Microsoft-Windows-PowerShell

189 events across 3 channels

Event IDTitleChannel
4097Computer Name $null or.Operational
4098Resolving to default scheme httpOperational
4099Remote shell name resolved to default Microsoft.Operational
4100Payload Context: ContextInfo User Data: UserData.Operational
4101Payload Context: ContextInfo User Data: UserData.Operational
4102Payload Context: ContextInfo User Data: UserData.Operational
4103Payload Context: ContextInfo User Data: UserData.Operational
4104Creating Scriptblock text (MessageNumber of MessageTotal).Operational
4105Started invocation of ScriptBlock ID: ScriptBlockId.Operational
4106Completed invocation of ScriptBlock ID: ScriptBlockId.Operational
7937ContextInfo Context: Context User Data: User_Data.Analytic
7938Payload Context: ContextInfo User Data: UserData.Analytic
7939Payload Context: ContextInfo User Data: UserData.Analytic
7940ContextInfo Context: Context User Data: User_Data.Analytic
7941Correlating activity id's.Analytic
7942Class Name = ClassName.Analytic
8193Creating Runspace object Instance Id.Operational
8194Creating RunspacePool object.Operational
8195Opening RunspacePoolOperational
8196Modifying activity Id and correlatingOperational
8197Runspace state changed to param1.Operational
8198Attempting session creation retry param1 for error code param2 on session Id …Operational
12033Port resolved to param1.Analytic
12034AppName resolved to param1.Analytic
12035ComputerName resolved to param1.Analytic
12036Scheme is param1.Analytic
12037Test analytic messageAnalytic
12038Connection Paramters are Connection URI: Connection_URI Resource URI: …Analytic
12039Modifying activity Id and correlatingOperational
16385AmsiUtil state.Analytic
24577Windows PowerShell ISE has started to run script file FileName.Operational
24578Windows PowerShell ISE has started to run a user-selected script from file …Operational
24579Windows PowerShell ISE is stopping the current command.Operational
24580Windows PowerShell ISE is resuming the debugger.Operational
24581Windows PowerShell ISE is stopping the debugger.Operational
24582Windows PowerShell ISE is stepping into debugging.Operational
24583Windows PowerShell ISE is stepping over debugging.Operational
24584Windows PowerShell ISE is stepping out of debugging.Operational
24592Windows PowerShell ISE is enabling all breakpoints.Operational
24593Windows PowerShell ISE is disabling all breakpoints.Operational
24594Windows PowerShell ISE is removing all breakpoints.Operational
24595Windows PowerShell ISE is setting the breakpoint at line #: CurrentLine of file …Operational
24596Windows PowerShell ISE is removing the breakpoint on line #: CurrentLine of file …Operational
24597Windows PowerShell ISE is enabling the breakpoint on line #: CurrentLine of file …Operational
24598Windows PowerShell ISE is disabling the breakpoint on line #: CurrentLine of …Operational
24599Windows PowerShell ISE has hit a breakpoint on line #: CurrentLine of file …Operational
28673Successfully rehydrated an object.Analytic
28674Failed to rehydrated an object.Analytic
28675Serialization depth has been overriden.Analytic
28676Serialization mode has been overriden.Analytic
28677Serialization of a script property has been skipped, because there is no …Analytic
28678Serialization of a property has been skipped, because property getter failed.Analytic
28679Serialization of an enumerable object might not be complete, because object …Analytic
28680Serialization called object's ToString method which failed.Analytic
28682Maximum depth below top level has been reached, forcing object to be serialized …Analytic
28683XmlException has been thrown by the deserializer (most likely indicating …Analytic
28684Serialization of specified properties failed, because one of the specified …Analytic
32769Received object with Runspace Id: Runspace_InstanceId Command Id: …Analytic
32775An unhandled exception occurred in the appdomain.Analytic
32776Runspace Id: SessionId Pipeline Id: PipelineId.Analytic
32777An unhandled exception occurred in the appdomain.Operational
32784Runspace Id: SessionId Pipeline Id: PipelineId.Operational
32785Runspace Id param1.Analytic
32786Runspace Id param1.Analytic
32787Runspace Id: RunspaceId.Analytic
32788Runspace Id: RunspaceId.Analytic
32789Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.Analytic
32790Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.Analytic
32791Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.Analytic
32792Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.Analytic
32793Runspace Id SessionId Pipeline Id PipelineId.Analytic
32800Runspace Id SessionId Pipeline Id PipelineId.Analytic
32801Runspace Id: Runspace_Id Pipeline Id SessionId.Analytic
32802Runspace Id: Runspace_Id Pipeline Id SessionId.Analytic
32803Runspace Id: Runspace_Id Pipeline Id SessionId.Analytic
32804Runspace Id: Runspace_Id Pipeline Id SessionId.Analytic
32805Runspace Id: SessionId.Analytic
32849Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.Analytic
32850Request param1.Analytic
32851Reporting context for request: ReportingContextForRequest Context Reported: …Analytic
32852Reporting operation complete for request: ReportingOperationCompleteForRequest.Analytic
32853Shell Context param1.Analytic
32854Shell Context param1 Command Context param2 Request Id param3.Analytic
32855Shell Context param1 Command Context param2 Request Id param3.Analytic
32856Shell Context param1 Command Context param2 Request Id param3.Analytic
32857Shell Context param1 Command Context param2 IsReceiveOperation param3.Analytic
32865Loading assembly param1 for custom shell with shell Id param2.Analytic
32866Loading type param1 for custom shell with shell Id param2.Analytic
32867Received remoting fragment.Analytic
32868Sent remoting fragment.Analytic
32869Shutting down winrm service.Analytic
40961PowerShell console is starting upOperational
40962PowerShell console is ready for user inputOperational
45057Tracing ErrorRecord.Debug
45058Exception: Message: Message StackTrace: StackTrace InnerException : …Debug
45059Tracing PSObjectDebug
45060Tracing Job: Id: Id InstanceId: InstanceId Name: Name Location: Location State: …Debug
45061Trace Information.Debug
45062Connection Paramters are Connection URI: Connection_URI Resource URI: …Debug
45063Workflow plugin loaded.Analytic
45064Workflow execution started.Analytic
45065Workflow state changed.Analytic
45072Workflow plugin has been requested for a shutdown.Analytic
45073Workflow plugin restarted.Analytic
45074Workflow is resuming.Analytic
45075A quota limit that was set for the endpoint was exceeded.Analytic
45076Workflow has resumed.Analytic
45078Workflow runspace pool was created.Analytic
45079Activity was queued for execution.Analytic
45080Activity execution started.Analytic
45081Workflow is being imported from a XAML file.Analytic
45082Workflow has been imported from a XAML file.Analytic
45083Workflow could not be imported from a XAML file because of an error.Analytic
45084Workflow validation started.Analytic
45085Workflow validation succeeded.Analytic
45086Workflow validation failed with error.Analytic
45087Workflow activity validated.Analytic
45088Workflow activity could not be validated.Analytic
45089Activity execution failed.Analytic
45090Runspace availability changed.Analytic
45091Runspace state changed.Analytic
45092Workflow loaded for execution.Analytic
45093Workflow unloaded.Analytic
45094Workflow execution cancelled.Analytic
45095Workflow execution aborted.Analytic
45096Workflow cleanup operation executed.Analytic
45097Persisted workflow loaded from disk.Analytic
45098Workflow data was deleted from disk.Analytic
45100Starting remove job.Analytic
45101Job state changed.Analytic
45102Job error.Analytic
45104Job created for workflow (child job).Analytic
45105Parent job created for workflow.Analytic
45106All required jobs were created for workflow execution.Analytic
45107Child job removed for workflow.Analytic
45108An error occurred while removing job.Analytic
45109Loading workflow for execution.Analytic
45110Workflow execution finished.Analytic
45111Cancelling workflow execution.Analytic
45112Aborting workflow execution.Analytic
45113Unloading workflow.Analytic
45114Forced workflow shutdown started.Analytic
45115Forced workflow shutdown finished.Analytic
45116An error occurred while forcefully shutting down a workflow.Analytic
45117Persisting workflow to disk.Analytic
45118Workflow persisted to disk.Analytic
45119Activity execution finished.Analytic
45120Workflow execution error.Analytic
45121A new PowerShell endpoint was registered.Analytic
45122Endpoint configuration modified.Analytic
45123Endpoint configuration unregistered.Analytic
45124Endpoint configuration disabled.Analytic
45125Endpoint configuration enabled.Analytic
45126Out of process runspace started.Analytic
45127Parameter splatting was performed during workflow execution.Analytic
45128Workflow engine started.Analytic
45129Workflow manager instantiated with CheckpointPath: CheckpointPath …Debug
46337BEGIN ImportWorkflowCommand::StartWorkflowApplication.Debug
46338END ImportWorkflowCommand::StartWorkflowApplication.Debug
46339BEGIN Creating new job in ImportWorkflowCommand::StartWorkflowApplication.Debug
46340END Creating new job in ImportWorkflowCommand::StartWorkflowApplication.Debug
46341END Creating new job in ImportWorkflowCommand::StartWorkflowApplication.Debug
46342BEGIN JobLogic ContainerParentJob Guid WorkflowJobJobInstanceId.Debug
46343END JobLogic ContainerParentJob Guid WorkflowJobJobInstanceId.Debug
46344BEGIN WorkflowExecution ContainerParentJob Guid WorkflowJobJobInstanceId.Debug
46345END WorkflowExecution ContainerParentJob Guid WorkflowJobJobInstanceId.Debug
46346WorkflowJob with Guid WorkflowJobInstanceId added to ContainerParentJob with …Debug
46347ProxyJob with Guid ProxyJobInstanceId associated with remote ContainerParentJob …Debug
46348BEGIN Execution of ContainerParentJob with Guid ContainerParentJobInstanceId.Debug
46349END Execution of ContainerParentJob with Guid ContainerParentJobInstanceId.Debug
46350BEGIN Execution of Proxy Job with Guid ProxyJobInstanceId.Debug
46351END Execution of Proxy Job with Guid ProxyJobInstanceId.Debug
46352BEGIN StateChanged event handler for Proxy Job with Guid ProxyJobInstanceId.Debug
46353END StateChanged event handler for Proxy Job with Guid ProxyJobInstanceId.Debug
46354BEGIN StateChanged event handler for Proxy Child Job with Guid …Debug
46355END StateChanged event handler for Proxy Child Job with Guid …Debug
46356BEGIN Running garbage collectionDebug
46357END Running garbage collectionDebug
46358Persistence store has reached its maximum specified sizeOperational
49152message.Debug
49153Trace Information.Debug
53249Scheduled Job ScheduledJobDefName started at StartTime.Operational
53250Scheduled Job ScheduledJobDefName completed at StopTime with state State.Operational
53251Scheduled Job Exception Message.Operational
53504Windows PowerShell has started an IPC listening thread on process: param1 in …Operational
53505Windows PowerShell has ended an IPC listening thread on process: param1 in …Operational
53506An error has occurred in Windows PowerShell IPC listening thread on process: …Operational
53507Windows PowerShell IPC connect on process: param1 in AppDomain: param2 for User: …Operational
53508Windows PowerShell IPC disconnect on process: param1 in AppDomain: param2 for …Operational

Event ID 4097 — Computer Name $null or.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Computer Name $null or . resolve to LocalHost.

Message #

Computer Name $null or . resolve to LocalHost

Event ID 4098 — Resolving to default scheme http

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Resolving to default scheme http.

Message #

Resolving to default scheme http

Event ID 4099 — Remote shell name resolved to default Microsoft.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Remote shell name resolved to default Microsoft.PowerShell.

Message #

Remote shell name resolved to default Microsoft.PowerShell

Event ID 4100 — Payload Context: ContextInfo User Data: UserData.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Warning
Collection Priority
Recommended (Yamato Security, others)
Task
None
Opcode
Tobeusedwhenanexceptionisraised

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
ContextInfo UnicodeStringContext
UserData UnicodeString
Payload UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4100,
    "version": 1,
    "level": 3,
    "task": 106,
    "opcode": 19,
    "keywords": 0,
    "time_created": "2022-04-07T17:04:47.579256+00:00",
    "event_record_id": 144,
    "correlation": {
      "ActivityID": "E0AAB88C-4A9F-0000-0BCA-AAE09F4AD801"
    },
    "execution": {
      "process_id": 380,
      "thread_id": 3624
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WIN-FPV0DSIC9O6.lab.local",
    "security": {
      "user_id": "S-1-5-21-2121334350-1110938707-2888912545-500"
    }
  },
  "event_data": {
    "ContextInfo": "        Severity = Warning\r\n        Host Name = ADMUX\r\n        Host Version = 1.0.0.0\r\n        Host ID = 2e800f71-2f5c-4821-bd98-9e3b61b6b054\r\n        Host Application = C:\\Windows\\system32\\dsac.exe\r\n        Engine Version = 5.1.20348.617\r\n        Runspace ID = 4e800c4b-dc8b-408d-8e82-38150ba7d4fe\r\n        Pipeline ID = 31\r\n        Command Name = Set-ADAccountPassword\r\n        Command Type = Cmdlet\r\n        Script Name = \r\n        Command Path = \r\n        Sequence Number = 23\r\n        User = SIGMA\\Administrator\r\n        Connected User = \r\n        Shell ID = Microsoft.PowerShell\r\n",
    "UserData": "",
    "Payload": "Error Message = The password does not meet the length, complexity, or history requirement of the domain.\r\nFully Qualified Error ID = ActiveDirectoryServer:1325,Microsoft.ActiveDirectory.Management.Commands.SetADAccountPassword\r\n"
  },
  "message": ""
}

References #

Event ID 4101 — Payload Context: ContextInfo User Data: UserData.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security, others)
Task
None
Opcode
Tobeusedwhenanexceptionisraised

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
ContextInfo UnicodeString
UserData UnicodeString
Payload UnicodeString
Context
User_Data

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4101,
    "version": 1,
    "level": 4,
    "task": 0,
    "opcode": 19,
    "keywords": 9223372036854775840,
    "time_created": "2026-03-13T19:32:29.608586+00:00",
    "event_record_id": 149117,
    "correlation": {
      "ActivityID": "DF92C490-B30B-000C-6802-93DF0BB3DC01"
    },
    "execution": {
      "process_id": 4068,
      "thread_id": 956
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "LAB-WIN11.ludus.domain",
    "security": {
      "user_id": "S-1-5-21-1006758700-2167138679-1475694448-1105"
    }
  },
  "event_data": {
    "ContextInfo": "Install",
    "UserData": "Package=nuget, Version=2.8.5.208, Provider=Bootstrap, Source=https://cdn.oneget.org/providers/nuget-2.8.5.208.package.swidtag, Status=Installed, DestinationPath=",
    "Payload": "PackageManagement: A package is installed."
  },
  "message": ""
}

Event ID 4102 — Payload Context: ContextInfo User Data: UserData.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Warning
Collection Priority
Recommended (Yamato Security, others)
Task
None
Opcode
Tobeusedwhenanexceptionisraised

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
ContextInfo UnicodeStringContext
UserData UnicodeString
Payload UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4102,
    "version": 1,
    "level": 3,
    "task": 106,
    "opcode": 19,
    "keywords": 0,
    "time_created": "2023-10-25T21:34:05.630892+00:00",
    "event_record_id": 11,
    "correlation": {
      "ActivityID": "DE03B784-07C3-0001-BC98-04DEC307DA01"
    },
    "execution": {
      "process_id": 1796,
      "thread_id": 2088
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDevEval",
    "security": {
      "user_id": "S-1-5-21-2533829718-189860685-2477588761-500"
    }
  },
  "event_data": {
    "ContextInfo": "        Severity = Warning\r\n        Host Name = ConsoleHost\r\n        Host Version = 5.1.22621.2428\r\n        Host ID = d4db7522-7ab1-46f8-add0-ee6f22c6c812\r\n        Host Application = C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -ExecutionPolicy Bypass a:\\FixPublicNetworkType.ps1\r\n        Engine Version = 5.1.22621.2428\r\n        Runspace ID = c5b2be04-de37-4a47-bfdd-d75d2d714efd\r\n        Pipeline ID = 1\r\n        Command Name = \r\n        Command Type = \r\n        Script Name = \r\n        Command Path = \r\n        Sequence Number = 16\r\n        User = WINDEVEVAL\\Administrator\r\n        Connected User = \r\n        Shell ID = Microsoft.PowerShell\r\n",
    "UserData": "",
    "Payload": "Error Message = Could not find the drive 'a:\\'. The drive might not be ready or might not be mapped.\r\n\r\nProvider name = Microsoft.PowerShell.Core\\FileSystem\r\n"
  },
  "message": ""
}

References #

Event ID 4103 — Payload Context: ContextInfo User Data: UserData.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security, others)
Task
None
Opcode
Tobeusedwhenanexceptionisraised

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
ContextInfo UnicodeStringContext
UserData UnicodeString
Payload UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4103,
    "version": 1,
    "level": 4,
    "task": 106,
    "opcode": 20,
    "keywords": 0,
    "time_created": "2023-11-06T01:35:06.007359+00:00",
    "event_record_id": 907,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0000-CD79-E9E43710DA01"
    },
    "execution": {
      "process_id": 15468,
      "thread_id": 15184
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "ContextInfo": "        Severity = Informational\r\n        Host Name = ConsoleHost\r\n        Host Version = 5.1.22621.2428\r\n        Host ID = 9500ad9e-7709-413f-b91b-8945cbb52940\r\n        Host Application = powershell.exe -NoExit -Command &{Import-Module \"C:\\Program Files\\Microsoft Visual Studio\\2022\\Community\\Common7\\Tools\\Microsoft.VisualStudio.DevShell.dll\"; Enter-VsDevShell d5dcd421 -SkipAutomaticLocation -DevCmdArguments \"-arch=x64 -host_arch=x64\"}\r\n        Engine Version = 5.1.22621.2428\r\n        Runspace ID = 6fa4bb48-d600-4d4b-b445-e1fa0a41db53\r\n        Pipeline ID = 23\r\n        Command Name = Set-StrictMode\r\n        Command Type = Cmdlet\r\n        Script Name = C:\\Program Files\\WindowsPowerShell\\Modules\\PSReadLine\\2.0.0\\PSReadLine.psm1\r\n        Command Path = \r\n        Sequence Number = 58\r\n        User = WINDEV2310EVAL\\User\r\n        Connected User = \r\n        Shell ID = Microsoft.PowerShell\r\n",
    "UserData": "",
    "Payload": "CommandInvocation(Set-StrictMode): \"Set-StrictMode\"\r\nParameterBinding(Set-StrictMode): name=\"Off\"; value=\"True\"\r\n"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 17 more (33 total)

References #

Event ID 4104 — Creating Scriptblock text (MessageNumber of MessageTotal).

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Verbose
Collection Priority
Recommended (Yamato Security, others)
Task
StartingCommand
Opcode
Oncreatecalls

Description

Creating Scriptblock text (MessageNumber of MessageTotal).

Message #

Creating Scriptblock text (%1 of %2):
%3

ScriptBlock ID: %4
Path: %5

Fields #

NameDescription
MessageNumber Int32Part number of the current script block fragment (large scripts are split across multiple events)
MessageTotal Int32Total number of script block fragments for the complete script
ScriptBlockText UnicodeStringContent of the executed PowerShell script block
ScriptBlockId UnicodeStringScriptBlock ID.
Path UnicodeStringFull path to the executed script file

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4104,
    "version": 1,
    "level": 5,
    "task": 2,
    "opcode": 15,
    "keywords": 0,
    "time_created": "2023-11-06T01:35:05.990326+00:00",
    "event_record_id": 901,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0002-FA44-ECE43710DA01"
    },
    "execution": {
      "process_id": 15468,
      "thread_id": 15184
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "MessageNumber": 1,
    "MessageTotal": 1,
    "ScriptBlockText": "prompt",
    "ScriptBlockId": "6baf0dc7-a83f-43e1-bb6a-d7ab8d05eeb0",
    "Path": ""
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • AADInternals PowerShell Cmdlets Execution - PsScript source high: Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.
  • Access to Browser Login Data source medium: Adversaries may acquire credentials from web browsers by reading files specific to the target browser. Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store.
  • Potential Active Directory Enumeration Using AD Module - PsScript source medium: Detects usage of the "Import-Module" cmdlet to load the "Microsoft.ActiveDirectory.Management.dl" DLL. Which is often used by attackers to perform AD enumeration.
Show 17 more (162 total)

Elastic # view in reference

Show 9 more (12 total)
  • Potential PowerShell Obfuscation via Concatenated Dynamic Command Invocation source high: Detects PowerShell scripts that builds commands from concatenated string literals inside dynamic invocation constructs like &() or .(). Attackers use concatenated dynamic invocation to obscure execution intent, bypass keyword-based detections, and evade AMSI.
  • Potential PowerShell Obfuscation via High Numeric Character Proportion source low: Detects long PowerShell script block content with unusually high numeric character density (high digit-to-length ratio), often produced by byte arrays, character-code reconstruction, or embedded encoded blobs. Attackers use numeric-heavy obfuscation to conceal payloads and rebuild them at runtime to avoid static inspection.
  • Potential Dynamic IEX Reconstruction via Environment Variables source medium: Detects PowerShell scripts that reconstructs IEX (Invoke-Expression) by indexing environment variable strings (for example, $env:VAR[1,2,3]) or related `.name[...]` slices and joining characters at runtime. Attackers use environment-variable slicing to hide dynamic execution and evade keyword-based detections and AMSI.
  • Dynamic IEX Reconstruction via Method String Access source low: Detects PowerShell scripts that rebuilds IEX by converting method references to strings (for example, ''.IndexOf.ToString()) and extracting multiple indexed characters (for example, [n,n,n]). Attackers use method-string reconstruction to conceal dynamic execution and bypass static detections and AMSI.
  • PowerShell Obfuscation via Negative Index String Reversal source low: Detects PowerShell scripts that uses negative index ranges (for example, $var[-1..0]) to reverse strings or arrays and rebuild content at runtime. Attackers use index reversal to reconstruct hidden commands or payloads and evade static analysis and AMSI.
  • Potential PowerShell Obfuscation via Reverse Keywords source low: Detects PowerShell scripts containing reversed keyword strings associated with execution or network activity (for example, ekovni, noisserpxe, daolnwod, tcejbo-wen, tcejboimw, etc.). Attackers reverse keywords and reconstruct them at runtime to hide intent and evade static detection and AMSI.
  • Potential PowerShell Obfuscation via String Concatenation source high: Detects PowerShell scripts that repeatedly concatenates multiple quoted string literals with + to assemble commands or tokens at runtime. Attackers use string concatenation to fragment keywords or URLs and evade static analysis and AMSI.
  • Potential PowerShell Obfuscation via String Reordering source medium: Detects PowerShell scripts that uses format placeholders like "{0}{1}" with the -f operator or ::Format to reorder strings at runtime. Attackers use format-based reconstruction to hide commands or payload strings and evade static analysis and AMSI.
  • Potential PowerShell Obfuscation via Special Character Overuse source medium: Detects PowerShell scripts dominated by whitespace and special characters with low symbol diversity, a profile often produced by formatting or encoding obfuscation. Attackers use symbol-heavy encoding or formatting (for example, SecureString-style blobs or character-level transforms) to hide payloads and evade static analysis and AMSI.

Splunk # view in reference

  • AdsiSearcher Account Discovery source: The following analytic detects the use of the `[Adsisearcher]` type accelerator in PowerShell to query Active Directory for domain users. It leverages PowerShell Script Block Logging (EventCode=4104) to identify script blocks containing `[adsisearcher]`, `objectcategory=user`, and `.findAll()`. This activity is significant as it may indicate an attempt by adversaries or Red Teams to enumerate domain users for situational awareness and Active Directory discovery. If confirmed malicious, this could lead to further reconnaissance, privilege escalation, or lateral movement within the network.
  • Allow Inbound Traffic In Firewall Rule source: The following analytic detects a suspicious PowerShell command that allows inbound traffic to a specific local port within the public profile. It leverages PowerShell script block logging (EventCode 4104) to identify commands containing keywords like "firewall," "Inbound," "Allow," and "-LocalPort." This activity is significant because it may indicate an attacker attempting to establish remote access by modifying firewall rules. If confirmed malicious, this could allow unauthorized access to the machine, potentially leading to further exploitation and data exfiltration.
  • Delete ShadowCopy With PowerShell source: The following analytic detects the use of PowerShell to delete shadow copies via the WMIC PowerShell module. It leverages EventCode 4104 and searches for specific keywords like "ShadowCopy," "Delete," or "Remove" within the ScriptBlockText. This activity is significant because deleting shadow copies is a common tactic used by ransomware, such as DarkSide, to prevent data recovery. If confirmed malicious, this action could lead to irreversible data loss and hinder recovery efforts, significantly impacting business continuity and data integrity.
Show 17 more (109 total)
  • Detect Certify With PowerShell Script Block Logging source: The following analytic detects the use of the Certify tool via an in-memory PowerShell function to enumerate Active Directory Certificate Services (AD CS) environments. It leverages PowerShell Script Block Logging (EventCode 4104) to identify specific command patterns associated with Certify's enumeration and exploitation functions. This activity is significant as it indicates potential reconnaissance or exploitation attempts against AD CS, which could lead to unauthorized certificate issuance. If confirmed malicious, attackers could leverage this to escalate privileges, persist in the environment, or access sensitive information by abusing AD CS.
  • Detect Copy of ShadowCopy with Script Block Logging source: The following analytic detects the use of PowerShell commands to copy the SAM, SYSTEM, or SECURITY hives, which are critical for credential theft. It leverages PowerShell Script Block Logging (EventCode=4104) to capture and analyze the full command executed. This activity is significant as it indicates an attempt to exfiltrate sensitive registry hives for offline password cracking. If confirmed malicious, this could lead to unauthorized access to credentials, enabling further compromise of the system and potential lateral movement within the network.
  • Detect Empire with PowerShell Script Block Logging source: The following analytic detects suspicious PowerShell execution indicative of PowerShell-Empire activity. It leverages PowerShell Script Block Logging (EventCode=4104) to capture and analyze commands sent to PowerShell, specifically looking for patterns involving `system.net.webclient` and base64 encoding. This behavior is significant as it often represents initial stagers used by PowerShell-Empire, a known post-exploitation framework. If confirmed malicious, this activity could allow attackers to download and execute additional payloads, leading to potential code execution, data exfiltration, or further compromise of the affected system.
  • Detect Mimikatz With PowerShell Script Block Logging source: The following analytic detects the execution of Mimikatz commands via PowerShell by leveraging PowerShell Script Block Logging (EventCode=4104). This method captures and logs the full command sent to PowerShell, allowing for the identification of suspicious activities such as Pass the Ticket, Pass the Hash, and credential dumping. This activity is significant as Mimikatz is a well-known tool used for credential theft and lateral movement. If confirmed malicious, this could lead to unauthorized access, privilege escalation, and potential compromise of sensitive information within the environment.
  • Disabled Kerberos Pre-Authentication Discovery With Get-ADUser source: The following analytic detects the execution of the `Get-ADUser` PowerShell cmdlet with parameters indicating a search for domain accounts with Kerberos Pre-Authentication disabled. It leverages PowerShell Script Block Logging (EventCode=4104) to identify this specific activity. This behavior is significant because discovering accounts with Kerberos Pre-Authentication disabled can allow adversaries to perform offline password cracking. If confirmed malicious, this activity could lead to unauthorized access to user accounts, potentially compromising sensitive information and escalating privileges within the network.
  • Disabled Kerberos Pre-Authentication Discovery With PowerView source: The following analytic detects the execution of the `Get-DomainUser` commandlet with the `-PreauthNotRequired` parameter using PowerShell Script Block Logging (EventCode=4104). This command is part of PowerView, a tool used for enumerating Windows Active Directory networks. Identifying domain accounts with Kerberos Pre-Authentication disabled is significant because adversaries can leverage this information to attempt offline password cracking. If confirmed malicious, this activity could lead to unauthorized access to domain accounts, potentially compromising sensitive information and escalating privileges within the network.
  • Domain Group Discovery with Adsisearcher source: The following analytic detects the use of the `[Adsisearcher]` type accelerator in PowerShell to query Active Directory for domain groups. It leverages PowerShell Script Block Logging (EventCode=4104) to identify specific script blocks containing `[adsisearcher]` and group-related queries. This activity is significant as it may indicate an attempt by adversaries or Red Teams to enumerate domain groups for situational awareness and Active Directory discovery. If confirmed malicious, this behavior could lead to further reconnaissance, privilege escalation, or lateral movement within the network.
  • Elevated Group Discovery with PowerView source: The following analytic detects the execution of the `Get-DomainGroupMember` cmdlet from PowerView, identified through PowerShell Script Block Logging (EventCode=4104). This cmdlet is used to enumerate members of elevated domain groups such as Domain Admins and Enterprise Admins. Monitoring this activity is crucial as it indicates potential reconnaissance efforts by adversaries to identify high-privileged users within the domain. If confirmed malicious, this activity could lead to targeted attacks on privileged accounts, facilitating further compromise and lateral movement within the network.
  • Exchange PowerShell Module Usage source: The following analytic detects the usage of specific Exchange PowerShell modules, such as New-MailboxExportRequest, New-ManagementRoleAssignment, New-MailboxSearch, and Get-Recipient. It leverages PowerShell Script Block Logging (EventCode 4104) to identify these commands. This activity is significant because these modules can be exploited by adversaries who have gained access via ProxyShell or ProxyNotShell vulnerabilities. If confirmed malicious, attackers could export mailbox contents, assign management roles, conduct mailbox searches, or view recipient objects, potentially leading to data exfiltration, privilege escalation, or unauthorized access to sensitive information.
  • Get ADDefaultDomainPasswordPolicy with Powershell Script Block source: The following analytic detects the execution of the `Get-ADDefaultDomainPasswordPolicy` PowerShell cmdlet, which is used to retrieve the password policy in a Windows domain. This detection leverages PowerShell Script Block Logging (EventCode=4104) to identify the specific command execution. Monitoring this activity is significant as it can indicate an attempt to gather domain policy information, which is often a precursor to further malicious actions. If confirmed malicious, this activity could allow an attacker to understand password policies, aiding in password attacks or further domain enumeration.
  • Get ADUser with PowerShell Script Block source: The following analytic detects the execution of the `Get-AdUser` PowerShell cmdlet, which is used to enumerate all domain users. It leverages PowerShell Script Block Logging (EventCode=4104) to identify instances where this command is executed with a filter. This activity is significant as it may indicate an attempt by adversaries or Red Teams to gather information about domain users for situational awareness and Active Directory discovery. If confirmed malicious, this behavior could lead to further reconnaissance and potential exploitation of user accounts within the domain.
  • Get ADUserResultantPasswordPolicy with Powershell Script Block source: The following analytic detects the execution of the `Get-ADUserResultantPasswordPolicy` PowerShell cmdlet, which is used to obtain the password policy in a Windows domain. It leverages PowerShell Script Block Logging (EventCode=4104) to identify this activity. Monitoring this behavior is significant as it may indicate an attempt to enumerate domain policies, a common tactic used by adversaries for situational awareness and Active Directory discovery. If confirmed malicious, this activity could allow attackers to understand password policies, aiding in further attacks such as password guessing or policy exploitation.
  • Get DomainPolicy with Powershell Script Block source: The following analytic detects the execution of the `Get-DomainPolicy` cmdlet using PowerShell Script Block Logging (EventCode=4104). It leverages logs capturing script block text to identify attempts to obtain the password policy in a Windows domain. This activity is significant as it indicates potential reconnaissance efforts by adversaries or Red Teams to gather domain policy information, which is crucial for planning further attacks. If confirmed malicious, this behavior could lead to detailed knowledge of domain security settings, aiding in privilege escalation or lateral movement within the network.
  • Get-DomainTrust with PowerShell Script Block source: The following analytic detects the execution of the Get-DomainTrust command from PowerView using PowerShell Script Block Logging (EventCode=4104). This method captures the full command sent to PowerShell, allowing for detailed inspection. Identifying this activity is significant because it may indicate an attempt to gather domain trust information, which is often a precursor to lateral movement or privilege escalation. If confirmed malicious, this activity could enable an attacker to map trust relationships within the domain, potentially leading to further exploitation and compromise of additional systems.
  • Get DomainUser with PowerShell Script Block source: The following analytic detects the execution of the `Get-DomainUser` cmdlet using PowerShell Script Block Logging (EventCode=4104). This cmdlet is part of PowerView, a tool often used for domain enumeration. The detection leverages PowerShell operational logs to identify instances where this command is executed. Monitoring this activity is crucial as it may indicate an adversary's attempt to gather information about domain users, which is a common step in Active Directory Discovery. If confirmed malicious, this activity could lead to further reconnaissance and potential exploitation of domain resources.
  • Get-ForestTrust with PowerShell Script Block source: The following analytic detects the execution of the Get-ForestTrust command from PowerSploit using PowerShell Script Block Logging (EventCode=4104). This method captures the full command sent to PowerShell, providing detailed visibility into potentially suspicious activities. Monitoring this behavior is crucial as it can indicate an attempt to gather domain trust information, which is often a precursor to lateral movement or privilege escalation. If confirmed malicious, this activity could allow an attacker to map trust relationships within the domain, facilitating further exploitation and access to sensitive resources.
  • Get WMIObject Group Discovery with Script Block Logging source: The following analytic detects the execution of the `Get-WMIObject Win32_Group` command using PowerShell Script Block Logging (EventCode=4104). This method captures the full command sent to PowerShell, allowing for detailed analysis. Identifying group information on an endpoint is not inherently malicious but can be suspicious based on context such as time, endpoint, and user. This activity is significant as it may indicate reconnaissance efforts by an attacker. If confirmed malicious, it could lead to further enumeration and potential lateral movement within the network.

References #

Event ID 4105 — Started invocation of ScriptBlock ID: ScriptBlockId.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Verbose
Collection Priority
Recommended (Microsoft-WEF, others)
Task
StartingCommand
Opcode
Open(async)

Description

Started invocation of ScriptBlock ID: ScriptBlockId.

Message #

Started invocation of ScriptBlock ID: %1
Runspace ID: %2

Fields #

NameDescription
ScriptBlockId UnicodeStringStarted invocation of ScriptBlock ID.
RunspaceId UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4105,
    "version": 1,
    "level": 5,
    "task": 102,
    "opcode": 15,
    "keywords": 0,
    "time_created": "2023-11-06T01:35:05.999333+00:00",
    "event_record_id": 906,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0000-CC79-E9E43710DA01"
    },
    "execution": {
      "process_id": 15468,
      "thread_id": 15184
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "ScriptBlockId": "4b7eebd5-d6e3-46f7-b795-a7d9736e5810",
    "RunspaceId": "6fa4bb48-d600-4d4b-b445-e1fa0a41db53"
  },
  "message": ""
}

References #

Event ID 4106 — Completed invocation of ScriptBlock ID: ScriptBlockId.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Verbose
Collection Priority
Recommended (Microsoft-WEF, others)
Task
StoppingCommand
Opcode
Close(Async)

Description

Completed invocation of ScriptBlock ID: ScriptBlockId.

Message #

Completed invocation of ScriptBlock ID: %1
Runspace ID: %2

Fields #

NameDescription
ScriptBlockId UnicodeStringCompleted invocation of ScriptBlock ID.
RunspaceId UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4106,
    "version": 1,
    "level": 5,
    "task": 103,
    "opcode": 15,
    "keywords": 0,
    "time_created": "2023-11-06T01:35:05.993908+00:00",
    "event_record_id": 905,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0002-FB44-ECE43710DA01"
    },
    "execution": {
      "process_id": 15468,
      "thread_id": 15184
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "ScriptBlockId": "6baf0dc7-a83f-43e1-bb6a-d7ab8d05eeb0",
    "RunspaceId": "6fa4bb48-d600-4d4b-b445-e1fa0a41db53"
  },
  "message": ""
}

References #

Event ID 7937 — ContextInfo Context: Context User Data: User_Data.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
Context
User_Data
ContextInfo UnicodeString
UserData UnicodeString
Payload UnicodeString

Event ID 7938 — Payload Context: ContextInfo User Data: UserData.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Level
Informational
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
ContextInfo UnicodeString
UserData UnicodeString
Payload UnicodeString
Context
User_Data

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "{a0c1853b-5c40-4b15-8766-3cf1c58f985a}",
    "event_source_name": "",
    "event_id": "7938",
    "version": "1",
    "level": "4",
    "task": "100",
    "opcode": "20",
    "keywords": 0,
    "time_created": "2026-03-15T04:33:37.067269800+00:00",
    "event_record_id": 0,
    "correlation": {
      "ActivityID": "{d73f5340-b345-0001-748f-44d745b3dc01}"
    },
    "execution": {
      "process_id": "5820",
      "thread_id": "12172"
    },
    "channel": "Microsoft-Windows-PowerShell/Analytic",
    "computer": "",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ContextInfo": "        Severity = Informational\n        Host Name = ConsoleHost\n        Host Version = 5.1.20348.558\n        Host ID = 247af873-a1bf-4dba-9ce9-5140eb54ab09\n        Host Application = C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -ExecutionPolicy Bypass -File C:\\Users\\domainadmin\\Desktop\\automaton\\onedrive_etw_capture.ps1 -Action stop\n        Engine Version = 5.1.20348.558\n        Runspace ID = 83d77211-d444-44c5-9530-51739db0c2f4\n        Pipeline ID = \n        Command Name = \n        Command Type = \n        Script Name = \n        Command Path = \n        Sequence Number = 14\n        User = ludus\\domainadmin\n        Connected User = \n        Shell ID = Microsoft.PowerShell\n",
    "UserData": "",
    "Payload": "Engine state changed from None to Available.\n"
  },
  "message": ""
}

Event ID 7939 — Payload Context: ContextInfo User Data: UserData.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Level
Informational
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
ContextInfo UnicodeString
UserData UnicodeString
Payload UnicodeString
Context
User_Data

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "{a0c1853b-5c40-4b15-8766-3cf1c58f985a}",
    "event_source_name": "",
    "event_id": "7939",
    "version": "1",
    "level": "4",
    "task": "104",
    "opcode": "20",
    "keywords": 0,
    "time_created": "2026-03-15T04:33:36.400594000+00:00",
    "event_record_id": 0,
    "correlation": {
      "ActivityID": "{d73f5340-b345-0001-748f-44d745b3dc01}"
    },
    "execution": {
      "process_id": "5820",
      "thread_id": "8064"
    },
    "channel": "Microsoft-Windows-PowerShell/Analytic",
    "computer": "",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ContextInfo": "        Severity = Informational\n        Host Name = ConsoleHost\n        Host Version = 5.1.20348.558\n        Host ID = 247af873-a1bf-4dba-9ce9-5140eb54ab09\n        Host Application = C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -ExecutionPolicy Bypass -File C:\\Users\\domainadmin\\Desktop\\automaton\\onedrive_etw_capture.ps1 -Action stop\n        Engine Version = \n        Runspace ID = \n        Pipeline ID = \n        Command Name = \n        Command Type = \n        Script Name = \n        Command Path = \n        Sequence Number = 2\n        User = ludus\\domainadmin\n        Connected User = \n        Shell ID = Microsoft.PowerShell\n",
    "UserData": "",
    "Payload": "Provider Registry changed state to Started.\n"
  },
  "message": ""
}

Event ID 7940 — ContextInfo Context: Context User Data: User_Data.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
Context
User_Data
ContextInfo UnicodeString
UserData UnicodeString
Payload UnicodeString

Event ID 7941 — Correlating activity id's.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Correlating activity id's.

Message #

Correlating activity id's. 
 	 CurrentActivityId: %1 
 	 ParentActivityId: %2

Fields #

NameDescription
CurrentActivityId GUID
ParentActivityId GUID
currentActivityId GUID
parentActivityId GUID

Event ID 7942 — Class Name = ClassName.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Level
Verbose
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Class Name = ClassName.

Message #

Class Name = %1
Method Name = %2
Workflow GUID = %3
Message = %4
%5
Activity Name = %6
Activity GUID = %7
Parameters = %8

Fields #

NameDescription
ClassName UnicodeString
MethodName UnicodeString
WorkflowGuid UnicodeString
Message UnicodeString
JobData UnicodeString
ActivityName UnicodeString
ActivityGuid UnicodeString
Parameters UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "{a0c1853b-5c40-4b15-8766-3cf1c58f985a}",
    "event_source_name": "",
    "event_id": "7942",
    "version": "1",
    "level": "5",
    "task": "0",
    "opcode": "20",
    "keywords": 0,
    "time_created": "2026-03-15T04:33:36.215006100+00:00",
    "event_record_id": 0,
    "correlation": {
      "ActivityID": "{d73f5340-b345-0001-748f-44d745b3dc01}"
    },
    "execution": {
      "process_id": "5820",
      "thread_id": "12008"
    },
    "channel": "Microsoft-Windows-PowerShell/Analytic",
    "computer": "",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ClassName": "RemoteSessionNamedPipeServer",
    "MethodName": "StartListening",
    "WorkflowGuid": "00000000-0000-0000-0000-000000000000",
    "Message": "Listener thread started on Process 5820 in AppDomainName DefaultAppDomain.",
    "JobData": "",
    "ActivityName": "",
    "ActivityGuid": "",
    "Parameters": ""
  },
  "message": ""
}

Event ID 8193 — Creating Runspace object Instance Id.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Verbose
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
tobeusedwhenanobjectisconstructed

Description

Creating Runspace object.

Message #

Creating Runspace object 
 	 Instance Id: %1

Fields #

NameDescription
InstanceId UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 8193,
    "version": 1,
    "level": 5,
    "task": 1,
    "opcode": 16,
    "keywords": 0,
    "time_created": "2022-04-07T17:06:32.284732+00:00",
    "event_record_id": 9,
    "correlation": {
      "ActivityID": "C88130F4-85B6-4F22-BDD1-6F6F4B29582D"
    },
    "execution": {
      "process_id": 5272,
      "thread_id": 5572
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WIN-FPV0DSIC9O6",
    "security": {
      "user_id": "S-1-5-21-2121334350-1110938707-2888912545-500"
    }
  },
  "event_data": {
    "param1": "c88130f4-85b6-4f22-bdd1-6f6f4b29582d"
  },
  "message": ""
}

References #

Event ID 8194 — Creating RunspacePool object.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Verbose
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
tobeusedwhenanobjectisconstructed

Description

Creating RunspacePool object.

Message #

Creating RunspacePool object 
 	 InstanceId %1 
 	 MinRunspaces %2 
 	 MaxRunspaces %3

Fields #

NameDescription
InstanceId UnicodeString
MaxRunspaces UnicodeString
MinRunspaces UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 8194,
    "version": 1,
    "level": 5,
    "task": 1,
    "opcode": 16,
    "keywords": 0,
    "time_created": "2022-04-07T17:21:29.409715+00:00",
    "event_record_id": 146,
    "correlation": {
      "ActivityID": "1480B89F-E871-42E4-BFB4-C8F88B053137"
    },
    "execution": {
      "process_id": 4444,
      "thread_id": 4780
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WIN-FPV0DSIC9O6.lab.local",
    "security": {
      "user_id": "S-1-5-21-2121334350-1110938707-2888912545-500"
    }
  },
  "event_data": {
    "InstanceId": "1480b89f-e871-42e4-bfb4-c8f88b053137",
    "MaxRunspaces": "2",
    "MinRunspaces": "10"
  },
  "message": ""
}

References #

Event ID 8195 — Opening RunspacePool

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Verbose
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Open(async)

Description

Opening RunspacePool.

Message #

Opening RunspacePool

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 8195,
    "version": 1,
    "level": 5,
    "task": 1,
    "opcode": 10,
    "keywords": 0,
    "time_created": "2022-04-07T17:21:29.483155+00:00",
    "event_record_id": 147,
    "correlation": {
      "ActivityID": "1480B89F-E871-42E4-BFB4-C8F88B053137"
    },
    "execution": {
      "process_id": 4444,
      "thread_id": 4780
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WIN-FPV0DSIC9O6.lab.local",
    "security": {
      "user_id": "S-1-5-21-2121334350-1110938707-2888912545-500"
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 8196 — Modifying activity Id and correlating

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Open(async)

Description

Modifying activity Id and correlating.

Message #

Modifying activity Id and correlating

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 8196,
    "version": 1,
    "level": 4,
    "task": 0,
    "opcode": 20,
    "keywords": 0,
    "time_created": "2022-04-07T17:21:43.024925+00:00",
    "event_record_id": 191,
    "correlation": {
      "ActivityID": "1480B89F-E871-42E4-BFB4-C8F88B053137"
    },
    "execution": {
      "process_id": 4444,
      "thread_id": 940
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WIN-FPV0DSIC9O6.lab.local",
    "security": {
      "user_id": "S-1-5-21-2121334350-1110938707-2888912545-500"
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 8197 — Runspace state changed to param1.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Verbose
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Open(async)

Description

Runspace state changed to param1.

Message #

Runspace state changed to %1

Fields #

NameDescription
param1 UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 8197,
    "version": 1,
    "level": 5,
    "task": 1,
    "opcode": 10,
    "keywords": 0,
    "time_created": "2026-03-13T19:06:18.830885+00:00",
    "event_record_id": 451785,
    "correlation": {
      "ActivityID": "E345B8F4-8ABD-45C2-9C94-77A035AE705C"
    },
    "execution": {
      "process_id": 8572,
      "thread_id": 13812
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": "S-1-5-21-1006758700-2167138679-1475694448-1105"
    }
  },
  "event_data": {
    "param1": "Closing"
  },
  "message": ""
}

Event ID 8198 — Attempting session creation retry param1 for error code param2 on session Id param3.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Open(async)

Description

Attempting session creation retry param1 for error code param2 on session Id param3.

Message #

Attempting session creation retry %1 for error code %2 on session Id %3

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 12033 — Port resolved to param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Port resolved to param1.

Message #

Port resolved to %1

Fields #

NameDescription
param1 UnicodeString

Event ID 12034 — AppName resolved to param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

AppName resolved to param1.

Message #

AppName resolved to %1

Fields #

NameDescription
param1 UnicodeString

Event ID 12035 — ComputerName resolved to param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

ComputerName resolved to param1.

Message #

ComputerName resolved to %1

Fields #

NameDescription
param1 UnicodeString

Event ID 12036 — Scheme is param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Scheme is param1.

Message #

Scheme is %1

Fields #

NameDescription
param1 UnicodeString

Event ID 12037 — Test analytic message

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Test analytic message.

Message #

Test analytic message

Event ID 12038 — Connection Paramters are Connection URI: Connection_URI Resource URI: Resource_URI User: User OpenTimeout: OpenTimeout IdleTimeout: IdleTimeout CancelTimeout: CancelTimeout AuthenticationMechanism:...

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Connect
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Connection Paramters are.

Message #

Connection Paramters are 
 Connection URI: %1 
 Resource URI: %2 
 User: %3 
 OpenTimeout: %4 
 IdleTimeout: %5 
 CancelTimeout: %6 
 AuthenticationMechanism: %7 
 Thumb Print: %8 
 MaxUriRedirectionCount: %9 
 MaxReceivedDataSizePerCommand: %10 
 MaxReceivedObjectSize: %11

Fields #

NameDescription
Connection_URI UnicodeString
Resource_URI UnicodeString
User UnicodeString
OpenTimeout UnicodeString
IdleTimeout UnicodeString
CancelTimeout UnicodeString
AuthenticationMechanism UInt32
Thumb_Print UnicodeString
MaxUriRedirectionCount UnicodeString
MaxReceivedDataSizePerCommand UnicodeString
MaxReceivedObjectSize UnicodeString
uri UnicodeString
shell UnicodeString
userName UnicodeString
opentimeout UnicodeString
idletimeout UnicodeString
canceltimeout UnicodeString
auth UInt32
thumbPrint UnicodeString
redircount UnicodeString
recvdDataSize UnicodeString
recvdObjSize UnicodeString

Event ID 12039 — Modifying activity Id and correlating

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security)
Task
Connect
Opcode
Open(async)

Description

Modifying activity Id and correlating.

Message #

Modifying activity Id and correlating

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 12039,
    "version": 1,
    "level": 4,
    "task": 0,
    "opcode": 20,
    "keywords": 0,
    "time_created": "2022-04-07T17:21:43.024926+00:00",
    "event_record_id": 192,
    "correlation": {
      "ActivityID": "1480B89F-E871-42E4-BFB4-C8F88B053137"
    },
    "execution": {
      "process_id": 4444,
      "thread_id": 940
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WIN-FPV0DSIC9O6.lab.local",
    "security": {
      "user_id": "S-1-5-21-2121334350-1110938707-2888912545-500"
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 16385 — AmsiUtil state.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
AmsiState
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

AmsiUtil state.

Message #

AmsiUtil state. 
 	 state: %1 
 	 Context: %2

Fields #

NameDescription
state UnicodeString
Context UnicodeString
Action UnicodeString
AmsiContext UnicodeString

Event ID 24577 — Windows PowerShell ISE has started to run script file FileName.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE has started to run script file FileName.

Message #

Windows PowerShell ISE has started to run script file %1.

Fields #

NameDescription
FileName UnicodeString

Event ID 24578 — Windows PowerShell ISE has started to run a user-selected script from file FileName.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE has started to run a user-selected script from file FileName.

Message #

Windows PowerShell ISE has started to run a user-selected script from file %1.

Fields #

NameDescription
FileName UnicodeString

Event ID 24579 — Windows PowerShell ISE is stopping the current command.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is stopping the current command.

Message #

Windows PowerShell ISE is stopping the current command.

Event ID 24580 — Windows PowerShell ISE is resuming the debugger.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is resuming the debugger.

Message #

Windows PowerShell ISE is resuming the debugger.

Event ID 24581 — Windows PowerShell ISE is stopping the debugger.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is stopping the debugger.

Message #

Windows PowerShell ISE is stopping the debugger.

Event ID 24582 — Windows PowerShell ISE is stepping into debugging.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is stepping into debugging.

Message #

Windows PowerShell ISE is stepping into debugging.

Event ID 24583 — Windows PowerShell ISE is stepping over debugging.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is stepping over debugging.

Message #

Windows PowerShell ISE is stepping over debugging.

Event ID 24584 — Windows PowerShell ISE is stepping out of debugging.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is stepping out of debugging.

Message #

Windows PowerShell ISE is stepping out of debugging.

Event ID 24592 — Windows PowerShell ISE is enabling all breakpoints.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is enabling all breakpoints.

Message #

Windows PowerShell ISE is enabling all breakpoints.

Event ID 24593 — Windows PowerShell ISE is disabling all breakpoints.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
None

Description

Windows PowerShell ISE is disabling all breakpoints.

Message #

Windows PowerShell ISE is disabling all breakpoints.

Event ID 24594 — Windows PowerShell ISE is removing all breakpoints.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is removing all breakpoints.

Message #

Windows PowerShell ISE is removing all breakpoints.

Event ID 24595 — Windows PowerShell ISE is setting the breakpoint at line #: CurrentLine of file FileName.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is setting the breakpoint at line #: CurrentLine of file FileName.

Message #

Windows PowerShell ISE is setting the breakpoint at line #: %1 of file %2.

Fields #

NameDescription
CurrentLine Int32
FileName UnicodeString

Event ID 24596 — Windows PowerShell ISE is removing the breakpoint on line #: CurrentLine of file FileName.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is removing the breakpoint on line #: CurrentLine of file FileName.

Message #

Windows PowerShell ISE is removing the breakpoint on line #: %1 of file %2.

Fields #

NameDescription
CurrentLine Int32
FileName UnicodeString

Event ID 24597 — Windows PowerShell ISE is enabling the breakpoint on line #: CurrentLine of file FileName.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is enabling the breakpoint on line #: CurrentLine of file FileName.

Message #

Windows PowerShell ISE is enabling the breakpoint on line #: %1 of file %2.

Fields #

NameDescription
CurrentLine Int32
FileName UnicodeString

Event ID 24598 — Windows PowerShell ISE is disabling the breakpoint on line #: CurrentLine of file FileName.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE is disabling the breakpoint on line #: CurrentLine of file FileName.

Message #

Windows PowerShell ISE is disabling the breakpoint on line #: %1 of file %2.

Fields #

NameDescription
CurrentLine Int32
FileName UnicodeString

Event ID 24599 — Windows PowerShell ISE has hit a breakpoint on line #: CurrentLine of file FileName.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellISEOperation

Description

Windows PowerShell ISE has hit a breakpoint on line #: CurrentLine of file FileName.

Message #

Windows PowerShell ISE has hit a breakpoint on line #: %1 of file %2.

Fields #

NameDescription
CurrentLine Int32
FileName UnicodeString

Event ID 28673 — Successfully rehydrated an object.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Rehydration

Description

Successfully rehydrated an object.

Message #

Successfully rehydrated an object. 
 	 Deserialized type name: %1 
 	 Rehydrated by casting to type: %2 
 	 Rehydrated object is of type: %3

Fields #

NameDescription
DeserializedType UnicodeString
CastedToType UnicodeString
RehydratedType UnicodeString

Event ID 28674 — Failed to rehydrated an object.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Rehydration

Description

Failed to rehydrated an object.

Message #

Failed to rehydrated an object. 
 	 Deserialized type name: %1 
 	 Rehydrated by casting to type: %2 
 	 Type cast exception: %3 
 	 Type cast inner exception: %4

Fields #

NameDescription
DeserializedType UnicodeString
CastedToType UnicodeString
TypeCastException UnicodeString
TypeCastInnerException UnicodeString

Event ID 28675 — Serialization depth has been overriden.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Serializationsettings

Description

Serialization depth has been overriden.

Message #

Serialization depth has been overriden. 
 	 Serialized type name: %1 
 	 Original depth: %2 
 	 Overriden depth: %3 
 	 Current depth below top level: %4

Fields #

NameDescription
Serialized_type_name UnicodeString
Original_depth Int32
Overriden_depth Int32
Current_depth_below_top_level Int32
SerializedType UnicodeString
OriginalDepth Int32
OverridenDepth Int32
CurrentDepthBelowTopLevel Int32

Event ID 28676 — Serialization mode has been overriden.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Serializationsettings

Description

Serialization mode has been overriden.

Message #

Serialization mode has been overriden. 
 	 Serialized type name: %1 
 	 Overriden mode: %2

Fields #

NameDescription
Serialized_type_name UnicodeString
Overriden_mode UInt32
SerializedType UnicodeString
OverridenMode UInt32

Event ID 28677 — Serialization of a script property has been skipped, because there is no runspace to use for evaluation of the property.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Tobeusedwhenanexceptionisraised

Description

Serialization of a script property has been skipped, because there is no runspace to use for evaluation of the property.

Message #

Serialization of a script property has been skipped, because there is no runspace to use for evaluation of the property. 
 	 Property name: %1 
 	 Property owner's type name: %2 
 	 Getter script: %3

Fields #

NameDescription
Property_name UnicodeString
Property_owners_type_name UnicodeStringProperty owner's type name.
Getter_script UnicodeString
PropertyName UnicodeString
PropertyOwnerType UnicodeString
GetterScript UnicodeString

Event ID 28678 — Serialization of a property has been skipped, because property getter failed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Tobeusedwhenanexceptionisraised

Description

Serialization of a property has been skipped, because property getter failed.

Message #

Serialization of a property has been skipped, because property getter failed. 
 	 Property name: %1 
 	 Property owner's type name: %2 
 	 Exception from property getter: %3 
 	 Inner exception from property getter: %4

Fields #

NameDescription
PropertyName UnicodeString
PropertyOwnerType UnicodeString
Exception UnicodeString
InnerException UnicodeString

Event ID 28679 — Serialization of an enumerable object might not be complete, because object being enumerated threw an exception.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Tobeusedwhenanexceptionisraised

Description

Serialization of an enumerable object might not be complete, because object being enumerated threw an exception.

Message #

Serialization of an enumerable object might not be complete, because object being enumerated threw an exception. 
 	 Type of object being enumerated: %1 
 	 Exception: %2

Fields #

NameDescription
TypeBeingEnumerated UnicodeString
Exception UnicodeString

Event ID 28680 — Serialization called object's ToString method which failed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Tobeusedwhenanexceptionisraised

Description

Serialization called object's ToString method which failed.

Message #

Serialization called object's ToString method which failed. 
 	 Type of object: %1 
 	 Exception: %2

Fields #

NameDescription
Type UnicodeString
Exception UnicodeString

Event ID 28682 — Maximum depth below top level has been reached, forcing object to be serialized as strings.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Tobeusedwhenanexceptionisraised

Description

Maximum depth below top level has been reached, forcing object to be serialized as strings.

Message #

Maximum depth below top level has been reached, forcing object to be serialized as strings. 
 	 Object type at max depth: %1 
 	 Property name at max depth: %2 
 	 Depth: %3

Fields #

NameDescription
Object_type_at_max_depth UnicodeString
Property_name_at_max_depth UnicodeString
Depth Int32
TypeOfObjectAtMaxDepth UnicodeString
PropertyNameAtMaxDepth UnicodeString

Event ID 28683 — XmlException has been thrown by the deserializer (most likely indicating incorrect clixml format).

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Tobeusedwhenanexceptionisraised

Description

XmlException has been thrown by the deserializer (most likely indicating incorrect clixml format).

Message #

XmlException has been thrown by the deserializer (most likely indicating incorrect clixml format). 
 	 Line number: %1 Line position: %2 
 	 Exception: %3

Fields #

NameDescription
Line_number Int32
Line_position Int32
Exception UnicodeString
LineNumber Int32
LinePosition Int32

Event ID 28684 — Serialization of specified properties failed, because one of the specified properties was missing.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Serializeordeserializeremotingpayload
Opcode
Tobeusedwhenanexceptionisraised

Description

Serialization of specified properties failed, because one of the specified properties was missing.

Message #

Serialization of specified properties failed, because one of the specified properties was missing. 
 	 Type of object: %1 
 	 Property name: %2

Fields #

NameDescription
TypeOfObjectWithMissingProperty UnicodeString
PropertyName UnicodeString

Event ID 32769 — Received object with Runspace Id: Runspace_InstanceId Command Id: PowerShell_InstanceId Destination: Destination DataType: DataType TargetInterface: TargetInterface.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Receive(Async)

Description

Received object with Runspace Id: Runspace_InstanceId Command Id: PowerShell_InstanceId Destination: Destination DataType: DataType TargetInterface: TargetInterface.

Message #

Received object with Runspace Id: %1 Command Id: %2 Destination: %3 DataType: %4 TargetInterface: %5

Fields #

NameDescription
Runspace_InstanceId UnicodeString
PowerShell_InstanceId UnicodeString
Destination UInt32
DataType UInt32
TargetInterface UInt32

Event ID 32775 — An unhandled exception occurred in the appdomain.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Open(async)

Description

An unhandled exception occurred in the appdomain.

Message #

An unhandled exception occurred in the appdomain. 
Exception Type: %1 
Exception Message: %2 
Exception StackTrace: %3

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 32776 — Runspace Id: SessionId Pipeline Id: PipelineId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Open(async)

Description

Runspace Id: SessionId Pipeline Id: PipelineId. WSMan reported an error with error code: ErrorCode.

Message #

Runspace Id: %1 Pipeline Id: %2. WSMan reported an error with error code: %3. 
 Error message: %4 
 StackTrace: %5

Fields #

NameDescription
SessionId UnicodeString
PipelineId UnicodeString
ErrorCode UnicodeString
ErrorMessage UnicodeString
StackTrace UnicodeString

Event ID 32777 — An unhandled exception occurred in the appdomain.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Opcode
Open(async)

Description

An unhandled exception occurred in the appdomain.

Message #

An unhandled exception occurred in the appdomain. 
Exception Type: %1 
Exception Message: %2 
Exception StackTrace: %3

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 32784 — Runspace Id: SessionId Pipeline Id: PipelineId.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Error
Collection Priority
Recommended (Yamato Security)
Opcode
Open(async)

Description

Runspace Id: SessionId Pipeline Id: PipelineId. WSMan reported an error with error code: ErrorCode.

Message #

Runspace Id: %1 Pipeline Id: %2. WSMan reported an error with error code: %3. 
 Error message: %4 
 StackTrace: %5

Fields #

NameDescription
SessionId UnicodeString
PipelineId UnicodeString
ErrorCode UnicodeString
ErrorMessage UnicodeString
StackTrace UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 32784,
    "version": 1,
    "level": 2,
    "task": 0,
    "opcode": 10,
    "keywords": 0,
    "time_created": "2026-03-13T19:48:48.051299+00:00",
    "event_record_id": 692957,
    "correlation": {
      "ActivityID": "0DB6BBF5-303D-4E93-8DE3-887C047E8B68"
    },
    "execution": {
      "process_id": 1512,
      "thread_id": 1452
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": "S-1-5-21-1006758700-2167138679-1475694448-1105"
    }
  },
  "event_data": {
    "SessionId": "0db6bbf5-303d-4e93-8de3-887c047e8b68",
    "PipelineId": "00000000-0000-0000-0000-000000000000",
    "ErrorCode": "-2144108101",
    "ErrorMessage": "Connecting to remote server 10.2.10.21 failed with the following error message : The WinRM client cannot process the request. Default authentication may be used with an IP address under the following conditions: the transport is HTTPS or the destination is in the TrustedHosts list, and explicit credentials are provided. Use winrm.cmd to configure TrustedHosts. Note that computers in the TrustedHosts list might not be authenticated. For more information on how to set TrustedHosts run the following command: winrm help config. For more information, see the about_Remote_Troubleshooting Help topic.",
    "StackTrace": ""
  },
  "message": ""
}

Event ID 32785 — Runspace Id param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Runspace Id param1. Establishing a connection using WSMan Create Shell.

Message #

Runspace Id %1. Establishing a connection using WSMan Create Shell

Fields #

NameDescription
param1 UnicodeString

Event ID 32786 — Runspace Id param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Runspace Id param1. Callback received for WSMan Create Shell.

Message #

Runspace Id %1. Callback received for WSMan Create Shell

Fields #

NameDescription
param1 UnicodeString

Event ID 32787 — Runspace Id: RunspaceId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Runspace Id: RunspaceId. Closing shell using WSManCloseShell.

Message #

Runspace Id: %1. Closing shell using WSManCloseShell

Fields #

NameDescription
param1 UnicodeString

Event ID 32788 — Runspace Id: RunspaceId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Runspace Id: RunspaceId. Callback received for WSManCloseShell.

Message #

Runspace Id: %1. Callback received for WSManCloseShell

Fields #

NameDescription
param1 UnicodeString

Event ID 32789 — Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Send(Async)

Description

Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id. Sending data of size SessionId.

Message #

Runspace Id: %1 Pipeline Id: %2. Sending data of size %3

Fields #

NameDescription
Runspace_Id
Pipeline_Id
SessionId UnicodeString
PipelineId UnicodeString
DataSize UnicodeString

Event ID 32790 — Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Send(Async)

Description

Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id. Callback received for WSManSendShellInputEx.

Message #

Runspace Id: %1 Pipeline Id: %2. Callback received for WSManSendShellInputEx

Fields #

NameDescription
Runspace_Id UnicodeString
Pipeline_Id UnicodeString
SessionId UnicodeString
PipelineId UnicodeString

Event ID 32791 — Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Receive(Async)

Description

Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id. Placing Receive request using WSManReceiveShellOutputEx.

Message #

Runspace Id: %1 Pipeline Id: %2. Placing Receive request using WSManReceiveShellOutputEx

Fields #

NameDescription
Runspace_Id UnicodeString
Pipeline_Id UnicodeString
SessionId UnicodeString
PipelineId UnicodeString

Event ID 32792 — Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Receive(Async)

Description

Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id. Received Data of size SessionId.

Message #

Runspace Id: %1 Pipeline Id: %2. Received Data of size %3.

Fields #

NameDescription
Runspace_Id
Pipeline_Id
SessionId UnicodeString
PipelineId UnicodeString
DataSize UnicodeString

Event ID 32793 — Runspace Id SessionId Pipeline Id PipelineId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Runspace Id SessionId Pipeline Id PipelineId. Establishing a command connection using WSManRunShellCommandEx.

Message #

Runspace Id %1 Pipeline Id %2. Establishing a command connection using WSManRunShellCommandEx

Fields #

NameDescription
SessionId UnicodeString
PipelineId UnicodeString

Event ID 32800 — Runspace Id SessionId Pipeline Id PipelineId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Runspace Id SessionId Pipeline Id PipelineId. Callback received for command connection.

Message #

Runspace Id %1 Pipeline Id %2. Callback received for command connection

Fields #

NameDescription
SessionId UnicodeString
PipelineId UnicodeString

Event ID 32801 — Runspace Id: Runspace_Id Pipeline Id SessionId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Runspace Id: Runspace_Id Pipeline Id SessionId. Closing transport for command.

Message #

Runspace Id: %1 Pipeline Id %2. Closing transport for command

Fields #

NameDescription
Runspace_Id
SessionId UnicodeString
PipelineId UnicodeString

Event ID 32802 — Runspace Id: Runspace_Id Pipeline Id SessionId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Runspace Id: Runspace_Id Pipeline Id SessionId. Callback received for command close.

Message #

Runspace Id: %1 Pipeline Id %2. Callback received for command close

Fields #

NameDescription
Runspace_Id
SessionId UnicodeString
PipelineId UnicodeString

Event ID 32803 — Runspace Id: Runspace_Id Pipeline Id SessionId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Runspace Id: Runspace_Id Pipeline Id SessionId. Sending signal with code PipelineId using WSManSignalShellEx.

Message #

Runspace Id: %1 Pipeline Id %2. Sending signal with code %3 using WSManSignalShellEx

Fields #

NameDescription
Runspace_Id
SessionId UnicodeString
PipelineId UnicodeString
SignalCode UnicodeString

Event ID 32804 — Runspace Id: Runspace_Id Pipeline Id SessionId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Runspace Id: Runspace_Id Pipeline Id SessionId. Callback received for WSManSignalShellEx.

Message #

Runspace Id: %1 Pipeline Id %2. Callback received for WSManSignalShellEx

Fields #

NameDescription
Runspace_Id
SessionId UnicodeString
PipelineId UnicodeString

Event ID 32805 — Runspace Id: SessionId.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Runspace Id: SessionId. Connection is getting redirected to Uri: Uri.

Message #

Runspace Id: %1. Connection is getting redirected to Uri: %2

Fields #

NameDescription
SessionId UnicodeString
Uri UnicodeString

Event ID 32849 — Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Send(Async)

Description

Runspace Id: Runspace_Id Pipeline Id: Pipeline_Id. Server is sending data of size TargetInterface to client. DataType: Runspace_InstanceId TargetInterface: PowerShell_InstanceId.

Message #

Runspace Id: %1 Pipeline Id: %2. Server is sending data of size %3 to client. DataType: %4 TargetInterface: %5

Fields #

NameDescription
Runspace_Id
Pipeline_Id
TargetInterface UInt323 to client. DataType.
Runspace_InstanceId UnicodeString
PowerShell_InstanceId UnicodeString
DataSize UnicodeString
DataType UInt32

Event ID 32850 — Request param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Request param1. Creating a server remote session. UserName: UserName Custome Shell Id: CustomeShellId.

Message #

Request %1. Creating a server remote session. UserName: %2 Custome Shell Id: %3

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 32851 — Reporting context for request: ReportingContextForRequest Context Reported: ReportingContextForRequest.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Reporting context for request: ReportingContextForRequest Context Reported: ReportingContextForRequest.

Message #

Reporting context for request: %1 Context Reported: %1

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString

Event ID 32852 — Reporting operation complete for request: ReportingOperationCompleteForRequest.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Reporting operation complete for request: ReportingOperationCompleteForRequest.

Message #

Reporting operation complete for request: %1 
 Error Code: %2 
 Error Message: %3 
 StackTrace: %4

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString
param4 UnicodeString

Event ID 32853 — Shell Context param1.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Shell Context param1. Request Id param2. Creating a commonad session for running a command.

Message #

Shell Context %1. Request Id %2. Creating a commonad session for running a command.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString

Event ID 32854 — Shell Context param1 Command Context param2 Request Id param3.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Shell Context param1 Command Context param2 Request Id param3. Stopping command.

Message #

Shell Context %1 Command Context %2 Request Id %3. Stopping command.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 32855 — Shell Context param1 Command Context param2 Request Id param3.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Open(async)

Description

Shell Context param1 Command Context param2 Request Id param3. Received data from client.

Message #

Shell Context %1 Command Context %2 Request Id %3. Received data from client.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 32856 — Shell Context param1 Command Context param2 Request Id param3.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Open(async)

Description

Shell Context param1 Command Context param2 Request Id param3. Client sent a receive request so that server can send data.

Message #

Shell Context %1 Command Context %2 Request Id %3. Client sent a receive request so that server can send data.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 32857 — Shell Context param1 Command Context param2 IsReceiveOperation param3.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Disconnect

Description

Shell Context param1 Command Context param2 IsReceiveOperation param3. Got close operation request.

Message #

Shell Context %1 Command Context %2 IsReceiveOperation %3. Got close operation request.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 32865 — Loading assembly param1 for custom shell with shell Id param2.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Loading assembly param1 for custom shell with shell Id param2.

Message #

Loading assembly %1 for custom shell with shell Id %2

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString

Event ID 32866 — Loading type param1 for custom shell with shell Id param2.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
connect

Description

Loading type param1 for custom shell with shell Id param2.

Message #

Loading type %1 for custom shell with shell Id %2

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString

Event ID 32867 — Received remoting fragment.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Receive(Async)

Description

Received remoting fragment.

Message #

Received remoting fragment. 
 	 Object Id: %1 
 	 Fragment Id: %2 
 	 Start Flag: %3 
 	 End Flag: %4 
 	 Payload Length: %5 
 	 Payload Data: %6

Fields #

NameDescription
Object_Id Int64
Fragment_Id Int64
Start_Flag Int32
End_Flag Int32
Payload_Length UInt32
Payload_Data UnicodeString
ObjectId Int64
FragmentId Int64
sFlag Int32
eFlag Int32
FragmentLength UInt32
FragmentPayload UnicodeString

Event ID 32868 — Sent remoting fragment.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Send(Async)

Description

Sent remoting fragment.

Message #

Sent remoting fragment. 
 	 Object Id: %1 
 	 Fragment Id: %2 
 	 Start Flag: %3 
 	 End Flag: %4 
 	 Payload Length: %5 
 	 Payload Data: %6

Fields #

NameDescription
Object_Id Int64
Fragment_Id Int64
Start_Flag Int32
End_Flag Int32
Payload_Length UInt32
Payload_Data UnicodeString
ObjectId Int64
FragmentId Int64
sFlag Int32
eFlag Int32
FragmentLength UInt32
FragmentPayload UnicodeString

Event ID 32869 — Shutting down winrm service.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Opcode
Shuttingdown

Description

Shutting down winrm service.

Message #

Shutting down winrm service.

Event ID 40961 — PowerShell console is starting up

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellConsoleStartup
Opcode
Start

Description

PowerShell console is starting up.

Message #

PowerShell console is starting up

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 40961,
    "version": 1,
    "level": 4,
    "task": 4,
    "opcode": 1,
    "keywords": 0,
    "time_created": "2023-11-06T01:18:27.730646+00:00",
    "event_record_id": 772,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0002-CA26-E6E43710DA01"
    },
    "execution": {
      "process_id": 12192,
      "thread_id": 16872
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 40962 — PowerShell console is ready for user input

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellConsoleStartup
Opcode
Stop

Description

PowerShell console is ready for user input.

Message #

PowerShell console is ready for user input

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 40962,
    "version": 1,
    "level": 4,
    "task": 4,
    "opcode": 2,
    "keywords": 0,
    "time_created": "2023-11-06T01:18:31.505927+00:00",
    "event_record_id": 788,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0002-CA26-E6E43710DA01"
    },
    "execution": {
      "process_id": 12192,
      "thread_id": 16872
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 45057 — Tracing ErrorRecord.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None
Opcode
Tobeusedwhenanexceptionisraised

Description

Tracing ErrorRecord.

Message #

Tracing ErrorRecord: 
 Message: %1 
 CategoryInfo.Category: %2 
 CategoryInfo.Reason : %3 
 CategoryInfo.TargetName : %4 
 FullyQualifiedErrorId: %5 
 Exception Details: 
 Message : %6 
 Stack Trace: %7 
 InnerException %8

Fields #

NameDescription
Message UnicodeString[Tracing ErrorRecord] Message.
CategoryInfoCategory[Tracing ErrorRecord] CategoryInfo.Category.
CategoryInfoReason[Tracing ErrorRecord] CategoryInfo.Reason.
CategoryInfoTargetName[Tracing ErrorRecord] CategoryInfo.TargetName.
FullyQualifiedErrorId UnicodeString[Tracing ErrorRecord] FullyQualifiedErrorId.
Message UnicodeString[Exception Details] Message.
Stack_Trace[Exception Details] Stack Trace.
Category UnicodeString
Reason UnicodeString
TargetName UnicodeString
ExceptionMessage UnicodeString
ExceptionStackTrace UnicodeString
ExceptionInnerException UnicodeString

Event ID 45058 — Exception: Message: Message StackTrace: StackTrace InnerException : InnerException.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None
Opcode
Tobeusedwhenanexceptionisraised

Description

Exception.

Message #

Exception: 
 Message: %1 
 StackTrace: %2 
 InnerException : %3

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 45059 — Tracing PSObject

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Tracing PSObject.

Message #

Tracing PSObject

Event ID 45060 — Tracing Job: Id: Id InstanceId: InstanceId Name: Name Location: Location State: State Command: Command.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Tracing Job.

Message #

Tracing Job: 
 Id: %1 
 InstanceId: %2 
 Name: %3 
 Location: %4 
 State: %5 
 Command: %6

Fields #

NameDescription
Id UnicodeString[Tracing Job] Id.
InstanceId UnicodeString[Tracing Job] InstanceId.
Name UnicodeString[Tracing Job] Name.
Location UnicodeString[Tracing Job] Location.
State UnicodeString[Tracing Job] State.
Command UnicodeString[Tracing Job] Command.

Event ID 45061 — Trace Information.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

Trace Information.

Message #

Trace Information: 
 %1

Fields #

NameDescription
param1 UnicodeString

Event ID 45062 — Connection Paramters are Connection URI: Connection_URI Resource URI: Resource_URI User: User OpenTimeout: OpenTimeout IdleTimeout: IdleTimeout CancelTimeout: CancelTimeout AuthenticationMechanism:...

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Connection Paramters are.

Message #

Connection Paramters are 
 Connection URI: %1 
 Resource URI: %2 
 User: %3 
 OpenTimeout: %4 
 IdleTimeout: %5 
 CancelTimeout: %6 
 AuthenticationMechanism: %7 
 Thumb Print: %8 
 MaxUriRedirectionCount: %9 
 MaxReceivedDataSizePerCommand: %10 
 MaxReceivedObjectSize: %11

Fields #

NameDescription
Connection_URI UnicodeString
Resource_URI UnicodeString
User UnicodeString
OpenTimeout UnicodeString
IdleTimeout UnicodeString
CancelTimeout UnicodeString
AuthenticationMechanism UInt32
Thumb_Print UnicodeString
MaxUriRedirectionCount UnicodeString
MaxReceivedDataSizePerCommand UnicodeString
MaxReceivedObjectSize UnicodeString
uri UnicodeString
shell UnicodeString
userName UnicodeString
opentimeout UnicodeString
idletimeout UnicodeString
canceltimeout UnicodeString
auth UInt32
thumbPrint UnicodeString
redircount UnicodeString
recvdDataSize UnicodeString
recvdObjSize UnicodeString

Event ID 45063 — Workflow plugin loaded.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowHosting
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow plugin loaded.

Message #

Workflow plugin loaded. 
 	 EndpointName: %1 
 	 User: %2 
 	 HostingMode: %3 
 	 Protocol: %4 
 	 Configuration: 
 %5

Fields #

NameDescription
EndpointName UnicodeString
User UnicodeString
HostingMode UnicodeString
Protocol UnicodeString
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
Configuration UnicodeString
endpointName UnicodeString
user UnicodeString
hostingMode UnicodeString
protocol UnicodeString
configuration UnicodeString

Event ID 45064 — Workflow execution started.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow execution started.

Message #

Workflow execution started. 
 	 WorkflowId: %1 
 	 ManagedNodes: %2

Fields #

NameDescription
WorkflowId GUID
ManagedNodes UnicodeString
workflowId GUID
managedNodes UnicodeString

Event ID 45065 — Workflow state changed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow state changed.

Message #

Workflow state changed. 
 	 WorkflowId: %1 
 	 NewState: %2 
 	 OldState: %3

Fields #

NameDescription
WorkflowId GUID
NewState UnicodeString
OldState UnicodeString
workflowId GUID
newState UnicodeString
oldState UnicodeString

Event ID 45072 — Workflow plugin has been requested for a shutdown.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowHosting
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow plugin has been requested for a shutdown.

Message #

Workflow plugin has been requested for a shutdown. 
 	 EndpointName: %1

Fields #

NameDescription
EndpointName UnicodeString
endpointName UnicodeString

Event ID 45073 — Workflow plugin restarted.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowHosting
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow plugin restarted.

Message #

Workflow plugin restarted. 
 	 EndpointName: %1

Fields #

NameDescription
EndpointName UnicodeString
endpointName UnicodeString

Event ID 45074 — Workflow is resuming.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow is resuming.

Message #

Workflow is resuming. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45075 — A quota limit that was set for the endpoint was exceeded.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

A quota limit that was set for the endpoint was exceeded.

Message #

A quota limit that was set for the endpoint was exceeded. 
 	 EndpointName: %1 
 	 ConfigName: %2 
 	 AllowedValue: %3 
 	 ValueInQuestion: %4

Fields #

NameDescription
EndpointName UnicodeString
ConfigName UnicodeString
AllowedValue UnicodeString
ValueInQuestion UnicodeString
endpointName UnicodeString
configName UnicodeString
allowedValue UnicodeString
valueInQuestion UnicodeString

Event ID 45076 — Workflow has resumed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow has resumed.

Message #

Workflow has resumed. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45078 — Workflow runspace pool was created.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow runspace pool was created.

Message #

Workflow runspace pool was created. 
 	 WorkflowId: %1 
 	 ManagedNode: %2

Fields #

NameDescription
WorkflowId GUID
ManagedNode UnicodeString
workflowId GUID
managedNode UnicodeString

Event ID 45079 — Activity was queued for execution.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Activity was queued for execution.

Message #

Activity was queued for execution. 
 	 WorkflowId: %1 
 	 ActivityName: %2

Fields #

NameDescription
WorkflowId GUID
ActivityName UnicodeString
workflowId GUID
activityName UnicodeString

Event ID 45080 — Activity execution started.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Activity execution started.

Message #

Activity execution started. 
 	 ActivityName: %1 
 	 ActivityTypeName: %2

Fields #

NameDescription
ActivityName UnicodeString
ActivityTypeName UnicodeString
activityName UnicodeString
activityTypeName UnicodeString

Event ID 45081 — Workflow is being imported from a XAML file.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow is being imported from a XAML file.

Message #

Workflow is being imported from a XAML file. 
 	 WorkflowId: %1 
 	 XamlFile: %2

Fields #

NameDescription
WorkflowId GUID
XamlFile UnicodeString
workflowId GUID
xamlFile UnicodeString

Event ID 45082 — Workflow has been imported from a XAML file.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow has been imported from a XAML file.

Message #

Workflow has been imported from a XAML file. 
 	 WorkflowId: %1 
 	 XamlFile: %2

Fields #

NameDescription
WorkflowId GUID
XamlFile UnicodeString
workflowId GUID
xamlFile UnicodeString

Event ID 45083 — Workflow could not be imported from a XAML file because of an error.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow could not be imported from a XAML file because of an error.

Message #

Workflow could not be imported from a XAML file because of an error. 
 	 WorkflowId: %1 
 	 ErrorDescription: %2

Fields #

NameDescription
WorkflowId GUID
ErrorDescription UnicodeString
workflowId GUID
errorDescription UnicodeString

Event ID 45084 — Workflow validation started.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowValidation
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow validation started.

Message #

Workflow validation started. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45085 — Workflow validation succeeded.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowValidation
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow validation succeeded.

Message #

Workflow validation succeeded. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45086 — Workflow validation failed with error.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowValidation
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow validation failed with error.

Message #

Workflow validation failed with error. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45087 — Workflow activity validated.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow activity validated.

Message #

Workflow activity validated. 
 	 WorkflowId: %1 
 	 ActivityDisplayName: %2 
 	 ActivityTypeName: %3

Fields #

NameDescription
WorkflowId GUID
ActivityDisplayName UnicodeString
ActivityTypeName UnicodeString
workflowId GUID
activityDisplayName UnicodeString
activityType UnicodeString

Event ID 45088 — Workflow activity could not be validated.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowValidation
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow activity could not be validated.

Message #

Workflow activity could not be validated. 
 	 WorkflowId: %1 
 	 ActivityDisplayName: %2 
 	 ActivityTypeName: %3

Fields #

NameDescription
WorkflowId GUID
ActivityDisplayName UnicodeString
ActivityTypeName UnicodeString
workflowId GUID
activityDisplayName UnicodeString
activityType UnicodeString

Event ID 45089 — Activity execution failed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Activity execution failed.

Message #

Activity execution failed. 
 	 WorkflowId: %1 
 	 ActivityName: %2 
 	 FailureDescription: %3

Fields #

NameDescription
WorkflowId GUID
ActivityName UnicodeString
FailureDescription UnicodeString
workflowId GUID
activityName UnicodeString
failureDescription UnicodeString

Event ID 45090 — Runspace availability changed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Runspace availability changed.

Message #

Runspace availability changed. 
 	 RunspaceId: %1 
 	 Availability: %2

Fields #

NameDescription
RunspaceId UnicodeString
Availability UnicodeString
runspaceId UnicodeString
availability UnicodeString

Event ID 45091 — Runspace state changed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Runspace state changed.

Message #

Runspace state changed. 
 	 RunspaceId: %1 
 	 NewState: %2 
 	 OldState: %3

Fields #

NameDescription
RunspaceId UnicodeString
NewState UnicodeString
OldState UnicodeString
runspaceId UnicodeString
newState UnicodeString
oldState UnicodeString

Event ID 45092 — Workflow loaded for execution.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow loaded for execution.

Message #

Workflow loaded for execution. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45093 — Workflow unloaded.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow unloaded.

Message #

Workflow unloaded. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45094 — Workflow execution cancelled.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow execution cancelled.

Message #

Workflow execution cancelled. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45095 — Workflow execution aborted.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow execution aborted.

Message #

Workflow execution aborted. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45096 — Workflow cleanup operation executed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow cleanup operation executed.

Message #

Workflow cleanup operation executed. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45097 — Persisted workflow loaded from disk.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Persisted workflow loaded from disk.

Message #

Persisted workflow loaded from disk. 
 	 WorkflowId: %1 
 	 Path: %2

Fields #

NameDescription
WorkflowId GUID
Path UnicodeString
workflowId GUID
path UnicodeString

Event ID 45098 — Workflow data was deleted from disk.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow data was deleted from disk.

Message #

Workflow data was deleted from disk. 
 	 WorkflowId: %1 
 	 Path: %2

Fields #

NameDescription
WorkflowId GUID
Path UnicodeString
workflowId GUID
path UnicodeString

Event ID 45100 — Starting remove job.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Starting remove job.

Message #

Starting remove job. 
 	 JobId: %1

Fields #

NameDescription
JobId GUID
jobId GUID

Event ID 45101 — Job state changed.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Job state changed.

Message #

Job state changed. 
 	 JobId: %1 
 	 WorkflowId: %2 
 	 NewState: %3 
 	 OldState: %4

Fields #

NameDescription
JobId Int32
WorkflowId GUID
NewState UnicodeString
OldState UnicodeString
jobId Int32
workflowId GUID
newState UnicodeString
oldState UnicodeString

Event ID 45102 — Job error.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Job error.

Message #

Job error. 
 	 JobId: %1 
 	 WorkflowId: %2 
 	 ErrorDescription: %3

Fields #

NameDescription
JobId Int32
WorkflowId GUID
ErrorDescription UnicodeString
jobId Int32
workflowId GUID
errorDescription UnicodeString

Event ID 45104 — Job created for workflow (child job).

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Job created for workflow (child job).

Message #

Job created for workflow (child job). 
 	 ParentJobId: %1 
 	 ChildJobId: %2 
 	 ChildWorkflowId: %3

Fields #

NameDescription
ParentJobId GUID
ChildJobId GUID
ChildWorkflowId GUID
parentJobId GUID
childJobId GUID
childWorkflowId GUID

Event ID 45105 — Parent job created for workflow.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Parent job created for workflow.

Message #

Parent job created for workflow. 
 	 JobId: %1

Fields #

NameDescription
JobId GUID
jobId GUID

Event ID 45106 — All required jobs were created for workflow execution.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

All required jobs were created for workflow execution.

Message #

All required jobs were created for workflow execution. 
 	 JobId: %1 
 	 WorkflowId: %2

Fields #

NameDescription
JobId GUID
WorkflowId GUID
jobId GUID
workflowId GUID

Event ID 45107 — Child job removed for workflow.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Child job removed for workflow.

Message #

Child job removed for workflow. 
 	 ParentJobId: %1 
 	 ChildJobId: %2 
 	 WorkflowId: %3

Fields #

NameDescription
ParentJobId GUID
ChildJobId GUID
WorkflowId GUID
parentJobId GUID
childJobId GUID
workflowId GUID

Event ID 45108 — An error occurred while removing job.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

An error occurred while removing job.

Message #

An error occurred while removing job. 
 	 ParentJobId: %1 
 	 ChildJobId: %2 
 	 WorkflowId: %3 
 	 Error: %4

Fields #

NameDescription
ParentJobId GUID
ChildJobId GUID
WorkflowId GUID
Error UnicodeString
parentJobId GUID
childJobId GUID
workflowId GUID
error UnicodeString

Event ID 45109 — Loading workflow for execution.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Loading workflow for execution.

Message #

Loading workflow for execution. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45110 — Workflow execution finished.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow execution finished.

Message #

Workflow execution finished. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45111 — Cancelling workflow execution.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Cancelling workflow execution.

Message #

Cancelling workflow execution. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45112 — Aborting workflow execution.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Aborting workflow execution.

Message #

Aborting workflow execution. 
 	 WorkflowId: %1 
 	 Reason: %2

Fields #

NameDescription
WorkflowId GUID
Reason UnicodeString
workflowId GUID
reason UnicodeString

Event ID 45113 — Unloading workflow.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Unloading workflow.

Message #

Unloading workflow. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45114 — Forced workflow shutdown started.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Forced workflow shutdown started.

Message #

Forced workflow shutdown started. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45115 — Forced workflow shutdown finished.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Forced workflow shutdown finished.

Message #

Forced workflow shutdown finished. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45116 — An error occurred while forcefully shutting down a workflow.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

An error occurred while forcefully shutting down a workflow.

Message #

An error occurred while forcefully shutting down a workflow. 
 	 WorkflowId: %1 
 	 ErrorDescription: %2

Fields #

NameDescription
WorkflowId GUID
ErrorDescription UnicodeString
workflowId GUID
errorDescription UnicodeString

Event ID 45117 — Persisting workflow to disk.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Persisting workflow to disk.

Message #

Persisting workflow to disk. 
 	 WorkflowId: %1 
 	 PersistPath: %2

Fields #

NameDescription
WorkflowId GUID
PersistPath UnicodeString
workflowId GUID
persistPath UnicodeString

Event ID 45118 — Workflow persisted to disk.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow persisted to disk.

Message #

Workflow persisted to disk. 
 	 WorkflowId: %1

Fields #

NameDescription
WorkflowId GUID
workflowId GUID

Event ID 45119 — Activity execution finished.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Activity execution finished.

Message #

Activity execution finished. 
 	 ActivityName: %1

Fields #

NameDescription
ActivityName UnicodeString
activityName UnicodeString

Event ID 45120 — Workflow execution error.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow execution error.

Message #

Workflow execution error. 
 	 WorkflowId: %1 
 	 ErrorDescription: %2

Fields #

NameDescription
WorkflowId GUID
ErrorDescription UnicodeString
workflowId GUID
errorDescription UnicodeString

Event ID 45121 — A new PowerShell endpoint was registered.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Configuration
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

A new PowerShell endpoint was registered.

Message #

A new PowerShell endpoint was registered. 
 	 EndpointName: %1 
 	 EndpointType: %2 
 	 RegisteredBy: %3

Fields #

NameDescription
EndpointName UnicodeString
EndpointType UnicodeString
RegisteredBy UnicodeString
endpointName UnicodeString
endpointType UnicodeString
registeredBy UnicodeString

Event ID 45122 — Endpoint configuration modified.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Configuration
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Endpoint configuration modified.

Message #

Endpoint configuration modified. 
 	 EndpointName: %1 
 	 ModifiedBy: %2

Fields #

NameDescription
EndpointName UnicodeString
ModifiedBy UnicodeString
endpointName UnicodeString
modifiedBy UnicodeString

Event ID 45123 — Endpoint configuration unregistered.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Configuration
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Endpoint configuration unregistered.

Message #

Endpoint configuration unregistered. 
 	 EndpointName: %1 
 	 UnregisteredBy: %2

Fields #

NameDescription
EndpointName UnicodeString
UnregisteredBy UnicodeString
endpointName UnicodeString
unregisteredBy UnicodeString

Event ID 45124 — Endpoint configuration disabled.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Configuration
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Endpoint configuration disabled.

Message #

Endpoint configuration disabled. 
 	 EndpointName: %1 
 	 DisabledBy: %2

Fields #

NameDescription
EndpointName UnicodeString
DisabledBy UnicodeString
endpointName UnicodeString
disabledBy UnicodeString

Event ID 45125 — Endpoint configuration enabled.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
Configuration
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Endpoint configuration enabled.

Message #

Endpoint configuration enabled. 
 	 EndpointName: %1 
 	 EnabledBy: %2

Fields #

NameDescription
EndpointName UnicodeString
EnabledBy UnicodeString
endpointName UnicodeString
enabledBy UnicodeString

Event ID 45126 — Out of process runspace started.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Out of process runspace started.

Message #

Out of process runspace started. 
 	 Command: %1

Fields #

NameDescription
Command UnicodeString
command UnicodeString

Event ID 45127 — Parameter splatting was performed during workflow execution.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowExecution
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Parameter splatting was performed during workflow execution.

Message #

Parameter splatting was performed during workflow execution. 
 	 Parameters: %1 
 	 Computers: %2

Fields #

NameDescription
Parameters UnicodeString
Computers UnicodeString
parameters UnicodeString
computers UnicodeString

Event ID 45128 — Workflow engine started.

Provider
Microsoft-Windows-PowerShell
Channel
Analytic
Task
WorkflowHosting
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Workflow engine started.

Message #

Workflow engine started. 
 	 EndpointName: %1

Fields #

NameDescription
EndpointName UnicodeString
endpointName UnicodeString

Event ID 45129 — Workflow manager instantiated with CheckpointPath: CheckpointPath ConfigProviderId: ConfigProviderId UserName: UserName Path: Path.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

Workflow manager instantiated with.

Message #

Workflow manager instantiated with 
 	 CheckpointPath: %1 
 	 ConfigProviderId: %2 
 	 UserName: %3 
 	 Path: %4

Fields #

NameDescription
CheckpointPath UnicodeString
ConfigProviderId UnicodeString
UserName UnicodeString
Path UnicodeString
checkpointPath UnicodeString
configProviderId UnicodeString
userName UnicodeString
path UnicodeString

Event ID 46337 — BEGIN ImportWorkflowCommand::StartWorkflowApplication.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN ImportWorkflowCommand::StartWorkflowApplication. Starting invocation of workflow function. Tracking Guid TrackingId.

Message #

BEGIN ImportWorkflowCommand::StartWorkflowApplication. Starting invocation of workflow function. Tracking Guid %1

Fields #

NameDescription
TrackingId GUID

Event ID 46338 — END ImportWorkflowCommand::StartWorkflowApplication.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END ImportWorkflowCommand::StartWorkflowApplication. Ending invocation of workflow function. Tracking Guid TrackingId.

Message #

END ImportWorkflowCommand::StartWorkflowApplication. Ending invocation of workflow function. Tracking Guid %1

Fields #

NameDescription
TrackingId GUID

Event ID 46339 — BEGIN Creating new job in ImportWorkflowCommand::StartWorkflowApplication.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN Creating new job in ImportWorkflowCommand::StartWorkflowApplication. Tracking Guid TrackingId.

Message #

BEGIN Creating new job in ImportWorkflowCommand::StartWorkflowApplication. Tracking Guid %1

Fields #

NameDescription
TrackingId GUID

Event ID 46340 — END Creating new job in ImportWorkflowCommand::StartWorkflowApplication.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END Creating new job in ImportWorkflowCommand::StartWorkflowApplication. Tracking Guid TrackingId.

Message #

END Creating new job in ImportWorkflowCommand::StartWorkflowApplication. Tracking Guid %1

Fields #

NameDescription
TrackingId GUID

Event ID 46341 — END Creating new job in ImportWorkflowCommand::StartWorkflowApplication.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END Creating new job in ImportWorkflowCommand::StartWorkflowApplication. Tracking Guid TrackingId : ContainerParentJob Guid ContainerParentJobInstanceId.

Message #

END Creating new job in ImportWorkflowCommand::StartWorkflowApplication. Tracking Guid %1 : ContainerParentJob Guid %2

Fields #

NameDescription
TrackingId GUID
ContainerParentJobInstanceId GUID

Event ID 46342 — BEGIN JobLogic ContainerParentJob Guid WorkflowJobJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN JobLogic ContainerParentJob Guid WorkflowJobJobInstanceId.

Message #

BEGIN JobLogic ContainerParentJob Guid %1

Fields #

NameDescription
WorkflowJobJobInstanceId GUID

Event ID 46343 — END JobLogic ContainerParentJob Guid WorkflowJobJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END JobLogic ContainerParentJob Guid WorkflowJobJobInstanceId.

Message #

END JobLogic ContainerParentJob Guid %1

Fields #

NameDescription
WorkflowJobJobInstanceId GUID

Event ID 46344 — BEGIN WorkflowExecution ContainerParentJob Guid WorkflowJobJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN WorkflowExecution ContainerParentJob Guid WorkflowJobJobInstanceId.

Message #

BEGIN WorkflowExecution ContainerParentJob Guid %1

Fields #

NameDescription
WorkflowJobJobInstanceId GUID

Event ID 46345 — END WorkflowExecution ContainerParentJob Guid WorkflowJobJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END WorkflowExecution ContainerParentJob Guid WorkflowJobJobInstanceId.

Message #

END WorkflowExecution ContainerParentJob Guid %1

Fields #

NameDescription
WorkflowJobJobInstanceId GUID

Event ID 46346 — WorkflowJob with Guid WorkflowJobInstanceId added to ContainerParentJob with Guid ContainerParentJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

WorkflowJob with Guid WorkflowJobInstanceId added to ContainerParentJob with Guid ContainerParentJobInstanceId.

Message #

WorkflowJob with Guid %1 added to ContainerParentJob with Guid %2

Fields #

NameDescription
WorkflowJobInstanceId GUID
ContainerParentJobInstanceId GUID

Event ID 46347 — ProxyJob with Guid ProxyJobInstanceId associated with remote ContainerParentJob with Guid ContainerParentJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

ProxyJob with Guid ProxyJobInstanceId associated with remote ContainerParentJob with Guid ContainerParentJobInstanceId.

Message #

ProxyJob with Guid %1 associated with remote ContainerParentJob with Guid %2

Fields #

NameDescription
ProxyJobInstanceId GUID
ContainerParentJobInstanceId GUID

Event ID 46348 — BEGIN Execution of ContainerParentJob with Guid ContainerParentJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN Execution of ContainerParentJob with Guid ContainerParentJobInstanceId.

Message #

BEGIN Execution of ContainerParentJob with Guid %1

Fields #

NameDescription
ContainerParentJobInstanceId GUID

Event ID 46349 — END Execution of ContainerParentJob with Guid ContainerParentJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END Execution of ContainerParentJob with Guid ContainerParentJobInstanceId.

Message #

END Execution of ContainerParentJob with Guid %1

Fields #

NameDescription
ContainerParentJobInstanceId GUID

Event ID 46350 — BEGIN Execution of Proxy Job with Guid ProxyJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN Execution of Proxy Job with Guid ProxyJobInstanceId.

Message #

BEGIN Execution of Proxy Job with Guid %1

Fields #

NameDescription
ProxyJobInstanceId GUID

Event ID 46351 — END Execution of Proxy Job with Guid ProxyJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END Execution of Proxy Job with Guid ProxyJobInstanceId.

Message #

END Execution of Proxy Job with Guid %1

Fields #

NameDescription
ProxyJobInstanceId GUID

Event ID 46352 — BEGIN StateChanged event handler for Proxy Job with Guid ProxyJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN StateChanged event handler for Proxy Job with Guid ProxyJobInstanceId.

Message #

BEGIN StateChanged event handler for Proxy Job with Guid %1

Fields #

NameDescription
ProxyJobInstanceId GUID

Event ID 46353 — END StateChanged event handler for Proxy Job with Guid ProxyJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END StateChanged event handler for Proxy Job with Guid ProxyJobInstanceId.

Message #

END StateChanged event handler for Proxy Job with Guid %1

Fields #

NameDescription
ProxyJobInstanceId GUID

Event ID 46354 — BEGIN StateChanged event handler for Proxy Child Job with Guid ProxyChildJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN StateChanged event handler for Proxy Child Job with Guid ProxyChildJobInstanceId.

Message #

BEGIN StateChanged event handler for Proxy Child Job with Guid %1

Fields #

NameDescription
ProxyChildJobInstanceId GUID

Event ID 46355 — END StateChanged event handler for Proxy Child Job with Guid ProxyChildJobInstanceId.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END StateChanged event handler for Proxy Child Job with Guid ProxyChildJobInstanceId.

Message #

END StateChanged event handler for Proxy Child Job with Guid %1

Fields #

NameDescription
ProxyChildJobInstanceId GUID

Event ID 46356 — BEGIN Running garbage collection

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

BEGIN Running garbage collection.

Message #

BEGIN Running garbage collection

Event ID 46357 — END Running garbage collection

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

END Running garbage collection.

Message #

END Running garbage collection

Event ID 46358 — Persistence store has reached its maximum specified size

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
None

Description

Persistence store has reached its maximum specified size.

Message #

Persistence store has reached its maximum specified size

Event ID 49152 — message.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Message #

%1

Fields #

NameDescription
message UnicodeString

Event ID 49153 — Trace Information.

Provider
Microsoft-Windows-PowerShell
Channel
Debug
Task
None

Description

Trace Information.

Message #

Trace Information: 
 %1 %2

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString

Event ID 53249 — Scheduled Job ScheduledJobDefName started at StartTime.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellScheduledJobs
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Scheduled Job ScheduledJobDefName started at StartTime.

Message #

Scheduled Job %1 started at %2

Fields #

NameDescription
ScheduledJobDefName UnicodeString
StartTime UnicodeString

Event ID 53250 — Scheduled Job ScheduledJobDefName completed at StopTime with state State.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellScheduledJobs
Opcode
Tobeusedwhenoperationisjustexecutingamethod

Description

Scheduled Job ScheduledJobDefName completed at StopTime with state State.

Message #

Scheduled Job %1 completed at %2 with state %3

Fields #

NameDescription
ScheduledJobDefName UnicodeString
StopTime UnicodeString
State UnicodeString

Event ID 53251 — Scheduled Job Exception Message.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellScheduledJobs
Opcode
Tobeusedwhenanexceptionisraised

Description

Scheduled Job Exception Message.

Message #

Scheduled Job Exception %1: 
 Message: %2 
 StackTrace: %3 
 InnerException: %4

Fields #

NameDescription
Message UnicodeString
StackTrace UnicodeString
InnerException UnicodeString
Name UnicodeString

Event ID 53504 — Windows PowerShell has started an IPC listening thread on process: param1 in AppDomain: param2.

#
Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellNamedPipeIPC
Opcode
Open(async)

Description

Windows PowerShell has started an IPC listening thread on process: param1 in AppDomain: param2.

Message #

Windows PowerShell has started an IPC listening thread on process: %1 in AppDomain: %2.

Fields #

NameDescription
param1 UnicodeStringWindows PowerShell has started an IPC listening thread on process.
param2 UnicodeStringin AppDomain.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 53504,
    "version": 1,
    "level": 4,
    "task": 111,
    "opcode": 10,
    "keywords": 0,
    "time_created": "2023-11-06T01:18:29.006927+00:00",
    "event_record_id": 774,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0002-CA26-E6E43710DA01"
    },
    "execution": {
      "process_id": 12192,
      "thread_id": 10468
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "param1": "12192",
    "param2": "DefaultAppDomain"
  },
  "message": ""
}

References #

Event ID 53505 — Windows PowerShell has ended an IPC listening thread on process: param1 in AppDomain: param2.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellNamedPipeIPC
Opcode
Close(Async)

Description

Windows PowerShell has ended an IPC listening thread on process: param1 in AppDomain: param2.

Message #

Windows PowerShell has ended an IPC listening thread on process: %1 in AppDomain: %2.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString

Event ID 53506 — An error has occurred in Windows PowerShell IPC listening thread on process: param1 in AppDomain: param2.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellNamedPipeIPC
Opcode
Tobeusedwhenanexceptionisraised

Description

An error has occurred in Windows PowerShell IPC listening thread on process: param1 in AppDomain: param2. Error Message: ErrorMessage.

Message #

An error has occurred in Windows PowerShell IPC listening thread on process: %1 in AppDomain: %2.  Error Message: %3.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 53507 — Windows PowerShell IPC connect on process: param1 in AppDomain: param2 for User: param3.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellNamedPipeIPC
Opcode
connect

Description

Windows PowerShell IPC connect on process: param1 in AppDomain: param2 for User: param3.

Message #

Windows PowerShell IPC connect on process: %1 in AppDomain: %2 for User: %3.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString

Event ID 53508 — Windows PowerShell IPC disconnect on process: param1 in AppDomain: param2 for User: param3.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Collection Priority
Recommended (Yamato Security)
Task
PowerShellNamedPipeIPC
Opcode
Close(Async)

Description

Windows PowerShell IPC disconnect on process: param1 in AppDomain: param2 for User: param3.

Message #

Windows PowerShell IPC disconnect on process: %1 in AppDomain: %2 for User: %3.

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString
param3 UnicodeString