Microsoft-Windows-NTLM
21 events across 3 channels
Event ID 100 — NTLM authentication failed because the account was a member of the Protected User group.
Message
Fields
| Name | Description |
|---|---|
Account_Name | — |
Device_Name | — |
Error_Code | — |
AccountName | — |
DeviceName | — |
Status | — |
Event ID 101 — NTLM authentication failed because access control restrictions are required.
Message
Fields
| Name | Description |
|---|---|
Account_Name | — |
Device_Name | — |
Error_Code | — |
Silo_Name | [Authentication Policy Information] Silo Name. |
PolicyName | [Authentication Policy Information] PolicyName. |
AccountName | — |
DeviceName | — |
Status | — |
SiloName | — |
Event ID 301 — NTLM authentication succeded, but it will fail when Authentication Policy is enforced because access control restrictions are required.
Message
Fields
| Name | Description |
|---|---|
Account_Name | — |
Device_Name | — |
Error_Code | — |
Silo_Name | [Authentication Policy Information] Silo Name. |
PolicyName | [Authentication Policy Information] PolicyName. |
AccountName | — |
DeviceName | — |
Status | — |
SiloName | — |
Event ID 4001 — NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.
Message
Fields
| Name | Description |
|---|---|
TargetName | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Event ID 4002 — NTLM server blocked: Incoming NTLM traffic to servers that is blocked Calling process PID: %1 Calling process name: %2 Calling process LUID: %3 Cal...
Message
Fields
| Name | Description |
|---|---|
Calling_process_PID | — |
Calling_process_name | — |
Calling_process_LUID | — |
Calling_process_user_identity | — |
Calling_process_domain_identity | — |
Mechanism_OID | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Event ID 4003 — NTLM server blocked in the domain: NTLM authentication in this domain that is blocked User: %1 Domain: %2 Workstation: %3 PID: %4 Process: %5 Logon...
Message
Fields
| Name | Description |
|---|---|
User | — |
Domain | — |
Workstation | — |
PID | — |
Process | — |
Logon_type | — |
InProc | — |
Mechanism | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
LogonType | — |
MechanismOID | — |
Event ID 4010 — NTLM Minimum Client Security Block: Calling process PID: %1 Calling Process Name: %2 Negotiated Security Flags: %3 Minimum Security Flags: %4.
Message
Fields
| Name | Description |
|---|---|
Calling_process_PID | [NTLM Minimum Client Security Block] Calling process PID. |
Calling_Process_Name | [NTLM Minimum Client Security Block] Calling Process Name. |
Negotiated_Security_Flags | [NTLM Minimum Client Security Block] Negotiated Security Flags. |
Minimum_Security_Flags | [NTLM Minimum Client Security Block] Minimum Security Flags. |
CallerPID | — |
ProcessName | — |
NegotiatedSecurity | — |
RequiredSecurity | — |
Event ID 4011 — NTLM Minimum Server Security Block: Calling process PID: %1 Calling Process Name: %2 Negotiated Security Flags: %3 Minimum Security Flags: %4.
Message
Fields
| Name | Description |
|---|---|
Calling_process_PID | [NTLM Minimum Server Security Block] Calling process PID. |
Calling_Process_Name | [NTLM Minimum Server Security Block] Calling Process Name. |
Negotiated_Security_Flags | [NTLM Minimum Server Security Block] Negotiated Security Flags. |
Minimum_Security_Flags | [NTLM Minimum Server Security Block] Minimum Security Flags. |
CallerPID | — |
ProcessName | — |
NegotiatedSecurity | — |
RequiredSecurity | — |
Event ID 4012 — NTLM client used the domain password.
Message
Fields
| Name | Description |
|---|---|
Account_Name | — |
Device_Name | — |
AccountName | — |
DeviceName | — |
Event ID 4013 — Attempt to use NTLMv1 failed.
Message
Fields
| Name | Description |
|---|---|
TargetName | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Event ID 4014 — Attempt to get credential key by call package blocked by Credential Guard.
Message
Fields
| Name | Description |
|---|---|
Calling_Process_Name | — |
Service_Host_Tag | — |
ImageName | — |
SvcHostTag | — |
Event ID 4015 — NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.
Message
Fields
| Name | Description |
|---|---|
TargetName | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Event ID 4020 — This machine attempted to authenticate to a remote resource via NTLM.
Message
Fields
| Name | Description |
|---|---|
ProcessName | — |
ProcessPID | — |
Username | — |
DomainName | — |
Hostname | — |
SingleSignOn | — |
TargetMachine | — |
TargetDomain | — |
TargetService | — |
TargetIP | — |
TargetNetworkName | — |
NtlmUsageId | — |
NtlmUsageReason | — |
NegotiatedFlags | — |
NtlmVersion | — |
SessionKeyStatus | — |
ChannelBindingStatus | — |
ServiceBinding | — |
MicStatus | — |
AvlFlags | — |
AvlFlagsStr | — |
Event ID 4021 — This machine attempted to authenticate to a remote resource via NTLM.
Message
Fields
| Name | Description |
|---|---|
ProcessName | — |
ProcessPID | — |
Username | — |
DomainName | — |
Hostname | — |
SingleSignOn | — |
TargetMachine | — |
TargetDomain | — |
TargetService | — |
TargetIP | — |
TargetNetworkName | — |
NtlmUsageId | — |
NtlmUsageReason | — |
NegotiatedFlags | — |
NtlmVersion | — |
SessionKeyStatus | — |
ChannelBindingStatus | — |
ServiceBinding | — |
MicStatus | — |
AvlFlags | — |
AvlFlagsStr | — |
Event ID 4022 — A remote client is using NTLM to authenticate to this workstation.
Message
Fields
| Name | Description |
|---|---|
ProcessName | — |
ProcessPID | — |
Username | — |
DomainName | — |
RemoteClientMachine | — |
ClientIP | — |
ClientNetworkName | — |
NegotiatedFlags | — |
NtlmVersion | — |
SessionKeyStatus | — |
ChannelBindingStatus | — |
ServiceBinding | — |
TargetMachine | — |
TargetDomain | — |
MicStatus | — |
AvFlags | — |
AvFlagsStr | — |
Status | — |
StatusMsg | — |
Event ID 4023 — A remote client is using NTLM to authenticate to this workstation.
Message
Fields
| Name | Description |
|---|---|
ProcessName | — |
ProcessPID | — |
Username | — |
DomainName | — |
RemoteClientMachine | — |
ClientIP | — |
ClientNetworkName | — |
NegotiatedFlags | — |
NtlmVersion | — |
SessionKeyStatus | — |
ChannelBindingStatus | — |
ServiceBinding | — |
TargetMachine | — |
TargetDomain | — |
MicStatus | — |
AvFlags | — |
AvFlagsStr | — |
Status | — |
StatusMsg | — |
Event ID 4024 — Auditing an attempt to use NTLMv1-derived credentials for Single Sign-On.
Message
Fields
| Name | Description |
|---|---|
TargetName | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Event ID 4025 — An attempt to use NTLMv1-derived credentials for Single Sign-On was blocked due to policy.
Message
Fields
| Name | Description |
|---|---|
TargetName | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Event ID 8001 — NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked.
Message
Fields
| Name | Description |
|---|---|
TargetName | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Sigma Rules
- Potential Remote Desktop Connection to Non-Domain Host
Detects logons using NTLM to hosts that are potentially not part of the domain.
References
Event ID 8002 — NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked Calling process PID: %1 Calling process name: %2 Calling process LUID:...
Message
Fields
| Name | Description |
|---|---|
Calling_process_PID | — |
Calling_process_name | — |
Calling_process_LUID | — |
Calling_process_user_identity | — |
Calling_process_domain_identity | — |
Mechanism_OID | — |
CallerPID | — |
ProcessName | — |
ClientLUID | — |
ClientUserName | — |
ClientDomainName | — |
MechanismOID | — |
Sigma Rules
- NTLM Logon
Detects logons using NTLM, which could be caused by a legacy source or attackers
References
Event ID 8003 — NTLM server blocked in the domain audit: Audit NTLM authentication in this domain User: %1 Domain: %2 Workstation: %3 PID: %4 Process: %5 Logon typ...
Message
Fields
| Name | Description |
|---|---|
User | — |
Domain | — |
Workstation | — |
PID | — |
Process | — |
Logon_type | — |
InProc | — |
Mechanism | — |
UserName | — |
DomainName | — |
CallerPID | — |
ProcessName | — |
LogonType | — |
MechanismOID | — |