LsaSrv
87 events across 6 channels
Event ID 100 — The security package does not cache the credentials needed to authenticate to the server.
Message
Fields
| Name | Description |
|---|---|
Package_Name | — |
User_Name | — |
Domain_Name | — |
Server_Name | — |
Protected_User | — |
Error_Code | — |
PackageName | — |
UserName | — |
DomainName | — |
ServerName | — |
ProtectedUser | — |
ErrorCode | — |
Event ID 200 — A security package received a network logon request after the logoff completed.
Message
Fields
| Name | Description |
|---|---|
User_Name | — |
Domain_Name | — |
Logon_ID | — |
Logoff_Time | — |
PID | — |
Program | — |
Principal_Name | — |
Server_Name | — |
Package_Name | — |
Call_Type | — |
Error_Code | — |
UserName | — |
DomainName | — |
LogonId | — |
LogoffTime | — |
PrincipalName | — |
ServerName | — |
PackageName | — |
CallType | — |
ErrorCode | — |
Event ID 300 — Groups assigned to a new logon.
Message
Fields
| Name | Description |
|---|---|
TargetUserSid | [New Logon] Security ID. |
TargetUserName | [New Logon] Account Name. |
TargetDomainName | [New Logon] Account Domain. |
TargetLogonId | [New Logon] Logon ID. |
TargetLogonGuid | [New Logon] Logon GUID. |
EventOrginal | [New Logon] Event in sequence. |
EventCountTotal | — |
SidList | [New Logon] Group Membership. |
Example Event
system:
provider: LsaSrv
guid: 199FE037-2B82-40A9-82AC-E1D46C792B99
event_source_name: ''
event_id: 300
version: 0
level: 4
task: 0
opcode: 0
keywords: 2305843009213693952
time_created: '2023-11-06T02:03:41.600577+00:00'
event_record_id: 220
correlation:
ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
execution:
process_id: 808
thread_id: 844
channel: Microsoft-Windows-LSA/Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
TargetUserSid: S-1-5-20
TargetUserName: NETWORK SERVICE
TargetDomainName: NT AUTHORITY
TargetLogonId: '0x3e4'
TargetLogonGuid: 00000000-0000-0000-0000-000000000000
EventOrginal: 1
EventCountTotal: 1
SidList: "\r\n\t\t%{S-1-5-20}\r\n\t\t%{S-1-1-0}\r\n\t\t%{S-1-5-32-545}\r\n\t\t%{S-1-5-6}\r\n\t\t%{S-1-2-1}\r\n\t\t%{S-1-5-11}\r\n\t\t%{S-1-5-15}\r\n\t\t%{S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628}\r\n\t\t%{S-1-2-0}\r\n\t\t%{S-1-5-32-545}"
message: ''
Sigma Rules
- Standard User In High Privileged Group
Detect standard users login that are part of high privileged groups such as the Administrator group
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 301 — Claims assigned to a new logon.
Message
Fields
| Name | Description |
|---|---|
TargetUserSid | — |
TargetUserName | — |
TargetDomainName | — |
TargetLogonId | — |
TargetLogonGuid | — |
LogonType | — |
EventIdx | — |
EventCountTotal | — |
UserClaims | — |
DeviceClaims | — |
Event ID 302 — User %1 logged off notification is received.
Message
Fields
| Name | Description |
|---|---|
LogonId | — |
AuthorityName | — |
AccountName | — |
Timeout | — |
UserSid | — |
Elapse | — |
Event ID 303 — The security package does not cache the user's sign on credentials.
Message
Fields
| Name | Description |
|---|---|
Package_Name | — |
User_Name | — |
Domain_Name | — |
Protected_User | — |
PackageName | — |
UserName | — |
DomainName | — |
ProtectedUser | — |
Event ID 320 — Automatic restart sign on successfully configured the autologon credentials for: Account Name: %1 Account Domain: %2.
Message
Fields
| Name | Description |
|---|---|
Account_Name | [Automatic restart sign on successfully configured the autologon credentials for] Account Name. |
Account_Domain | [Automatic restart sign on successfully configured the autologon credentials for] Account Domain. |
UserName | — |
DomainName | — |
Event ID 321 — Automatic restart sign on failed to configure the autologon credentials with error.
Message
Fields
| Name | Description |
|---|---|
Error | — |
Event ID 322 — Automatic restart sign on successfully deleted autologon credentials from LSA memory
Message
Event ID 5000 — The security package %1 generated an exception.
Message
Fields
| Name | Description |
|---|---|
Package | — |
Exception | — |
__binLength | — |
Event ID 6025 — Could not upgrade the Trusted domain object for domain {Domain}.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
Event ID 6027 — Could not upgrade the global secret %1.
Message
Fields
| Name | Description |
|---|---|
Secret | — |
status | — |
__binLength | — |
Event ID 6029 — LSA could not update domain information in the registry to match the DS.
Message
Fields
| Name | Description |
|---|---|
Error | — |
Event ID 6031 — The database contains invalid information for trusted domain {Domain}.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
Event ID 6033 — An anonymous session connected from %1 has attempted to open an LSA policy handle on this machine.
Message
Fields
| Name | Description |
|---|---|
Client | — |
Event ID 6034 — The new top level name; {TopLevelName}; has been added to the forest {Forestname}.
Message
Fields
| Name | Description |
|---|---|
TopLevelName | — |
Forestname | — |
Event ID 6035 — During a logon attempt, the user's security context accumulated too many security IDs.
Message
Fields
| Name | Description |
|---|---|
SID | — |
Event ID 6036 — The program %2, with the assigned Process ID %1, supplied a NULL or empty target name for the pszTargetName parameter when calling the InitializeSe...
Message
Fields
| Name | Description |
|---|---|
PID | — |
Program | — |
Event ID 6037 — The program %2, with the assigned process ID %1, could not authenticate locally by using the target name %3.
Message
Fields
| Name | Description |
|---|---|
PID | — |
Program | — |
TargetName | — |
Event ID 6038 — Microsoft Windows Server has detected that NTLM authentication is presently being used between clients and this server.
Message
Fields
| Name | Description |
|---|---|
Data_0 | — |
Binary | — |
Example Event
system:
provider: LsaSrv
guid: '{199fe037-2b82-40a9-82ac-e1d46c792b99}'
event_source_name: LsaSrv
event_id: 6038
version: 0
level: 3
task: 0
opcode: 0
keywords: 36028797018963968
time_created: '2022-04-07T17:39:24.046564+00:00'
event_record_id: 1326
correlation: {}
execution:
process_id: 0
thread_id: 0
channel: System
computer: WIN-FPV0DSIC9O6.sigma.fr
security:
user_id: ''
event_data:
Data_0: ''
Binary: ''
message: ''
Sigma Rules
- NTLMv1 Logon Between Client and Server
Detects the reporting of NTLMv1 being used between a client and server. NTLMv1 is insecure as the underlying encryption algorithms can be brute-forced by modern hardware.
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 6039 — Microsoft Windows Server has detected that NTLM authentication is being used between clients and this server.
Message
Sigma Rules
- NTLMv1 Logon Between Client and Server
Detects the reporting of NTLMv1 being used between a client and server. NTLMv1 is insecure as the underlying encryption algorithms can be brute-forced by modern hardware.
Event ID 6040 — An authentication request for package %1 was rejected because the target information was invalid.
Message
Fields
| Name | Description |
|---|---|
Package | — |
TargetName | — |
Event ID 6041 — A CredSSP authentication to %1 failed to negotiate a common protocol version.
Message
Fields
| Name | Description |
|---|---|
TargetName | — |
TargetVersion | — |
Event ID 6144 — A secret object private to LSA was queried by a client.
Message
References
Event ID 6145 — An error occurred while retrieving new Central Access Policies for this machine.
Message
Fields
| Name | Description |
|---|---|
MissingCAPDNs | — |
References
Event ID 6146 — An error occurred while processing new Central Access Policies for this machine.
Message
Fields
| Name | Description |
|---|---|
Error | [An error occurred while processing new Central Access Policies for this machine. Validation failed for the following Central Access Rule referenced by one or more of the Central Access Policies] Error. |
Name | [An error occurred while processing new Central Access Policies for this machine. Validation failed for the following Central Access Rule referenced by one or more of the Central Access Policies] Name. |
Description | [An error occurred while processing new Central Access Policies for this machine. Validation failed for the following Central Access Rule referenced by one or more of the Central Access Policies] Description. |
CAPEName | — |
CAPEDesc | — |
Event ID 6147 — Credential Guard is configured to run, but is not licensed.
Message
Event ID 6148 — The PDC completed an automatic trust scan operation for all trusts with no errors.
Message
Example Event
system:
provider: LsaSrv
guid: 199FE037-2B82-40A9-82AC-E1D46C792B99
event_source_name: ''
event_id: 6148
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-07T17:08:01.191328+00:00'
event_record_id: 1299
correlation: {}
execution:
process_id: 664
thread_id: 2808
channel: System
computer: WIN-FPV0DSIC9O6.sigma.fr
security:
user_id: S-1-5-18
event_data: {}
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 6149 — The PDC completed an automatic trust scan operation for all trusts and encountered at least one error.
Message
Event ID 6150 — The PDC completed an administrator-requested trust scan operation for the trust '.
Message
Fields
| Name | Description |
|---|---|
TrustName | — |
Event ID 6151 — The PDC was unable to find the specified trust '.
Message
Fields
| Name | Description |
|---|---|
TrustName | — |
Event ID 6152 — The PDC completed an administrator-requested trust scan operation for the trust '.
Message
Fields
| Name | Description |
|---|---|
TrustName | — |
Event ID 6153 — The PDC encountered an error trying to scan the named trust.
Message
Fields
| Name | Description |
|---|---|
Trust | — |
Error | — |
TrustName | — |
ErrorCodeHex | — |
ErrorCode | — |
Event ID 6154 — Possible use of roaming Credential Manager credentials with Credential Guard detected.
Message
Event ID 6155 — LSA package is not signed as expected.
Message
Fields
| Name | Description |
|---|---|
PackageName | — |
Example Event
system:
provider: LsaSrv
guid: 199FE037-2B82-40A9-82AC-E1D46C792B99
event_source_name: ''
event_id: 6155
version: 0
level: 3
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T06:25:27.966390+00:00'
event_record_id: 1665
correlation:
ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
execution:
process_id: 808
thread_id: 812
channel: System
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
PackageName: msv1_0
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 6156 — Credential Guard auto enablement status.
Message
Fields
| Name | Description |
|---|---|
HardwareChecks | Hardware Requirements. |
ADDomainJoin | Domain Joined. |
AADDomainJoin | Azure AD Joined. |
Example Event
system:
provider: LsaSrv
guid: 199FE037-2B82-40A9-82AC-E1D46C792B99
event_source_name: ''
event_id: 6156
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T06:25:27.300426+00:00'
event_record_id: 1655
correlation: {}
execution:
process_id: 808
thread_id: 812
channel: System
computer: WinDev2310Eval
security:
user_id: S-1-5-18
event_data:
HardwareChecks: 1
ADDomainJoin: 0
AADDomainJoin: 0
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 6157 — The PDC completed a background trust scan operation of the named trust.
Message
Fields
| Name | Description |
|---|---|
TrustName | — |
Event ID 6158 — Error reading Credential Guard.
Message
Fields
| Name | Description |
|---|---|
Status | — |
Event ID 6160 — LsaIso.
Message
Fields
| Name | Description |
|---|---|
Status | — |
Event ID 6161 — Credential Guard configuration: %1, %2, %3.
Message
Fields
| Name | Description |
|---|---|
Config | — |
IsTestConfig | — |
AutoEnabled | — |
Event ID 6162 — Key Guard was started and will protect VSM-isolated keys.
Message
Event ID 6163 — Credential Guard was started and will protect LSA credentials.
Message
Event ID 6164 — Credential Guard is configured but the secure kernel is not running; continuing without Credential Guard.
Message
Event ID 6165 — VBS bound machine secret is present but falling back to LSA bound secret.
Message
Fields
| Name | Description |
|---|---|
CredGuardRunning | — |
IsPasswordValid | — |
Event ID 6166 — Machine Identity Isolation status: Credential Guard running: %1 Group Policy: %2 Machine secret source: %3 VBS bound secret validity: %4.
Message
Fields
| Name | Description |
|---|---|
CredGuardRunning | — |
GroupPolicyStatus | — |
MachinePasswordSource | — |
MachinePasswordValidity | — |
MachineCertificatePresent | — |
Event ID 6167 —
Event ID 6167 — There is a partial mismatch in the machine ID.
Message
Event ID 6182 — LogonSession alive after interactive user logoff.
Message
Fields
| Name | Description |
|---|---|
Logon_ID | — |
Account_Name | — |
Domain_Name | — |
TargetLogonId | — |
AccountName | — |
DomainName | — |
Event ID 6225 —
Event ID 6226 —
Event ID 6227 —
Event ID 6228 —
Event ID 6229 —
Event ID 6230 —
Event ID 6231 —
Event ID 6232 —
Event ID 29186 — Moving the existing logon scripts from {OldScripts} to {NewScripts} failed.
Message
Fields
| Name | Description |
|---|---|
OldScripts | — |
NewScripts | — |
Event ID 29187 — Running the Security Configuration Editor over the Domain Controller encountered a non-fatal error.
Message
Fields
| Name | Description |
|---|---|
Logfile | — |
Event ID 29188 — An existing; incompatible trust object was found on the parent server for domain {DomainName}.
Message
Fields
| Name | Description |
|---|---|
DomainName | — |
Event ID 29216 — Failed to disable auto logon following the successful upgrade of a domain controller.
Message
Fields
| Name | Description |
|---|---|
Path | — |
Event ID 29217 — Failed to set the default logon domain to {DomainName}.
Message
Fields
| Name | Description |
|---|---|
DomainName | — |
Event ID 29221 — During the demotion operation; the trust object on {ParentName} could not be removed.
Message
Fields
| Name | Description |
|---|---|
ParentName | — |
Event ID 29241 — Dcpromo failed to configure the new starttype of {Flags} for the service {ServiceName} during forced demotion.
Message
Fields
| Name | Description |
|---|---|
Flags | — |
ServiceName | — |
Event ID 29242 — Dcpromo failed to remove the dependency of {ServiceName} on {Dependency} during forced demotion.
Message
Fields
| Name | Description |
|---|---|
ServiceName | — |
Dependency | — |
Event ID 32768 — The interdomain trust account for the domain {Domain} could not be deleted.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
Event ID 32772 — The interdomain trust account for the domain {Domain} could not be created.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
Event ID 32773 — A lookup request was made that required connectivity to a domain controller in domain %1.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
TargetDomain | — |
status | — |
__binLength | — |
Event ID 32774 — A lookup request was made that required connectivity to the domain controller %1.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
TargetDomain | — |
status | — |
__binLength | — |
Event ID 32775 — A lookup request was made that required the lookup services on the remote domain controller %1.
Message
Fields
| Name | Description |
|---|---|
Domain | — |
TargetDomain | — |
status | — |
__binLength | — |
Event ID 32777 — The LSA was unable to register its RPC interface over the TCP/IP interface.
Message
Event ID 32778 — The name {Name} was translated to SID {SID} from the trusted forest {Forest}.
Message
Fields
| Name | Description |
|---|---|
Name | — |
SID | — |
Forest | — |
Event ID 32779 —
Event ID 32779 —
Fields
| Name | Description |
|---|---|
SubCategoryGuid | — |
Event ID 32780 — The LSA was unable to notify UBPM during startup with status %1.
Message
Fields
| Name | Description |
|---|---|
Status | — |
Event ID 40960 — The Security System detected an authentication error for the server %1.
Message
Fields
| Name | Description |
|---|---|
Target | — |
Protocol | — |
Error | — |
Event ID 40961 — The Security System could not establish a secured connection with the server %1.
Message
Fields
| Name | Description |
|---|---|
Target | — |
Event ID 40962 — The Security System was unable to authenticate to the server %1 because the server has completed the authentication, but the client authentication ...
Message
Fields
| Name | Description |
|---|---|
Target | — |
Protocol | — |
Event ID 40964 — The Security System received an authentication attempt with an unknown authentication protocol.
Message
Event ID 40965 — The Security System has selected %2 for the authentication protocol to server %1.
Message
Fields
| Name | Description |
|---|---|
Target | — |
Protocol | — |
Event ID 40966 — The Security System has received an authentication attempt, and determined that the protocol %1 preferred by the client is acceptable.
Message
Fields
| Name | Description |
|---|---|
Protocol | — |
Event ID 40967 — The Security System has received an authentication request directly for authentication protocol %1.
Message
Fields
| Name | Description |
|---|---|
Protocol | — |
Event ID 40968 — The Security System has received an authentication request that could not be decoded.
Message
Event ID 40969 — The Security System has received an authentication attempt, and determined that the protocol %1 is the common protocol.
Message
Fields
| Name | Description |
|---|---|
Protocol | — |
Event ID 40970 — The Security System has detected a downgrade attempt when contacting the 3-part SPN %1 with error code %2.
Message
Fields
| Name | Description |
|---|---|
Target | — |
Error | — |
Event ID 45056 — Logon cache was disabled.
Message
Event ID 45057 — A failed logon attempt has caused a logon cache entry for user %1 to be deleted.
Message
Fields
| Name | Description |
|---|---|
Username | — |
Package | — |
Error | — |
Event ID 45058 — A logon cache entry for user %1 was the oldest entry and was removed.
Message
Fields
| Name | Description |
|---|---|
UserName | — |
TimeStamp | — |