Event ID 300 — Groups assigned to a new logon.
Description
Groups assigned to a new logon.
Message #
Fields #
| Name | Description |
|---|---|
TargetUserSid SID | [New Logon] Security ID. |
TargetUserName UnicodeString | [New Logon] Account Name. |
TargetDomainName UnicodeString | [New Logon] Account Domain. |
TargetLogonId HexInt64 | [New Logon] Logon ID. |
TargetLogonGuid GUID | [New Logon] Logon GUID. |
EventOrginal UInt32 | [New Logon] Event in sequence. |
EventCountTotal UInt32 | — |
SidList UnicodeString | [New Logon] Group Membership. |
Example Event #
{
"system": {
"provider": "LsaSrv",
"guid": "199FE037-2B82-40A9-82AC-E1D46C792B99",
"event_source_name": "",
"event_id": 300,
"version": 0,
"level": 4,
"task": 0,
"opcode": 0,
"keywords": 2305843009213693952,
"time_created": "2023-11-06T02:03:41.600577+00:00",
"event_record_id": 220,
"correlation": {
"ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
},
"execution": {
"process_id": 808,
"thread_id": 844
},
"channel": "Microsoft-Windows-LSA/Operational",
"computer": "WinDev2310Eval",
"security": {
"user_id": "S-1-5-18"
}
},
"event_data": {
"TargetUserSid": "S-1-5-20",
"TargetUserName": "NETWORK SERVICE",
"TargetDomainName": "NT AUTHORITY",
"TargetLogonId": "0x3e4",
"TargetLogonGuid": "00000000-0000-0000-0000-000000000000",
"EventOrginal": 1,
"EventCountTotal": 1,
"SidList": "\r\n\t\t%{S-1-5-20}\r\n\t\t%{S-1-1-0}\r\n\t\t%{S-1-5-32-545}\r\n\t\t%{S-1-5-6}\r\n\t\t%{S-1-2-1}\r\n\t\t%{S-1-5-11}\r\n\t\t%{S-1-5-15}\r\n\t\t%{S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628}\r\n\t\t%{S-1-2-0}\r\n\t\t%{S-1-5-32-545}"
},
"message": ""
}
Detection Rules #
View all rules referencing this event →
Sigma # view in reference
- Standard User In High Privileged Group source medium: Detect standard users login that are part of high privileged groups such as the Administrator group
References #
- Example event sourced from https://github.com/NextronSystems/evtx-baseline