Microsoft-Windows-NTLM
21 events across 3 channels
Event ID 100 — NTLM authentication failed because the account was a member of the Protected User group.
Description
NTLM authentication failed because the account was a member of the Protected User group.
Message #
Fields #
| Name | Description |
|---|---|
Account_Name UnicodeString | — |
Device_Name UnicodeString | — |
Error_Code HexInt32 | — |
AccountName UnicodeString | — |
DeviceName UnicodeString | — |
Status HexInt32 | — NTSTATUS reference |
Event ID 101 — NTLM authentication failed because access control restrictions are required.
Description
NTLM authentication failed because access control restrictions are required.
Message #
Fields #
| Name | Description |
|---|---|
Account_Name UnicodeString | — |
Device_Name UnicodeString | — |
Error_Code HexInt32 | — |
Silo_Name UnicodeString | [Authentication Policy Information] Silo Name. |
PolicyName UnicodeString | [Authentication Policy Information] PolicyName. |
AccountName UnicodeString | — |
DeviceName UnicodeString | — |
Status HexInt32 | — NTSTATUS reference |
SiloName UnicodeString | — |
Event ID 301 — NTLM authentication succeded, but it will fail when Authentication Policy is enforced because access control restrictions are required.
Description
NTLM authentication succeded, but it will fail when Authentication Policy is enforced because access control restrictions are required.
Message #
Fields #
| Name | Description |
|---|---|
Account_Name UnicodeString | — |
Device_Name UnicodeString | — |
Error_Code HexInt32 | — |
Silo_Name UnicodeString | [Authentication Policy Information] Silo Name. |
PolicyName UnicodeString | [Authentication Policy Information] PolicyName. |
AccountName UnicodeString | — |
DeviceName UnicodeString | — |
Status HexInt32 | — NTSTATUS reference |
SiloName UnicodeString | — |
Event ID 4001 — NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.
Description
NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.
Message #
Fields #
| Name | Description |
|---|---|
TargetName UnicodeString | — |
UserName UnicodeString | — |
DomainName UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
ClientLUID HexInt64 | — |
ClientUserName UnicodeString | — |
ClientDomainName UnicodeString | — |
MechanismOID UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-NTLM",
"guid": "ac43300d-5fcc-4800-8e99-1bd3f85f0320",
"event_source_name": "",
"event_id": 4001,
"version": 0,
"level": 3,
"task": 1,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2026-05-03T21:03:06.9528515+00:00",
"event_record_id": 32,
"correlation": {
"ActivityID": "64478093-d4f9-0001-1c81-4764f9d4dc01",
"RelatedActivityID": ""
},
"execution": {
"process_id": 976,
"thread_id": 1364
},
"channel": "Microsoft-Windows-NTLM/Operational",
"computer": "DESKTOP-K7Q9MS2",
"security": {
"user_id": "S-1-5-18"
}
},
"event_data": {
"TargetName": "cifs/127.0.0.1",
"UserName": "bogus",
"DomainName": "BOGUS",
"CallerPID": "4",
"ProcessName": "",
"ClientLUID": "0x4641e93",
"ClientUserName": "localuser",
"ClientDomainName": "DESKTOP-K7Q9MS2",
"MechanismOID": "(NULL)"
},
"message": "NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.\r\nTarget server: cifs/127.0.0.1\r\nSupplied user: bogus\r\nSupplied domain: BOGUS\r\nPID of client process: 4\r\nName of client process: \r\nLUID of client process: 0x4641E93\r\nUser identity of client process: localuser\r\nDomain name of user identity of client process: DESKTOP-K7Q9MS2\r\nMechanism OID: (NULL)\r\n\r\nNTLM authentication requests from this computer are blocked.\r\n\r\nIf you want to allow this computer to use NTLM authentication, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Allow all.\r\n\r\nIf you want only the target server cifs/127.0.0.1 to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Deny all and then set the security policy Network Security: Restrict NTLM: Add remote server exceptions and list the target server cifs/127.0.0.1 as an exception to use NTLM authentication."
}
Event ID 4002 — NTLM server blocked: Incoming NTLM traffic to servers that is blocked.
Description
NTLM server blocked: Incoming NTLM traffic to servers that is blocked.
Message #
Fields #
| Name | Description |
|---|---|
Calling_process_PID UInt32 | — |
Calling_process_name UnicodeString | — |
Calling_process_LUID HexInt64 | — |
Calling_process_user_identity UnicodeString | — |
Calling_process_domain_identity UnicodeString | — |
Mechanism_OID UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
ClientLUID HexInt64 | — |
ClientUserName UnicodeString | — |
ClientDomainName UnicodeString | — |
MechanismOID UnicodeString | — |
Event ID 4003 — NTLM server blocked in the domain: NTLM authentication in this domain that is blocked.
Description
NTLM server blocked in the domain: NTLM authentication in this domain that is blocked.
Message #
Fields #
| Name | Description |
|---|---|
User UnicodeString | — |
Domain UnicodeString | — |
Workstation UnicodeString | — |
PID UInt32 | — |
Process UnicodeString | — |
Logon_type UInt32 | — Logon type reference |
InProc Boolean | — |
Mechanism UnicodeString | — |
UserName UnicodeString | — |
DomainName UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
LogonType UInt32 | — Logon type reference |
MechanismOID UnicodeString | — |
Event ID 4010 — NTLM Minimum Client Security Block.
Description
NTLM Minimum Client Security Block.
Message #
Fields #
| Name | Description |
|---|---|
Calling_process_PID UInt32 | [NTLM Minimum Client Security Block] Calling process PID. |
Calling_Process_Name UnicodeString | [NTLM Minimum Client Security Block] Calling Process Name. |
Negotiated_Security_Flags HexInt32 | [NTLM Minimum Client Security Block] Negotiated Security Flags. |
Minimum_Security_Flags HexInt32 | [NTLM Minimum Client Security Block] Minimum Security Flags. |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
NegotiatedSecurity HexInt32 | — |
RequiredSecurity HexInt32 | — |
Event ID 4011 — NTLM Minimum Server Security Block.
Description
NTLM Minimum Server Security Block.
Message #
Fields #
| Name | Description |
|---|---|
Calling_process_PID UInt32 | [NTLM Minimum Server Security Block] Calling process PID. |
Calling_Process_Name UnicodeString | [NTLM Minimum Server Security Block] Calling Process Name. |
Negotiated_Security_Flags HexInt32 | [NTLM Minimum Server Security Block] Negotiated Security Flags. |
Minimum_Security_Flags HexInt32 | [NTLM Minimum Server Security Block] Minimum Security Flags. |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
NegotiatedSecurity HexInt32 | — |
RequiredSecurity HexInt32 | — |
Event ID 4012 — NTLM client used the domain password.
Event ID 4013 — Attempt to use NTLMv1 failed.
Event ID 4014 — Attempt to get credential key by call package blocked by Credential Guard.
Description
Attempt to get credential key by call package blocked by Credential Guard.
Message #
Fields #
| Name | Description |
|---|---|
ImageName UnicodeString | — |
SvcHostTag UnicodeString | — |
Calling_Process_Name UnicodeString | — |
Service_Host_Tag UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-NTLM",
"guid": "AC43300D-5FCC-4800-8E99-1BD3F85F0320",
"event_source_name": "",
"event_id": 4014,
"version": 0,
"level": 2,
"task": 0,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2026-03-12T01:53:29.127433+00:00",
"event_record_id": 1103,
"correlation": {
"ActivityID": "EFDC13CA-B670-4786-969E-784D6C91B8C8"
},
"execution": {
"process_id": 720,
"thread_id": 6076
},
"channel": "Microsoft-Windows-NTLM/Operational",
"computer": "LAB-WIN11",
"security": {
"user_id": "S-1-5-18"
}
},
"event_data": {
"ImageName": "svchost",
"SvcHostTag": ""
},
"message": ""
}
Event ID 4015 — NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.
Description
NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.
Message #
Fields #
| Name | Description |
|---|---|
TargetName UnicodeString | — |
UserName UnicodeString | — |
DomainName UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
ClientLUID HexInt64 | — |
ClientUserName UnicodeString | — |
ClientDomainName UnicodeString | — |
MechanismOID UnicodeString | — |
Event ID 4020 — This machine attempted to authenticate to a remote resource via NTLM.
Description
This machine attempted to authenticate to a remote resource via NTLM.
Message #
Fields #
| Name | Description |
|---|---|
ProcessName UnicodeString | — |
ProcessPID HexInt32 | — |
Username UnicodeString | — |
DomainName UnicodeString | — |
Hostname UnicodeString | — |
SingleSignOn UnicodeString | — |
TargetMachine UnicodeString | — |
TargetDomain UnicodeString | — |
TargetService UnicodeString | — |
TargetIP UnicodeString | — |
TargetNetworkName UnicodeString | — |
NtlmUsageId UInt32 | — |
NtlmUsageReason UnicodeString | — |
NegotiatedFlags HexInt32 | — |
NtlmVersion UnicodeString | — |
SessionKeyStatus UnicodeString | — |
ChannelBindingStatus UnicodeString | — |
ServiceBinding UnicodeString | — |
MicStatus UnicodeString | — |
AvlFlags HexInt32 | — |
AvlFlagsStr UnicodeString | — |
Event ID 4021 — This machine attempted to authenticate to a remote resource via NTLM.
Description
This machine attempted to authenticate to a remote resource via NTLM.
Message #
Fields #
| Name | Description |
|---|---|
ProcessName UnicodeString | — |
ProcessPID HexInt32 | — |
Username UnicodeString | — |
DomainName UnicodeString | — |
Hostname UnicodeString | — |
SingleSignOn UnicodeString | — |
TargetMachine UnicodeString | — |
TargetDomain UnicodeString | — |
TargetService UnicodeString | — |
TargetIP UnicodeString | — |
TargetNetworkName UnicodeString | — |
NtlmUsageId UInt32 | — |
NtlmUsageReason UnicodeString | — |
NegotiatedFlags HexInt32 | — |
NtlmVersion UnicodeString | — |
SessionKeyStatus UnicodeString | — |
ChannelBindingStatus UnicodeString | — |
ServiceBinding UnicodeString | — |
MicStatus UnicodeString | — |
AvlFlags HexInt32 | — |
AvlFlagsStr UnicodeString | — |
Event ID 4022 — A remote client is using NTLM to authenticate to this workstation.
Description
A remote client is using NTLM to authenticate to this workstation.
Message #
Fields #
| Name | Description |
|---|---|
ProcessName UnicodeString | — |
ProcessPID HexInt32 | — |
Username UnicodeString | — |
DomainName UnicodeString | — |
RemoteClientMachine UnicodeString | — |
ClientIP UnicodeString | — |
ClientNetworkName UnicodeString | — |
NegotiatedFlags HexInt32 | — |
NtlmVersion UnicodeString | — |
SessionKeyStatus UnicodeString | — |
ChannelBindingStatus UnicodeString | — |
ServiceBinding UnicodeString | — |
TargetMachine UnicodeString | — |
TargetDomain UnicodeString | — |
MicStatus UnicodeString | — |
AvFlags HexInt32 | — |
AvFlagsStr UnicodeString | — |
Status HexInt32 | — NTSTATUS reference |
StatusMsg UInt32 | — |
Event ID 4023 — A remote client is using NTLM to authenticate to this workstation.
Description
A remote client is using NTLM to authenticate to this workstation.
Message #
Fields #
| Name | Description |
|---|---|
ProcessName UnicodeString | — |
ProcessPID HexInt32 | — |
Username UnicodeString | — |
DomainName UnicodeString | — |
RemoteClientMachine UnicodeString | — |
ClientIP UnicodeString | — |
ClientNetworkName UnicodeString | — |
NegotiatedFlags HexInt32 | — |
NtlmVersion UnicodeString | — |
SessionKeyStatus UnicodeString | — |
ChannelBindingStatus UnicodeString | — |
ServiceBinding UnicodeString | — |
TargetMachine UnicodeString | — |
TargetDomain UnicodeString | — |
MicStatus UnicodeString | — |
AvFlags HexInt32 | — |
AvFlagsStr UnicodeString | — |
Status HexInt32 | — NTSTATUS reference |
StatusMsg UInt32 | — |
Event ID 4024 — Auditing an attempt to use NTLMv1-derived credentials for Single Sign-On.
Description
Auditing an attempt to use NTLMv1-derived credentials for Single Sign-On.
Message #
Fields #
| Name | Description |
|---|---|
TargetName UnicodeString | — |
UserName UnicodeString | — |
DomainName UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
ClientLUID HexInt64 | — |
ClientUserName UnicodeString | — |
ClientDomainName UnicodeString | — |
MechanismOID UnicodeString | — |
Event ID 4025 — An attempt to use NTLMv1-derived credentials for Single Sign-On was blocked due to policy.
Description
An attempt to use NTLMv1-derived credentials for Single Sign-On was blocked due to policy.
Message #
Fields #
| Name | Description |
|---|---|
TargetName UnicodeString | — |
UserName UnicodeString | — |
DomainName UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
ClientLUID HexInt64 | — |
ClientUserName UnicodeString | — |
ClientDomainName UnicodeString | — |
MechanismOID UnicodeString | — |
Event ID 8001 — NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked.
#Description
NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked.
Message #
Fields #
| Name | Description |
|---|---|
TargetName UnicodeString | — |
UserName UnicodeString | — |
DomainName UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
ClientLUID HexInt64 | — |
ClientUserName UnicodeString | — |
ClientDomainName UnicodeString | — |
MechanismOID UnicodeString | — |
Detection Rules #
View all rules referencing this event →
Sigma # view in reference
- Potential Remote Desktop Connection to Non-Domain Host source medium: Detects logons using NTLM to hosts that are potentially not part of the domain.
References #
Event ID 8002 — NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked.
#Description
NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked.
Message #
Fields #
| Name | Description |
|---|---|
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
ClientLUID HexInt64 | — |
ClientUserName UnicodeString | — |
ClientDomainName UnicodeString | — |
MechanismOID UnicodeString | — |
Calling_process_PID UInt32 | — |
Calling_process_name UnicodeString | — |
Calling_process_LUID HexInt64 | — |
Calling_process_user_identity UnicodeString | — |
Calling_process_domain_identity UnicodeString | — |
Mechanism_OID UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-NTLM",
"guid": "AC43300D-5FCC-4800-8E99-1BD3F85F0320",
"event_source_name": "",
"event_id": 8002,
"version": 0,
"level": 4,
"task": 2,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2026-03-12T02:56:00.824258+00:00",
"event_record_id": 1104,
"correlation": {
"ActivityID": "CC8E79E3-F5C5-4F46-89CF-44829F945FA1"
},
"execution": {
"process_id": 720,
"thread_id": 12064
},
"channel": "Microsoft-Windows-NTLM/Operational",
"computer": "LAB-WIN11",
"security": {
"user_id": "S-1-5-18"
}
},
"event_data": {
"CallerPID": 720,
"ProcessName": "C:\\Windows\\System32\\lsass.exe",
"ClientLUID": "0x3e4",
"ClientUserName": "LAB-WIN11$",
"ClientDomainName": "WORKGROUP",
"MechanismOID": "(NULL)"
},
"message": ""
}
Detection Rules #
View all rules referencing this event →
Sigma # view in reference
- NTLM Logon source low: Detects logons using NTLM, which could be caused by a legacy source or attackers
References #
Event ID 8003 — NTLM server blocked in the domain audit: Audit NTLM authentication in this domain.
#Description
NTLM server blocked in the domain audit: Audit NTLM authentication in this domain.
Message #
Fields #
| Name | Description |
|---|---|
UserName UnicodeString | — |
DomainName UnicodeString | — |
Workstation UnicodeString | — |
CallerPID UInt32 | — |
ProcessName UnicodeString | — |
LogonType UInt32 | — Logon type reference |
InProc Boolean | — |
MechanismOID UnicodeString | — |
User UnicodeString | — |
Domain UnicodeString | — |
PID UInt32 | — |
Process UnicodeString | — |
Logon_type UInt32 | — Logon type reference |
Mechanism UnicodeString | — |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-NTLM",
"guid": "AC43300D-5FCC-4800-8E99-1BD3F85F0320",
"event_source_name": "",
"event_id": 8003,
"version": 0,
"level": 4,
"task": 2,
"opcode": 0,
"keywords": 9223372036854775808,
"time_created": "2026-03-09T00:55:20.842728+00:00",
"event_record_id": 957,
"correlation": {
"ActivityID": "4F958266-269A-4D65-B9BD-F5FA499B7442"
},
"execution": {
"process_id": 764,
"thread_id": 3132
},
"channel": "Microsoft-Windows-NTLM/Operational",
"computer": "LAB-WIN11.ludus.domain",
"security": {
"user_id": "S-1-5-18"
}
},
"event_data": {
"UserName": "domainuser",
"DomainName": "LUDUS",
"Workstation": "(NULL)",
"CallerPID": 764,
"ProcessName": "C:\\Windows\\System32\\lsass.exe",
"LogonType": 3,
"InProc": true,
"MechanismOID": "(NULL)"
},
"message": ""
}
Community Notes #
Appearing prior to 4624/4776 may indicate unsuccessful coercion probes.