |
7031 a service has stopped unexpectedly | |
8191 Highest System-Defined Audit Message Value | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
DHCP | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#DHCP Server | |
PS51> Get-ChildItem C:\Windows\system32\dhcp\Dhcp*SrvLog-*.log | Select -ExpandProperty Name #Finding the Logs | |
PS51> Get-DhcpServerAuditLog #make sure that the DHCP audit logs are enabled | |
#enable it and restart the DHCP service | |
PS51> Set-DhcpServerAuditLog -Enable $True -MaxMBFileSize 70 | |
PS51> Restart-Service DhcpServer | |
DHCP settings-HKEY_LOCAL_MACHINE-SYSTEM-CurrentControlSet-Services-DHCPServer-Parameters. | |
? DhcpLogFilesMaxSize Sets the maximum file size for all logs. The default is 70 MB. | |
? DhcpLogDiskSpaceCleanupInterval Determines how often DHCP checks disk space usage and cleans up as necessary. The default interval is 60 minutes. | |
? DhcpLogMinSpaceOnDisk Sets the free space threshold for writing to the log. If the disk has less free space than the value specified, logging is temporarily disabled. The default value is 20 MB | |
#Windows Server 2016 Data Center | |
Open Event Viewer. You can do this by searching for "eventvwr.msc" in the Start menu or pressing Windows key + R, typing "eventvwr.msc", and pressing Enter. | |
Expand Applications and Services Logs. | |
Expand Microsoft. | |
Expand Windows. | |
Expand DHCP-Server | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
Event ID Meaning | |
00 The log was started. | |
01 The log was stopped. | |
02 The log was temporarily paused due to low disk space. | |
10 A new IP address was leased to a client. | |
11 A lease was renewed by a client. | |
12 A lease was released by a client. | |
13 An IP address was found to be in use on the network. | |
14 A lease request could not be satisfied because the scope's address pool was exhausted. | |
15 A lease was denied. | |
16 A lease was deleted. | |
17 A lease was expired and DNS records for an expired leases have not been deleted. | |
18 A lease was expired and DNS records were deleted. | |
20 A BOOTP address was leased to a client. | |
21 A dynamic BOOTP address was leased to a client. | |
22 A BOOTP request could not be satisfied because the scope's address pool for BOOTP was exhausted. | |
23 A BOOTP IP address was deleted after checking to see it was not in use. | |
24 IP address cleanup operation has began. | |
25 IP address cleanup statistics. | |
30 DNS update request to the named DNS server. | |
31 DNS update failed. | |
32 DNS update successful. | |
33 Packet dropped due to NAP policy. | |
34 DNS update request failed.as the DNS update request queue limit exceeded. | |
35 DNS update request failed. | |
36 Packet dropped because the server is in failover standby role or the hash of the client ID does not match. | |
50+ Codes above 50 are used for Rogue Server Detection information | |
50: Unreachable domain | |
51: Authorization succeeded | |
52: Upgraded to a Windows Server 2003 operating system | |
53: Cached Authorization | |
54: Authorization failed | |
55: Authorization (servicing) | |
56: Authorization failure, stopped servicing | |
57: Server found in domain | |
58: Server could not find domain | |
59: Network failure | |
60: No DC is DS Enabled | |
61: Server found that belongs to DS domain | |
62: Another server found | |
63: Restarting rogue detection | |
64: No DHCP enabled interfaces | |
4190: DHCP server failed to assign an address because there are no more available in the scope. | |
4191: DHCP server encountered an error while processing a DHCP request. | |
4198: DHCP lease has expired. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | |
#The Dynamic Host Configuration Protocol version 6 (DHCPv6) is a network protocol for configuring Internet Protocol version 6 (IPv6) hosts with IP addresses, IP prefixes and other configuration data required to operate in an IPv6 network. It is the IPv6 equivalent of the Dynamic Host Configuration Protocol for IPv4. | |
Event ID Meaning | |
11000 DHCPv6 Solicit. | |
11001 DHCPv6 Advertise. | |
11002 DHCPv6 Request. | |
11003 DHCPv6 Confirm. | |
11004 DHCPv6 Renew. | |
11005 DHCPv6 Rebind. | |
11006 DHCPv6 Decline. | |
11007 DHCPv6 Release. | |
11008 DHCPv6 Information Request. | |
11009 DHCPv6 Scope Full. | |
11010 DHCPv6 Started. | |
11011 DHCPv6 Stopped. | |
11012 DHCPv6 Audit log paused. | |
11013 DHCPv6 Log File. | |
11014 DHCPv6 Bad Address. | |
11015 DHCPv6 Address is already in use. | |
11016 DHCPv6 Client deleted. | |
11017 DHCPv6 DNS record not deleted. | |
11018 DHCPv6 Expired. | |
11019 DHCPv6 Leases Expired and Leases Deleted . | |
11020 DHCPv6 Database cleanup begin. | |
11021 DHCPv6 Database cleanup end. | |
11022 DNS IPv6 Update Request. | |
11023 DNS IPv6 Update Failed. | |
11024 DNS IPv6 Update Successful. | |
11028 DNS IPv6 update request failed as the DNS update request queue limit exceeded. | |
11029 DNS IPv6 update request failed. | |
11030 DHCPv6 stateless client records purged. | |
11031 DHCPv6 stateless client record is purged as the purge interval has expired for this client record. | |
11032 DHCPV6 Information Request from IPV6 Stateless Client. | |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment