Microsoft-Windows-Security-Auditing

423 events across 1 channel

Event IDTitleChannel
4608Windows is starting up.Security
4609Windows is shutting down.Security
4610An authentication package has been loaded by the Local Security Authority.Security
4611A trusted logon process has been registered with the Local Security Authority.Security
4612Internal resources allocated for the queuing of audit messages have been …Security
4614A notification package has been loaded by the Security Account Manager.Security
4615Invalid use of LPC port.Security
4616The system time was changed.Security
4618A monitored security event pattern has occurred.Security
4621Administrator recovered system from CrashOnAuditFail.Security
4622A security package has been loaded by the Local Security Authority.Security
4624An account was successfully logged on.Security
4625An account failed to log on.Security
4626User / Device claims information.Security
4627Group membership information.Security
4634An account was logged off.Security
4646%1Security
4647User initiated logoff:Security
4648A logon was attempted using explicit credentials.Security
4649A replay attack was detected.Security
4650An IPsec main mode security association was established.Security
4651An IPsec main mode security association was established.Security
4652An IPsec main mode negotiation failed.Security
4653An IPsec main mode negotiation failed.Security
4654An IPsec quick mode negotiation failed.Security
4655An IPsec main mode security association ended.Security
4656A handle to an object was requested.Security
4657A registry value was modified.Security
4658The handle to an object was closed.Security
4659A handle to an object was requested with intent to delete.Security
4660An object was deleted.Security
4661A handle to an object was requested.Security
4662An operation was performed on an object.Security
4663An attempt was made to access an object.Security
4664An attempt was made to create a hard link.Security
4665An attempt was made to create an application client context.Security
4666An application attempted an operation: Subject: Client Name: %5 Client Domain: …Security
4667An application client context was deleted.Security
4668An application was initialized.Security
4670Permissions on an object were changed.Security
4671An application attempted to access a blocked ordinal through the TBS.Security
4672Special privileges assigned to new logon.Security
4673A privileged service was called.Security
4674An operation was attempted on a privileged object.Security
4675SIDs were filtered.Security
4688A new process has been created.Security
4689A process has exited.Security
4690An attempt was made to duplicate a handle to an object.Security
4691Indirect access to an object was requested.Security
4692Backup of data protection master key was attempted.Security
4693Recovery of data protection master key was attempted.Security
4694Protection of auditable protected data was attempted.Security
4695Unprotection of auditable protected data was attempted.Security
4696A primary token was assigned to process.Security
4697A service was installed in the system.Security
4698A scheduled task was created.Security
4699A scheduled task was deleted.Security
4700A scheduled task was enabled.Security
4701A scheduled task was disabled.Security
4702A scheduled task was updated.Security
4703A user right was adjusted.Security
4704A user right was assigned.Security
4705A user right was removed.Security
4706A new trust was created to a domain.Security
4707A trust to a domain was removed.Security
4709The IPsec Policy Agent service was started.Security
4710The IPsec Policy Agent service was disabled.Security
4711%1Security
4712IPsec Policy Agent encountered a potentially serious failure.Security
4713Kerberos policy was changed.Security
4714Data Recovery Agent group policy for Encrypting File System (EFS) has changed.Security
4715The audit policy (SACL) on an object was changed.Security
4716Trusted domain information was modified.Security
4717System security access was granted to an account.Security
4718System security access was removed from an account.Security
4719System audit policy was changed.Security
4720A user account was created.Security
4722A user account was enabled.Security
4723An attempt was made to change an account's password.Security
4724An attempt was made to reset an account's password.Security
4725A user account was disabled.Security
4726A user account was deleted.Security
4727A security-enabled global group was created.Security
4728A member was added to a security-enabled global group.Security
4729A member was removed from a security-enabled global group.Security
4730A security-enabled global group was deleted.Security
4731A security-enabled local group was created.Security
4732A member was added to a security-enabled local group.Security
4733A member was removed from a security-enabled local group.Security
4734A security-enabled local group was deleted.Security
4735A security-enabled local group was changed.Security
4737A security-enabled global group was changed.Security
4738A user account was changed.Security
4739Domain Policy was changed.Security
4740A user account was locked out.Security
4741A computer account was created.Security
4742A computer account was changed.Security
4743A computer account was deleted.Security
4744A security-disabled local group was created.Security
4745A security-disabled local group was changed.Security
4746A member was added to a security-disabled local group.Security
4747A member was removed from a security-disabled local group.Security
4748A security-disabled local group was deleted.Security
4749A security-disabled global group was created.Security
4750A security-disabled global group was changed.Security
4751A member was added to a security-disabled global group.Security
4752A member was removed from a security-disabled global group.Security
4753A security-disabled global group was deleted.Security
4754A security-enabled universal group was created.Security
4755A security-enabled universal group was changed.Security
4756A member was added to a security-enabled universal group.Security
4757A member was removed from a security-enabled universal group.Security
4758A security-enabled universal group was deleted.Security
4759A security-disabled universal group was created.Security
4760A security-disabled universal group was changed.Security
4761A member was added to a security-disabled universal group.Security
4762A member was removed from a security-disabled universal group.Security
4763A security-disabled universal group was deleted.Security
4764A group’s type was changed.Security
4765SID History was added to an account.Security
4766An attempt to add SID History to an account failed.Security
4767A user account was unlocked.Security
4768A Kerberos authentication ticket (TGT) was requested.Security
4769A Kerberos service ticket was requested.Security
4770A Kerberos service ticket was renewed.Security
4771Kerberos pre-authentication failed.Security
4772A Kerberos authentication ticket request failed.Security
4773A Kerberos service ticket request failed.Security
4774An account was mapped for logon.Security
4775An account could not be mapped for logon.Security
4776The domain controller attempted to validate the credentials for an account.Security
4777The domain controller failed to validate the credentials for an account.Security
4778A session was reconnected to a Window Station.Security
4779A session was disconnected from a Window Station.Security
4780The ACL was set on accounts which are members of administrators groups.Security
4781The name of an account was changed:Security
4782The password hash an account was accessed.Security
4783A basic application group was created.Security
4784A basic application group was changed.Security
4785A member was added to a basic application group.Security
4786A member was removed from a basic application group.Security
4787A non-member was added to a basic application group.Security
4788A non-member was removed from a basic application group.Security
4789A basic application group was deleted.Security
4790An LDAP query group was created.Security
4791A basic application group was changed.Security
4792An LDAP query group was deleted.Security
4793The Password Policy Checking API was called.Security
4794An attempt was made to set the Directory Services Restore Mode administrator …Security
4797An attempt was made to query the existence of a blank password for an account.Security
4798A user's local group membership was enumerated.Security
4799A security-enabled local group membership was enumerated.Security
4800The workstation was locked.Security
4801The workstation was unlocked.Security
4802The screen saver was invoked.Security
4803The screen saver was dismissed.Security
4816RPC detected an integrity violation while decrypting an incoming message.Security
4817Auditing settings on object were changed.Security
4818Proposed Central Access Policy does not grant the same access permissions as the …Security
4819Central Access Policies on the machine have been changed.Security
4820A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not …Security
4821A Kerberos service ticket was denied because the user, device, or both does not …Security
4822NTLM authentication failed because the account was a member of the Protected …Security
4823NTLM authentication failed because access control restrictions are required.Security
4824Kerberos preauthentication by using DES or RC4 failed because the account was a …Security
4825A user was denied the access to Remote Desktop.Security
4826Boot Configuration Data loaded.Security
4830SID History was removed from an account.Security
4864A namespace collision was detected.Security
4865A trusted forest information entry was added.Security
4866A trusted forest information entry was removed.Security
4867A trusted forest information entry was modified.Security
4868The certificate manager denied a pending certificate request.Security
4869Certificate Services received a resubmitted certificate request.Security
4870Certificate Services revoked a certificate.Security
4871Certificate Services received a request to publish the certificate revocation …Security
4872Certificate Services published the certificate revocation list (CRL).Security
4873A certificate request extension changed.Security
4874One or more certificate request attributes changed.Security
4875Certificate Services received a request to shut down.Security
4876Certificate Services backup started.Security
4877Certificate Services backup completed.Security
4878Certificate Services restore started.Security
4879Certificate Services restore completed.Security
4880Certificate Services started.Security
4881Certificate Services stopped.Security
4882The security permissions for Certificate Services changed.Security
4883Certificate Services retrieved an archived key.Security
4884Certificate Services imported a certificate into its database.Security
4885The audit filter for Certificate Services changed.Security
4886Certificate Services received a certificate request.Security
4887Certificate Services approved a certificate request and issued a certificate.Security
4888Certificate Services denied a certificate request.Security
4889Certificate Services set the status of a certificate request to pending.Security
4890The certificate manager settings for Certificate Services changed.Security
4891A configuration entry changed in Certificate Services.Security
4892A property of Certificate Services changed.Security
4893Certificate Services archived a key.Security
4894Certificate Services imported and archived a key.Security
4895Certificate Services published the CA certificate to Active Directory Domain …Security
4896One or more rows have been deleted from the certificate database.Security
4897Role separation enabled.Security
4898Certificate Services loaded a template.Security
4899A Certificate Services template was updated.Security
4900Certificate Services template security was updated.Security
4902The Per-user audit policy table was created.Security
4904An attempt was made to register a security event source.Security
4905An attempt was made to unregister a security event source.Security
4906The CrashOnAuditFail value has changed.Security
4907Auditing settings on object were changed.Security
4908Special Groups Logon table modified.Security
4909The local policy settings for the TBS were changed.Security
4910The group policy settings for the TBS were changed.Security
4911Resource attributes of the object were changed.Security
4912Per User Audit Policy was changed.Security
4913Central Access Policy on the object was changed.Security
4928An Active Directory replica source naming context was established.Security
4929An Active Directory replica source naming context was removed.Security
4930An Active Directory replica source naming context was modified.Security
4931An Active Directory replica destination naming context was modified.Security
4932Synchronization of a replica of an Active Directory naming context has begun.Security
4933Synchronization of a replica of an Active Directory naming context has ended.Security
4934Attributes of an Active Directory object were replicated.Security
4935Replication failure begins.Security
4936Replication failure ends.Security
4937A lingering object was removed from a replica.Security
4944The following policy was active when the Windows Firewall started.Security
4945A rule was listed when the Windows Firewall started.Security
4946A change has been made to Windows Firewall exception list. A rule was added.Security
4947A change has been made to Windows Firewall exception list. A rule was modified.Security
4948A change has been made to Windows Firewall exception list. A rule was deleted.Security
4949Windows Firewall settings were restored to the default values.Security
4950A Windows Firewall setting has changed.Security
4951A rule has been ignored because its major version number was not recognized by …Security
4952Parts of a rule have been ignored because its minor version number was not …Security
4953A rule has been ignored by Windows Firewall because it could not parse the rule.Security
4954Windows Firewall Group Policy settings has changed.Security
4956Windows Firewall has changed the active profile.Security
4957Windows Firewall did not apply the following rule:Security
4958Windows Firewall did not apply the following rule because the rule referred to …Security
4960IPsec dropped an inbound packet that failed an integrity check.Security
4961IPsec dropped an inbound packet that failed a replay check.Security
4962IPsec dropped an inbound packet that failed a replay check.Security
4963IPsec dropped an inbound clear text packet that should have been secured.Security
4964Special groups have been assigned to a new logon.Security
4965IPsec received a packet from a remote computer with an incorrect Security …Security
4976During Main Mode negotiation, IPsec received an invalid negotiation packet.Security
4977During Quick Mode negotiation, IPsec received an invalid negotiation packet.Security
4978During Extended Mode negotiation, IPsec received an invalid negotiation packet.Security
4979IPsec Main Mode and Extended Mode security associations were established.Security
4980IPsec Main Mode and Extended Mode security associations were established.Security
4981IPsec Main Mode and Extended Mode security associations were established.Security
4982IPsec Main Mode and Extended Mode security associations were established.Security
4983An IPsec Extended Mode negotiation failed.Security
4984An IPsec Extended Mode negotiation failed.Security
4985The state of a transaction has changed.Security
5024The Windows Firewall Service has started successfully.Security
5025The Windows Firewall Service has been stopped.Security
5027The Windows Firewall Service was unable to retrieve the security policy from the …Security
5028The Windows Firewall Service was unable to parse the new security policy.Security
5029The Windows Firewall Service failed to initialize the driver.Security
5030The Windows Firewall Service failed to start.Security
5031The Windows Firewall Service blocked an application from accepting incoming …Security
5032Windows Firewall was unable to notify the user that it blocked an application …Security
5033The Windows Firewall Driver has started successfully.Security
5034The Windows Firewall Driver has been stopped.Security
5035The Windows Firewall Driver failed to start.Security
5037The Windows Firewall Driver detected critical runtime error.Security
5038Code integrity determined that the image hash of a file is not valid.Security
5039A registry key was virtualized.Security
5040A change has been made to IPsec settings. An Authentication Set was added.Security
5041A change has been made to IPsec settings. An Authentication Set was modified.Security
5042A change has been made to IPsec settings. An Authentication Set was deleted.Security
5043A change has been made to IPsec settings. A Connection Security Rule was added.Security
5044A change has been made to IPsec settings. A Connection Security Rule was …Security
5045A change has been made to IPsec settings. A Connection Security Rule was …Security
5046A change has been made to IPsec settings. A Crypto Set was added.Security
5047A change has been made to IPsec settings. A Crypto Set was modified.Security
5048A change has been made to IPsec settings. A Crypto Set was deleted.Security
5049An IPsec Security Association was deleted.Security
5050An attempt to programmatically disable the Windows Firewall using a call to …Security
5051A file was virtualized.Security
5056A cryptographic self test was performed.Security
5057A cryptographic primitive operation failed.Security
5058Key file operation.Security
5059Key migration operation.Security
5060Verification operation failed.Security
5061Cryptographic operation.Security
5062A kernel-mode cryptographic self test was performed.Security
5063A cryptographic provider operation was attempted.Security
5064A cryptographic context operation was attempted.Security
5065A cryptographic context modification was attempted.Security
5066A cryptographic function operation was attempted.Security
5067A cryptographic function modification was attempted.Security
5068A cryptographic function provider operation was attempted.Security
5069A cryptographic function property operation was attempted.Security
5070A cryptographic function property modification was attempted.Security
5071Key access denied by Microsoft key distribution service.Security
5120OCSP Responder Service Started.Security
5121OCSP Responder Service Stopped.Security
5122A Configuration entry changed in the OCSP Responder Service.Security
5123A configuration entry changed in the OCSP Responder Service.Security
5124A security setting was updated on OCSP Responder Service.Security
5125A request was submitted to OCSP Responder Service.Security
5126Signing Certificate was automatically updated by the OCSP Responder Service.Security
5127The OCSP Revocation Provider successfully updated the revocation information.Security
5136A directory service object was modified.Security
5137A directory service object was created.Security
5138A directory service object was undeleted.Security
5139A directory service object was moved.Security
5140A network share object was accessed.Security
5141A directory service object was deleted.Security
5142A network share object was added.Security
5143A network share object was modified.Security
5144A network share object was deleted.Security
5145A network share object was checked to see whether client can be granted desired …Security
5146The Windows Filtering Platform has blocked a packet.Security
5147A more restrictive Windows Filtering Platform filter has blocked a packet.Security
5148The Windows Filtering Platform has detected a DoS attack and entered a defensive …Security
5149The DoS attack has subsided and normal processing is being resumed.Security
5150The Windows Filtering Platform has blocked a packet.Security
5151A more restrictive Windows Filtering Platform filter has blocked a packet.Security
5152The Windows Filtering Platform blocked a packet.Security
5153A more restrictive Windows Filtering Platform filter has blocked a packet.Security
5154The Windows Filtering Platform has permitted an application or service to listen …Security
5155The Windows Filtering Platform has blocked an application or service from …Security
5156The Windows Filtering Platform has permitted a connection.Security
5157The Windows Filtering Platform has blocked a connection.Security
5158The Windows Filtering Platform has permitted a bind to a local port.Security
5159The Windows Filtering Platform has blocked a bind to a local port.Security
5160The Windows Filtering Platform Audit Mode has allowed a connection or packet …Security
5168SPN check for SMB/SMB2 fails.Security
5169A directory service object was modified.Security
5170A directory service object was modified during a background cleanup task.Security
5376Credential Manager credentials were backed up.Security
5377Credential Manager credentials were restored from a backup.Security
5378The requested credentials delegation was disallowed by policy.Security
5379Credential Manager credentials were read.Security
5380Vault Find Credential.Security
5381Vault credentials were read.Security
5382Vault credentials were read.Security
5440The following callout was present when the Windows Filtering Platform Base …Security
5441The following filter was present when the Windows Filtering Platform Base …Security
5442The following provider was present when the Windows Filtering Platform Base …Security
5443The following provider context was present when the Windows Filtering Platform …Security
5444The following sub-layer was present when the Windows Filtering Platform Base …Security
5446A Windows Filtering Platform callout has been changed.Security
5447A Windows Filtering Platform filter has been changed.Security
5448A Windows Filtering Platform provider has been changed.Security
5449A Windows Filtering Platform provider context has been changed.Security
5450A Windows Filtering Platform sub-layer has been changed.Security
5451An IPsec quick mode security association was established.Security
5452An IPsec quick mode security association ended.Security
5453An IPsec negotiation with a remote computer failed because the IKE and AuthIP …Security
5456PAStore Engine applied Active Directory storage IPsec policy on the computer.Security
5457PAStore Engine failed to apply Active Directory storage IPsec policy on the …Security
5458PAStore Engine applied locally cached copy of Active Directory storage IPsec …Security
5459PAStore Engine failed to apply locally cached copy of Active Directory storage …Security
5460PAStore Engine applied local registry storage IPsec policy on the computer.Security
5461PAStore Engine failed to apply local registry storage IPsec policy on the …Security
5462PAStore Engine failed to apply some rules of the active IPsec policy on the …Security
5463PAStore Engine polled for changes to the active IPsec policy and detected no …Security
5464PAStore Engine polled for changes to the active IPsec policy, detected changes, …Security
5465PAStore Engine received a control for forced reloading of IPsec policy and …Security
5466PAStore Engine polled for changes to the Active Directory IPsec policy, …Security
5467PAStore Engine polled for changes to the Active Directory IPsec policy, …Security
5468PAStore Engine polled for changes to the Active Directory IPsec policy, …Security
5471PAStore Engine loaded local storage IPsec policy on the computer.Security
5472PAStore Engine failed to load local storage IPsec policy on the computer.Security
5473PAStore Engine loaded directory storage IPsec policy on the computer.Security
5474PAStore Engine failed to load directory storage IPsec policy on the computer.Security
5477PAStore Engine failed to add quick mode filter.Security
5478IPsec Services has started successfully.Security
5479IPsec Services has been shut down successfully.Security
5480IPsec Services failed to get the complete list of network interfaces on the …Security
5483IPsec Services failed to initialize RPC server.Security
5484IPsec Services has experienced a critical failure and has been shut down.Security
5485IPsec Services failed to process some IPsec filters on a plug-and-play event for …Security
5632A request was made to authenticate to a wireless network.Security
5633A request was made to authenticate to a wired network.Security
5712A Remote Procedure Call (RPC) was attempted.Security
5888An object in the COM+ Catalog was modified.Security
5889An object was deleted from the COM+ Catalog.Security
5890An object was added to the COM+ Catalog.Security
6144Security policy in the group policy objects has been applied successfully.Security
6145One or more errors occured while processing security policy in the group policy …Security
6272Network Policy Server granted access to a user.Security
6273Network Policy Server denied access to a user.Security
6274Network Policy Server discarded the request for a user.Security
6275Network Policy Server discarded the accounting request for a user.Security
6276Network Policy Server quarantined a user.Security
6277Network Policy Server granted access to a user but put it on probation because …Security
6278Network Policy Server granted full access to a user because the host met the …Security
6279Network Policy Server locked the user account due to repeated failed …Security
6280Network Policy Server unlocked the user account.Security
6281Code Integrity determined that the page hashes of an image file are not valid.Security
6400BranchCache: Received an incorrectly formatted response while discovering …Security
6401BranchCache: Received invalid data from a peer.Security
6402BranchCache: The message to the hosted cache offering it data is incorrectly …Security
6403BranchCache: The hosted cache sent an incorrectly formatted response to the …Security
6404BranchCache: Hosted cache could not be authenticated using the provisioned SSL …Security
6405BranchCache: %2 instance(s) of event id %1 occurred.Security
6406%1 registered to Windows Firewall to control filtering for the following: %2.Security
6407Firewall category unregistered: %1Security
6408Registered product %1 failed and Windows Firewall is now controlling the …Security
6409BranchCache: A service connection point object could not be parsed.Security
6410Code integrity determined that a file does not meet the security requirements to …Security
6416A new external device was recognized by the system.Security
6417The FIPS mode crypto selftests succeeded.Security
6418The FIPS mode crypto selftests failed.Security
6419A request was made to disable a device.Security
6420A device was disabled.Security
6421A request was made to enable a device.Security
6422A device was enabled.Security
6423The installation of this device is forbidden by system policy.Security
6424The installation of this device was allowed, after having previously been …Security
6425A network client used a legacy RPC method to modify authentication information …Security
6426The volatile system access rights assigned to an account were modified.Security
6427System access right details for a successful logon.Security
6428System access right details for a failed logon that was explicitly denied.Security
6429System access right details for a failed logon that was implicitly denied.Security
6430A Windows Firewall policy was imported.Security
8191Highest System-Defined Audit Message Value.Security

Event ID 4608 — Windows is starting up.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Windows is starting up.

This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4608
  version: 0
  level: 0
  task: 12288
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:27.349587+00:00'
  event_record_id: 2754
  correlation: {}
  execution:
    process_id: 808
    thread_id: 812
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data: {}
message: ''

References

Event ID 4609 — Windows is shutting down.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows is shutting down.
All logon sessions will be terminated by this shutdown.

References

Event ID 4610 — An authentication package has been loaded by the Local Security Authority.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An authentication package has been loaded by the Local Security Authority.
This authentication package will be used to authenticate logon attempts.

Authentication Package Name:	%1

Fields

NameDescription
AuthenticationPackageName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4610
  version: 0
  level: 0
  task: 12289
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:13.483248+00:00'
  event_record_id: 25342
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 616
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  AuthenticationPackageName: 'C:\Windows\system32\msv1_0.DLL : MICROSOFT_AUTHENTICATION_PACKAGE_V1_0'
message: ''

References

Event ID 4611 — A trusted logon process has been registered with the Local Security Authority.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A trusted logon process has been registered with the Local Security Authority.
This logon process will be trusted to submit logon requests.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Logon Process Name:		%5

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
LogonProcessName[Subject] Logon Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4611
  version: 0
  level: 0
  task: 12289
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:50:33.878854+00:00'
  event_record_id: 31791
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 3232
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WIN-TKC15D7KHUR$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  LogonProcessName: UserManager
message: ''

Community Notes

May be seen when a process injects into LSASS.

Sigma Rules

References

Event ID 4612 — Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.

Number of audit messages discarded:	%1

This event is generated when audit queues are filled and events must be discarded.  This most commonly occurs when security events are being generated faster than they are being written to disk, or when the auditing system loses connectivity to the event log, such as when the event log service is stopped.

Fields

NameDescription
AuditsDiscarded

References

Event ID 4614 — A notification package has been loaded by the Security Account Manager.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A notification package has been loaded by the Security Account Manager.
This package will be notified of any account or password changes.

Notification Package Name:	%1

Fields

NameDescription
NotificationPackageName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4614
  version: 0
  level: 0
  task: 12289
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:13.532261+00:00'
  event_record_id: 25349
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 616
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  NotificationPackageName: scecli
message: ''

References

Event ID 4615 — Invalid use of LPC port.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Invalid use of LPC port.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Process Information:
	PID:			%7
	Name:			%8

Invalid Use:		%5

LPC Server Port Name:	%6

Windows Local Security Authority (LSA) communicates with the Windows kernel using Local Procedure Call (LPC) ports. If you see this event, an application has inadvertently or intentionally accessed this port which is reserved exclusively for LSA's use. The application (process) should be investigated to ensure that it is not attempting to tamper with this communications channel.

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Invalid_Use[Process Information] Invalid Use.
LPC_Server_Port_Name[Process Information] LPC Server Port Name.
PID[Process Information] PID.
Name[Process Information] Name.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
InvalidCallName
ServerPortName
ProcessId
ProcessName

References

Event ID 4616 — The system time was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The system time was changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Process Information:
	Process ID:	%9
	Name:		%10

Previous Time:		%6 %5
New Time:		%8 %7

This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PreviousTime[Process Information] Previous Time.
NewTime[Process Information] New Time.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4616
  version: 1
  level: 0
  task: 12288
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T22:32:22.236565+00:00'
  event_record_id: 3458
  correlation: {}
  execution:
    process_id: 4
    thread_id: 52
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PreviousTime: '2023-11-05T22:32:20.942615Z'
  NewTime: '2023-11-05T22:32:22.232000Z'
  ProcessId: '0xcec'
  ProcessName: C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
message: ''

Sigma Rules

References

Event ID 4618 — A monitored security event pattern has occurred.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A monitored security event pattern has occurred.

Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6

Alert Information:
	Computer:		%2
	Event ID:		%1
	Number of Events:	%7
	Duration:		%8

This event is generated when Windows is configured to generate alerts in accordance with the Common Criteria Security Audit Analysis requirements (FAU_SAA) and an auditable event pattern occurs.

Fields

NameDescription
EventId
ComputerName
TargetUserSid
TargetUserName
TargetUserDomain
TargetLogonId
EventCount
Duration

References

Event ID 4621 — Administrator recovered system from CrashOnAuditFail.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded.

Value of CrashOnAuditFail:	%1

This event is logged after a system reboots following CrashOnAuditFail.

Fields

NameDescription
CrashOnAuditFailValue

References

Event ID 4622 — A security package has been loaded by the Local Security Authority.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A security package has been loaded by the Local Security Authority.

Security Package Name:	%1

Fields

NameDescription
SecurityPackageName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4622
  version: 0
  level: 0
  task: 12289
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:13.482782+00:00'
  event_record_id: 25341
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 616
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  SecurityPackageName: 'C:\Windows\system32\schannel.DLL : Microsoft Unified Security
    Protocol Provider'
message: ''

References

Event ID 4624 — An account was successfully logged on.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An account was successfully logged on.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Logon Type:			%9

New Logon:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8
	Logon GUID:		%13

Process Information:
	Process ID:		%17
	Process Name:		%18

Network Information:
	Workstation Name:	%12
	Source Network Address:	%19
	Source Port:		%20

Detailed Authentication Information:
	Logon Process:		%10
	Authentication Package:	%11
	Transited Services:	%14
	Package Name (NTLM only):	%15
	Key Length:		%16

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

Fields

NameDescription
SubjectUserSid[Subject] Security ID. Indicates the account on the local system which requested the logon.
SubjectUserName[Subject] Account Name. Indicates the account on the local system which requested the logon.
SubjectDomainName[Subject] Account Domain. Indicates the account on the local system which requested the logon.
SubjectLogonId[Subject] Logon ID. Indicates the account on the local system which requested the logon.
TargetUserSid[New Logon] Security ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetUserName[New Logon] Account Name. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetDomainName[New Logon] Account Domain. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetLogonId[New Logon] Logon ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
LogonType[Logon Information] Logon Type. Indicates the kind of logon that occurred.
LogonProcessName[Detailed Authentication Information] Logon Process. Provides detailed information about this specific logon request.
AuthenticationPackageName[Detailed Authentication Information] Authentication Package. Provides detailed information about this specific logon request.
WorkstationName[Network Information] Workstation Name. Indicates where a remote logon request originated.
LogonGuid[New Logon] Logon GUID. Is a unique identifier that can be used to correlate this event with a KDC event.
TransmittedServices[Detailed Authentication Information] Transited Services. Indicate which intermediate services have participated in this logon request.
LmPackageName[Detailed Authentication Information] Package Name (NTLM only). Indicates which sub-protocol was used among the NTLM protocols.
KeyLength[Detailed Authentication Information] Key Length. Indicates the length of the generated session key. This will be 0 if no session key was requested.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.
IpAddress[Network Information] Source Network Address. Indicates where a remote logon request originated.
IpPort[Network Information] Source Port. Indicates where a remote logon request originated.
ImpersonationLevel[Logon Information] Impersonation Level. Indicates the extent to which a process in the logon session can impersonate.
RestrictedAdminMode[Logon Information] Restricted Admin Mode.
RemoteCredentialGuard[Logon Information] Remote Credential Guard.
TargetOutboundUserName[New Logon] Network Account Name. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetOutboundDomainName[New Logon] Network Account Domain. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
VirtualAccount[Logon Information] Virtual Account.
TargetLinkedLogonId[New Logon] Linked Logon ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
ElevatedToken[Logon Information] Elevated Token.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4624
  version: 3
  level: 0
  task: 12544
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:52.440978+00:00'
  event_record_id: 2948
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  TargetUserSid: S-1-5-18
  TargetUserName: SYSTEM
  TargetDomainName: NT AUTHORITY
  TargetLogonId: '0x3e7'
  LogonType: 5
  LogonProcessName: 'Advapi  '
  AuthenticationPackageName: Negotiate
  WorkstationName: '-'
  LogonGuid: 00000000-0000-0000-0000-000000000000
  TransmittedServices: '-'
  LmPackageName: '-'
  KeyLength: 0
  ProcessId: '0x30c'
  ProcessName: C:\Windows\System32\services.exe
  IpAddress: '-'
  IpPort: '-'
  ImpersonationLevel: '%%1833'
  RestrictedAdminMode: '-'
  RemoteCredentialGuard: '-'
  TargetOutboundUserName: '-'
  TargetOutboundDomainName: '-'
  VirtualAccount: '%%1843'
  TargetLinkedLogonId: '0x0'
  ElevatedToken: '%%1842'
message: ''

Community Notes

  • LogonType 3 (Network) from localhost (127.0.0.1) may indicate service account activity or local COM activation rather than a true remote logon.
  • LogonType 3 and 10 are indicators of remote access
  • LogonType 3 and LogonProcess “NtLmSsp” may indicate an NTLM relay attack (correlate source IP with Event ID 8004 to find mismatches, check for Anonymous Logon user)
  • LogonType 9 and Logon Process “seclogo” are common indicators of Pass-the-Hash
LogonTypeDescription
2Console/Interactive (most commonly occurs when a user physically signs in, but may also be seen with a server KVM or VNC)
3Network (ex: a user accesses a file share, a vuln scanner auths to perform checks, an admin is remotely using PS, or an attacker uses PsExec to run a payload on a remote system)
4Batch (Scheduled Tasks): non-interactive
5Windows Services: non-interactive
7Screen Lock/Unlock (can include RDP unlock/reconnect)
8Network (Cleartext Logon). May indicate a downgrade attack or older admin tool
9Alternate Credentials Specified (The caller cloned its current token and specified new credentials for outbound connections. RunAs with /netonly flag, CreateProcessWithLogonW using the LOGON_NETCREDENTIALS_ONLY flag, or LogonUserW with LOGON32_LOGON_NEW_CREDENTIALS)
10Remote Interactive (RDP: a user logged on to this computer remotely using Terminal Services or Remote Desktop)
11Cached Credentials (e.g. Offline DC: a user physically logged on to the computer and the computer used domain credentials stored locally for authentication)
12Cached Remote Interactive (RDP, similar to Type 10). Now also seen more often when Microsoft Live accounts are used for auth on standalone workstations
13Cached Unlock (Similar to Type 7)

Sigma Rules

Showing 5 of 14 matching Sigma rules.

References

Event ID 4625 — An account failed to log on.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An account failed to log on.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Logon Type:			%11

Account For Which Logon Failed:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7

Failure Information:
	Failure Reason:		%9
	Status:			%8
	Sub Status:		%10

Process Information:
	Caller Process ID:	%18
	Caller Process Name:	%19

Network Information:
	Workstation Name:	%14
	Source Network Address:	%20
	Source Port:		%21

Detailed Authentication Information:
	Logon Process:		%12
	Authentication Package:	%13
	Transited Services:	%15
	Package Name (NTLM only):	%16
	Key Length:		%17

This event is generated when a logon request fails. It is generated on the computer where access was attempted.

The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).

The Process Information fields indicate which account and process on the system requested the logon.

The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

Fields

NameDescription
Security_ID[Subject] Security ID. Indicates the account on the local system which requested the logon.
Account_Name[Subject] Account Name. Indicates the account on the local system which requested the logon.
Account_Domain[Subject] Account Domain. Indicates the account on the local system which requested the logon.
Logon_ID[Subject] Logon ID. Indicates the account on the local system which requested the logon.
Security_ID[Account For Which Logon Failed] Security ID.
Account_Name[Account For Which Logon Failed] Account Name.
Account_Domain[Account For Which Logon Failed] Account Domain.
Status[Failure Information] Status.
Failure_Reason[Failure Information] Failure Reason.
Sub_Status[Failure Information] Sub Status.
Logon_Type[Subject] Logon Type. Indicates the account on the local system which requested the logon.
Logon_Process[Detailed Authentication Information] Logon Process. Provides detailed information about this specific logon request.
Authentication_Package[Detailed Authentication Information] Authentication Package. Provides detailed information about this specific logon request.
Workstation_Name[Network Information] Workstation Name. Indicates where a remote logon request originated.
Transited_Services[Detailed Authentication Information] Transited Services. Indicate which intermediate services have participated in this logon request.
Package_Name_NTLM_only[Detailed Authentication Information] Package Name (NTLM only). Indicates which sub-protocol was used among the NTLM protocols.
Key_Length[Detailed Authentication Information] Key Length. Indicates the length of the generated session key. This will be 0 if no session key was requested.
Caller_Process_ID[Process Information] Caller Process ID. Indicates which account and process on the system requested the logon.
Caller_Process_Name[Process Information] Caller Process Name. Indicates which account and process on the system requested the logon.
Source_Network_Address[Network Information] Source Network Address. Indicates where a remote logon request originated.
Source_Port[Network Information] Source Port. Indicates where a remote logon request originated.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4625
  version: 0
  level: 0
  task: 12544
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2016-09-19T16:50:06.477878Z'
  event_record_id: 2455
  correlation:
    '#attributes':
      ActivityID: B864D168-0B7B-0000-89D1-64B87B0BD201
  execution:
    process_id: 752
    thread_id: 4068
  channel: Security
  computer: DESKTOP-M5SN04R
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-0-0
  SubjectUserName: '-'
  SubjectDomainName: '-'
  SubjectLogonId: '0x0'
  TargetUserSid: S-1-0-0
  TargetUserName: JcDfcZTc
  TargetDomainName: .
  Status: '0xc000006d'
  FailureReason: '%%2313'
  SubStatus: '0xc0000064'
  LogonType: 3
  LogonProcessName: 'NtLmSsp '
  AuthenticationPackageName: NTLM
  WorkstationName: 6hgtmVlrrFuWtO65
  TransmittedServices: '-'
  LmPackageName: '-'
  KeyLength: 0
  ProcessId: '0x0'
  ProcessName: '-'
  IpAddress: 192.168.198.149
  IpPort: '50249'

Community Notes

Logon Error CodeDescription
0x6Invalid/non-existent user account. This can also be caused by replication issues between Active Directory servers.
0x7Requested server not found. This can also be caused by replication issues between Active Directory servers.
0xCPolicy restriction prohibited logon; client system restricted from accessing resource or restricted based on time/date.
0x12Account locked, disabled, or expired.
0x17Expired password.
0x18Invalid password.
0x25Clock values between server and client are skewed too greatly; Kerberos relies on a timing system to invalidate old TGTs.
0xC0000064Non-existent account username
0xC000006AIncorrect password (username correct)
0xC000006FAccount not allowed to log on at this time
0xC0000070Account not allowed to log on from this computer
0xC0000071Expired password
0xC0000072Disabled account
0xC0000193Expired account
0xC0000234Account locked

Sigma Rules

References

Event ID 4626 — User / Device claims information.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

User / Device claims information.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Logon Type:			%9

New Logon:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Event in sequence:		%10 of %11

User Claims:			%12

Device Claims:			%13

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

This event is generated when the Audit User/Device claims subcategory is configured and the user?s logon token contains user/device claims information. The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
LogonType
EventIdx
EventCountTotal
UserClaims
DeviceClaims

References

Event ID 4627 — Group membership information.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Group membership information.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Logon Type:			%9

New Logon:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Event in sequence:		%10 of %11

Group Membership:			%12

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

This event is generated when the Audit Group Membership subcategory is configured.  The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.

Fields

NameDescription
SubjectUserSid[Subject] Security ID. Indicates the account on the local system which requested the logon.
SubjectUserName[Subject] Account Name. Indicates the account on the local system which requested the logon.
SubjectDomainName[Subject] Account Domain. Indicates the account on the local system which requested the logon.
SubjectLogonId[Subject] Logon ID. Indicates the account on the local system which requested the logon.
TargetUserSid[New Logon] Security ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetUserName[New Logon] Account Name. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetDomainName[New Logon] Account Domain. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetLogonId[New Logon] Logon ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
LogonType[Subject] Logon Type. Indicates the account on the local system which requested the logon.
EventIdx[New Logon] Event in sequence. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
EventCountTotal
GroupMembership[New Logon] Group Membership. Indicates the account for whom the new logon was created, i.e. the account that was logged on.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4627
  version: 0
  level: 0
  task: 12554
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T02:00:32.200180+00:00'
  event_record_id: 310791
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 16720
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  TargetUserSid: S-1-5-18
  TargetUserName: SYSTEM
  TargetDomainName: NT AUTHORITY
  TargetLogonId: '0x3e7'
  LogonType: 5
  EventIdx: 1
  EventCountTotal: 1
  GroupMembership: "\r\n\t\t%{S-1-5-32-544}\r\n\t\t%{S-1-1-0}\r\n\t\t%{S-1-5-11}\r\n\t\t%{S-1-16-16384}"
message: ''

Community Notes

Shows the full AD group list for every successful logon (useful to detect changes in privileges).

References

Event ID 4634 — An account was logged off.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An account was logged off.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Logon Type:			%5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.

Fields

NameDescription
TargetUserSid[Subject] Security ID.
TargetUserName[Subject] Account Name.
TargetDomainName[Subject] Account Domain.
TargetLogonId[Subject] Logon ID.
LogonType[Subject] Logon Type.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4634
  version: 0
  level: 0
  task: 12545
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-10-25T22:56:14.242850+00:00'
  event_record_id: 2692
  correlation: {}
  execution:
    process_id: 824
    thread_id: 880
  channel: Security
  computer: WinDevEval
  security:
    user_id: ''
event_data:
  TargetUserSid: S-1-5-111-3847866527-469524349-687026318-516638107-1125189541-4560
  TargetUserName: sshd_4560
  TargetDomainName: VIRTUAL USERS
  TargetLogonId: '0x41a49'
  LogonType: 5
message: ''

Sigma Rules

  • User Logoff Event
    Detects a user log-off activity. Could be used for example to correlate information during forensic investigations

References

Event ID 4646 — %1

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

%1

Fields

NameDescription
notification

References

Event ID 4647 — User initiated logoff:

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

User initiated logoff:

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.

Fields

NameDescription
TargetUserSid[Subject] Security ID.
TargetUserName[Subject] Account Name.
TargetDomainName[Subject] Account Domain.
TargetLogonId[Subject] Logon ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4647
  version: 0
  level: 0
  task: 12545
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T22:31:33.526113+00:00'
  event_record_id: 3363
  correlation:
    ActivityID: 59A0D65F-1037-0001-A7D6-A0593710DA01
  execution:
    process_id: 808
    thread_id: 8392
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  TargetUserName: User
  TargetDomainName: WINDEV2310EVAL
  TargetLogonId: '0x580c6'
message: ''

Sigma Rules

  • User Logoff Event
    Detects a user log-off activity. Could be used for example to correlate information during forensic investigations

References

Event ID 4648 — A logon was attempted using explicit credentials.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A logon was attempted using explicit credentials.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4
	Logon GUID:		%5

Account Whose Credentials Were Used:
	Account Name:		%6
	Account Domain:		%7
	Logon GUID:		%8

Target Server:
	Target Server Name:	%9
	Additional Information:	%10

Process Information:
	Process ID:		%11
	Process Name:		%12

Network Information:
	Network Address:	%13
	Port:			%14

This event is generated when a process attempts to log on an account by explicitly specifying that account?s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
LogonGuid[Subject] Logon GUID.
TargetUserName[Account Whose Credentials Were Used] Account Name.
TargetDomainName[Account Whose Credentials Were Used] Account Domain.
TargetLogonGuid[Account Whose Credentials Were Used] Logon GUID.
TargetServerName[Target Server] Target Server Name.
TargetInfo[Target Server] Additional Information.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.
IpAddress[Network Information] Network Address.
IpPort[Network Information] Port.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4648
  version: 0
  level: 0
  task: 12544
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:29.161457+00:00'
  event_record_id: 2767
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  LogonGuid: 00000000-0000-0000-0000-000000000000
  TargetUserName: DWM-1
  TargetDomainName: Window Manager
  TargetLogonGuid: 00000000-0000-0000-0000-000000000000
  TargetServerName: localhost
  TargetInfo: localhost
  ProcessId: '0x2e0'
  ProcessName: C:\Windows\System32\winlogon.exe
  IpAddress: '-'
  IpPort: '-'
message: ''

Community Notes

Logon with explicit credentials (RunAs, SchTasks, Pass-the-Hash, WinRM, SMB). May appear when an NTLM relayed session is used to create a service/task. Useful with 4624 (successful logon)/4634 (logoff completed) for reconstructing interactive or service logons.

Sigma Rules

References

Event ID 4649 — A replay attack was detected.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A replay attack was detected.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Credentials Which Were Replayed:
	Account Name:		%5
	Account Domain:		%6

Process Information:
	Process ID:		%12
	Process Name:		%13

Network Information:
	Workstation Name:	%10

Detailed Authentication Information:
	Request Type:		%7
	Logon Process:		%8
	Authentication Package:	%9
	Transited Services:	%11

This event indicates that a Kerberos replay attack was detected- a request was received twice with identical information. This condition could be caused by network misconfiguration.

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Account_Name[Credentials Which Were Replayed] Account Name.
Account_Domain[Credentials Which Were Replayed] Account Domain.
Request_Type[Detailed Authentication Information] Request Type.
Logon_Process[Detailed Authentication Information] Logon Process.
Authentication_Package[Detailed Authentication Information] Authentication Package.
Workstation_Name[Network Information] Workstation Name.
Transited_Services[Detailed Authentication Information] Transited Services.
Process_ID[Process Information] Process ID.
Process_Name[Process Information] Process Name.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetUserName
TargetDomainName
RequestType
LogonProcessName
AuthenticationPackage
WorkstationName
TransmittedServices
ProcessId
ProcessName

Community Notes

Alerts when a copied ticket is reused.

Sigma Rules

  • Replay Attack Detected
    Detects possible Kerberos Replay Attack on the domain controllers when "KRB_AP_ERR_REPEAT" Kerberos response is sent to the client

References

Event ID 4650 — An IPsec main mode security association was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec main mode security association was established. Extended mode was not enabled.  Certificate authentication was not used.

Local Endpoint:
	Principal Name:	%1
	Network Address:	%3
	Keying Module Port:	%4

Remote Endpoint:
	Principal Name:	%2
	Network Address:	%5
	Keying Module Port:	%6

Security Association Information:
	Lifetime (minutes):	%12
	Quick Mode Limit:	%13
	Main Mode SA ID:	%17

Cryptographic Information:
	Cipher Algorithm:	%9
	Integrity Algorithm:	%10
	Diffie-Hellman Group:	%11

Additional Information:
	Keying Module Name:	%7
	Authentication Method:	%8
	Role:	%14
	Impersonation State:	%15
	Main Mode Filter ID:	%16

Fields

NameDescription
Principal_Name[Local Endpoint] Principal Name.
Principal_Name[Remote Endpoint] Principal Name.
Network_Address[Local Endpoint] Network Address.
Keying_Module_Port[Local Endpoint] Keying Module Port.
Network_Address[Remote Endpoint] Network Address.
Keying_Module_Port[Remote Endpoint] Keying Module Port.
Keying_Module_Name[Additional Information] Keying Module Name.
Authentication_Method[Additional Information] Authentication Method.
Cipher_Algorithm[Cryptographic Information] Cipher Algorithm.
Integrity_Algorithm[Cryptographic Information] Integrity Algorithm.
DiffieHellman_Group[Cryptographic Information] Diffie-Hellman Group.
Lifetime_minutes[Security Association Information] Lifetime (minutes).
Quick_Mode_Limit[Security Association Information] Quick Mode Limit.
Role[Additional Information] Role.
Impersonation_State[Additional Information] Impersonation State.
Main_Mode_Filter_ID[Additional Information] Main Mode Filter ID.
Main_Mode_SA_ID[Security Association Information] Main Mode SA ID.
LocalMMPrincipalName
RemoteMMPrincipalName
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
KeyModName
MMAuthMethod
MMCipherAlg
MMIntegrityAlg
DHGroup
MMLifetime
QMLimit
MMImpersonationState
MMFilterID
MMSAID

References

Event ID 4651 — An IPsec main mode security association was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec main mode security association was established. Extended mode was not enabled.  A certificate was used for authentication.

Local Endpoint:
	Principal Name:	%1
	Network Address:	%9
	Keying Module Port:	%10

Local Certificate:
	SHA Thumbprint:	%2
	Issuing CA:		%3
	Root CA:		%4

Remote Endpoint:
	Principal Name:	%5
	Network Address:	%11
	Keying Module Port:	%12

Remote Certificate:
	SHA thumbprint: 	%6
	Issuing CA:		%7
	Root CA:		%8

Cryptographic Information:
	Cipher Algorithm:	%15
	Integrity Algorithm:	%16
	Diffie-Hellman Group:	%17

Security Association Information:
	Lifetime (minutes):	%18
	Quick Mode Limit:	%19
	Main Mode SA ID:	%23

Additional Information:
	Keying Module Name:	%13
	Authentication Method:	%14
	Role:	%20
	Impersonation State:	%21
	Main Mode Filter ID:	%22

Fields

NameDescription
Principal_Name[Local Endpoint] Principal Name.
SHA_Thumbprint[Local Certificate] SHA Thumbprint.
Issuing_CA[Local Certificate] Issuing CA.
Root_CA[Local Certificate] Root CA.
Principal_Name[Remote Endpoint] Principal Name.
SHA_thumbprint[Remote Certificate] SHA thumbprint.
Issuing_CA[Remote Certificate] Issuing CA.
Root_CA[Remote Certificate] Root CA.
Network_Address[Local Endpoint] Network Address.
Keying_Module_Port[Local Endpoint] Keying Module Port.
Network_Address[Remote Endpoint] Network Address.
Keying_Module_Port[Remote Endpoint] Keying Module Port.
Keying_Module_Name[Additional Information] Keying Module Name.
Authentication_Method[Additional Information] Authentication Method.
Cipher_Algorithm[Cryptographic Information] Cipher Algorithm.
Integrity_Algorithm[Cryptographic Information] Integrity Algorithm.
DiffieHellman_Group[Cryptographic Information] Diffie-Hellman Group.
Lifetime_minutes[Security Association Information] Lifetime (minutes).
Quick_Mode_Limit[Security Association Information] Quick Mode Limit.
Role[Additional Information] Role.
Impersonation_State[Additional Information] Impersonation State.
Main_Mode_Filter_ID[Additional Information] Main Mode Filter ID.
Main_Mode_SA_ID[Security Association Information] Main Mode SA ID.
LocalMMPrincipalName
LocalMMCertHash
LocalMMIssuingCA
LocalMMRootCA
RemoteMMPrincipalName
RemoteMMCertHash
RemoteMMIssuingCA
RemoteMMRootCA
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
KeyModName
MMAuthMethod
MMCipherAlg
MMIntegrityAlg
DHGroup
MMLifetime
QMLimit
MMImpersonationState
MMFilterID
MMSAID

References

Event ID 4652 — An IPsec main mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec main mode negotiation failed.


Local Endpoint:
	Principal Name:		%1
	Network Address:	%9
	Keying Module Port:	%10

Local Certificate:
	SHA Thumbprint:	%2
	Issuing CA:		%3
	Root CA:		%4

Remote Endpoint:
	Principal Name:		%5
	Network Address:	%11
	Keying Module Port:	%12

Remote Certificate:
	SHA thumbprint:		%6
	Issuing CA:		%7
	Root CA:		%8

Additional Information:
	Keying Module Name:	%13
	Authentication Method:	%16
	Role:			%18
	Impersonation State:	%19
	Main Mode Filter ID:	%20

Failure Information:
	Failure Point:		%14
	Failure Reason:		%15
	State:			%17
	Initiator Cookie:		%21
	Responder Cookie:	%22

Fields

NameDescription
Principal_Name[Local Endpoint] Principal Name.
SHA_Thumbprint[Local Certificate] SHA Thumbprint.
Issuing_CA[Local Certificate] Issuing CA.
Root_CA[Local Certificate] Root CA.
Principal_Name[Remote Endpoint] Principal Name.
SHA_thumbprint[Remote Certificate] SHA thumbprint.
Issuing_CA[Remote Certificate] Issuing CA.
Root_CA[Remote Certificate] Root CA.
Network_Address[Local Endpoint] Network Address.
Keying_Module_Port[Local Endpoint] Keying Module Port.
Network_Address[Remote Endpoint] Network Address.
Keying_Module_Port[Remote Endpoint] Keying Module Port.
Keying_Module_Name[Additional Information] Keying Module Name.
Failure_Point[Failure Information] Failure Point.
Failure_Reason[Failure Information] Failure Reason.
Authentication_Method[Additional Information] Authentication Method.
State[Failure Information] State.
Role[Additional Information] Role.
Impersonation_State[Additional Information] Impersonation State.
Main_Mode_Filter_ID[Additional Information] Main Mode Filter ID.
Initiator_Cookie[Failure Information] Initiator Cookie.
Responder_Cookie[Failure Information] Responder Cookie.
LocalMMPrincipalName
LocalMMCertHash
LocalMMIssuingCA
LocalMMRootCA
RemoteMMPrincipalName
RemoteMMCertHash
RemoteMMIssuingCA
RemoteMMRootCA
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
KeyModName
FailurePoint
FailureReason
MMAuthMethod
MMImpersonationState
MMFilterID
InitiatorCookie
ResponderCookie

References

Event ID 4653 — An IPsec main mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec main mode negotiation failed.

Local Endpoint:
	Local Principal Name:	%1
	Network Address:	%3
	Keying Module Port:	%4

Remote Endpoint:
	Principal Name:		%2
	Network Address:	%5
	Keying Module Port:	%6

Additional Information:
	Keying Module Name:	%7
	Authentication Method:	%10
	Role:			%12
	Impersonation State:	%13
	Main Mode Filter ID:	%14

Failure Information:
	Failure Point:		%8
	Failure Reason:		%9
	State:			%11
	Initiator Cookie:		%15
	Responder Cookie:	%16

Fields

NameDescription
Local_Principal_Name[Local Endpoint] Local Principal Name.
Principal_Name[Remote Endpoint] Principal Name.
Network_Address[Local Endpoint] Network Address.
Keying_Module_Port[Local Endpoint] Keying Module Port.
Network_Address[Remote Endpoint] Network Address.
Keying_Module_Port[Remote Endpoint] Keying Module Port.
Keying_Module_Name[Additional Information] Keying Module Name.
Failure_Point[Failure Information] Failure Point.
Failure_Reason[Failure Information] Failure Reason.
Authentication_Method[Additional Information] Authentication Method.
State[Failure Information] State.
Role[Additional Information] Role.
Impersonation_State[Additional Information] Impersonation State.
Main_Mode_Filter_ID[Additional Information] Main Mode Filter ID.
Initiator_Cookie[Failure Information] Initiator Cookie.
Responder_Cookie[Failure Information] Responder Cookie.
LocalMMPrincipalName
RemoteMMPrincipalName
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
KeyModName
FailurePoint
FailureReason
MMAuthMethod
MMImpersonationState
MMFilterID
InitiatorCookie
ResponderCookie

References

Event ID 4654 — An IPsec quick mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec quick mode negotiation failed.

Local Endpoint:
	Network Address:	%1
	Network Address mask:	%2
	Port:			%3
	Tunnel Endpoint:		%4

Remote Endpoint:
	Network Address:	%5
	Address Mask:		%6
	Port:			%7
	Tunnel Endpoint:		%8
	Private Address:		%10

Additional Information:
	Protocol:		%9
	Keying Module Name:	%11
	Mode:			%14
	Role:			%16
	Quick Mode Filter ID:	%18
	Main Mode SA ID:	%19

Failure Information:
	State:			%15
	Message ID:		%17
	Failure Point:		%12
	Failure Reason:		%13

Fields

NameDescription
Network_Address[Local Endpoint] Network Address.
Network_Address_mask[Local Endpoint] Network Address mask.
Port[Local Endpoint] Port.
Tunnel_Endpoint[Local Endpoint] Tunnel Endpoint.
Network_Address[Remote Endpoint] Network Address.
Address_Mask[Remote Endpoint] Address Mask.
Port[Remote Endpoint] Port.
Tunnel_Endpoint[Remote Endpoint] Tunnel Endpoint.
Protocol[Additional Information] Protocol.
Private_Address[Remote Endpoint] Private Address.
Keying_Module_Name[Additional Information] Keying Module Name.
Failure_Point[Failure Information] Failure Point.
Failure_Reason[Failure Information] Failure Reason.
Mode[Additional Information] Mode.
State[Failure Information] State.
Role[Additional Information] Role.
Message_ID[Failure Information] Message ID.
Quick_Mode_Filter_ID[Additional Information] Quick Mode Filter ID.
Main_Mode_SA_ID[Additional Information] Main Mode SA ID.
LocalAddress
LocalAddressMask
LocalPort
LocalTunnelEndpoint
RemoteAddress
RemoteAddressMask
RemotePort
RemoteTunnelEndpoint
RemotePrivateAddress
KeyModName
FailurePoint
FailureReason
MessageID
QMFilterID
MMSAID
TunnelId
TrafficSelectorId

References

Event ID 4655 — An IPsec main mode security association ended.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec main mode security association ended.

Local Network Address:		%1
Remote Network Address:	%2
Keying Module Name:		%3
Main Mode SA ID:		%4

Fields

NameDescription
Local_Network_Address
Remote_Network_Address
Keying_Module_Name
Main_Mode_SA_ID
LocalAddress
RemoteAddress
KeyModName
MMSAID

References

Event ID 4656 — A handle to an object was requested.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A handle to an object was requested.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:		%5
	Object Type:		%6
	Object Name:		%7
	Handle ID:		%8

Process Information:
	Process ID:		%14
	Process Name:		%15

Access Request Information:
	Transaction ID:		%9
	Accesses:		%10
	Access Mask:		%11
	Privileges Used for Access Check:	%12
	Restricted SID Count:	%13

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Handle_ID[Object] Handle ID.
Transaction_ID[Access Request Information] Transaction ID.
Accesses[Access Request Information] Accesses.
Access_Mask[Access Request Information] Access Reasons.
PrivilegesUsedForAccessCheck
Restricted_SID_Count[Access Request Information] Privileges Used for Access Check.
Process_ID[Access Request Information] Restricted SID Count.
Process_Name[Process Information] Process ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4656
  version: 1
  level: 0
  task: 12802
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-03-08T22:11:34.340479Z'
  event_record_id: 314461
  correlation: {}
  execution:
    process_id: 4
    thread_id: 160
  channel: Security
  computer: MSEDGEWIN10
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-3461203602-4096304019-2269080069-1000
  SubjectUserName: IEUser
  SubjectDomainName: MSEDGEWIN10
  SubjectLogonId: '0x33392'
  ObjectServer: Security
  ObjectType: Process
  ObjectName: \Device\HarddiskVolume1\Windows\System32\lsass.exe
  HandleId: '0x558'
  TransactionId: 00000000-0000-0000-0000-000000000000
  AccessList: "%%1537\r\n\t\t\t\t%%1538\r\n\t\t\t\t%%1539\r\n\t\t\t\t%%1540\r\n\t\t\t\t%%1541\r\n\t\t\t\t%%4480\r\n\t\t\t\t%%4481\r\n\t\t\t\t%%4482\r\n\t\t\t\t%%4483\r\n\t\t\t\t%%4484\r\n\t\t\t\t%%4485\r\n\t\t\t\t%%4486\r\n\t\t\t\t%%4487\r\n\t\t\t\t%%4488\r\n\t\t\t\t%%4489\r\n\t\t\t\t%%4490\r\n\t\t\t\t%%4491\r\n\t\t\t\t%%4492\r\n\t\t\t\t%%4493\r\n\t\t\t\t"
  AccessReason: '-'
  AccessMask: '0x1f3fff'
  PrivilegeList: '-'
  RestrictedSidCount: 0
  ProcessId: '0x1688'
  ProcessName: C:\Windows\System32\cscript.exe
  ResourceAttributes: '-'

Community Notes

Combined with 4663, may reveal bulk reads of sensitive shares before data exfil.

Sigma Rules

  • Azure AD Health Monitoring Agent Registry Keys Access
    This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent. This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\SOFTWARE\Microsoft\Microsoft Online\Reporting\MonitoringAgent.
  • Azure AD Health Service Agents Registry Keys Access
    This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Azure AD Health service agents (e.g AD FS). Information from AD Health service agents can be used to potentially abuse some of the features provided by those services in the cloud (e.g. Federation). This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object: HKLM:\SOFTWARE\Microsoft\ADHealthAgent. Make sure you set the SACL to propagate to its sub-keys.
  • Processes Accessing the Microphone and Webcam
    Potential adversaries accessing the microphone and webcam in an endpoint.
  • LSASS Access From Non System Account
    Detects potential mimikatz-like tools accessing LSASS from non system account
  • WCE wceaux.dll Access
    Detects wceaux.dll access while WCE pass-the-hash remote command execution on source host

Showing 5 of 12 matching Sigma rules.

References

Event ID 4657 — A registry value was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A registry value was modified.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Name:		%5
	Object Value Name:	%6
	Handle ID:		%7
	Operation Type:		%8

Process Information:
	Process ID:		%13
	Process Name:		%14

Change Information:
	Old Value Type:		%9
	Old Value:		%10
	New Value Type:		%11
	New Value:		%12

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ObjectName[Object] Object Name.
ObjectValueName[Object] Object Value Name.
HandleId[Object] Handle ID.
OperationType[Object] Operation Type.
OldValueType[Change Information] Old Value Type.
OldValue[Change Information] Old Value.
NewValueType[Change Information] New Value Type.
NewValue[Change Information] New Value.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4657
  version: 0
  level: 0
  task: 12801
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:45:45.086232+00:00'
  event_record_id: 292511
  correlation: {}
  execution:
    process_id: 4
    thread_id: 12116
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ObjectName: \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E
  ObjectValueName: Blob
  HandleId: '0x1994'
  OperationType: '%%1905'
  OldValueType: '%%1875'
  OldValue: '%%1800'
  NewValueType: '%%1875'
  NewValue: '%%1800'
  ProcessId: '0x328'
  ProcessName: C:\Windows\System32\lsass.exe
message: ''

Community Notes

Requires AuditRegistry/SetValue SACL.

Sigma Rules

References

Event ID 4658 — The handle to an object was closed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The handle to an object was closed.

Subject :
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:		%5
	Handle ID:		%6

Process Information:
	Process ID:		%7
	Process Name:		%8

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Handle_ID[Object] Handle ID.
Process_ID[Process Information] Process ID.
Process_Name[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4658
  version: 0
  level: 0
  task: 12804
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2017-06-12T23:39:43.512986Z'
  event_record_id: 8076
  correlation: {}
  execution:
    process_id: 4
    thread_id: 252
  channel: Security
  computer: 2012r2srv.maincorp.local
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-2634088540-571122920-1382659128-500
  SubjectUserName: Administrator
  SubjectDomainName: MAINCORP
  SubjectLogonId: '0x432c8'
  ObjectServer: Security Account Manager
  HandleId: '0xc9774b43b0'
  ProcessId: '0x1f0'
  ProcessName: C:\Windows\System32\lsass.exe

Sigma Rules

References

Event ID 4659 — A handle to an object was requested with intent to delete.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A handle to an object was requested with intent to delete.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Handle ID:	%8

Process Information:
	Process ID:	%13

Access Request Information:
	Transaction ID:	%9
	Accesses:	%10
	Access Mask:	%11
	Privileges Used for Access Check:	%12

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectServer
ObjectType
ObjectName
HandleId
TransactionId
AccessList
AccessMask
PrivilegeList
ProcessId

References

Event ID 4660 — An object was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An object was deleted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Handle ID:	%6

Process Information:
	Process ID:	%7
	Process Name:	%8
	Transaction ID:	%9

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Handle_ID[Object] Handle ID.
Process_ID[Process Information] Process ID.
Process_Name[Process Information] Process Name.
Transaction_ID[Process Information] Transaction ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4660
  version: 0
  level: 0
  task: 12804
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-01-24T17:03:25.009874Z'
  event_record_id: 1934527
  correlation: {}
  execution:
    process_id: 4
    thread_id: 4488
  channel: Security
  computer: fs03vuln.offsec.lan
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x14f509e2'
  ObjectServer: Security Account Manager
  HandleId: '0xe9a9292e70'
  ProcessId: '0x1e0'
  ProcessName: C:\Windows\System32\lsass.exe
  TransactionId: 00000000-0000-0000-0000-000000000000

Community Notes

Could be a filesystem, kernel, or registry object. Does not track names, but is generated only during real deletes (pair with 4663).

References

Event ID 4661 — A handle to an object was requested.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A handle to an object was requested.

Subject :
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Handle ID:	%8

Process Information:
	Process ID:	%15
	Process Name:	%16

Access Request Information:
	Transaction ID:	%9
	Accesses:	%10
	Access Mask:	%11
	Privileges Used for Access Check:	%12
	Properties:	%13
	Restricted SID Count:	%14

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Handle_ID[Object] Handle ID.
Transaction_ID[Access Request Information] Transaction ID.
Accesses[Access Request Information] Accesses.
Access_Mask[Access Request Information] Access Reasons.
PrivilegesUsedForAccessCheck
Properties[Access Request Information] Privileges Used for Access Check.
Restricted_SID_Count[Access Request Information] Properties.
Process_ID[Access Request Information] Restricted SID Count.
Process_Name[Process Information] Process ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4661
  version: 0
  level: 0
  task: 12803
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-18T23:23:52.522462Z'
  event_record_id: 565602
  correlation: {}
  execution:
    process_id: 452
    thread_id: 460
  channel: Security
  computer: WIN-77LTAPHIQ1R.example.corp
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1587066498-1489273250-1035260531-1106
  SubjectUserName: user01
  SubjectDomainName: EXAMPLE
  SubjectLogonId: '0x15e1a7'
  ObjectServer: Security Account Manager
  ObjectType: SAM_DOMAIN
  ObjectName: DC=example,DC=corp
  HandleId: '0x14c7b1f20'
  TransactionId: 00000000-0000-0000-0000-000000000000
  AccessList: "%%1538\r\n\t\t\t\t%%5394\r\n\t\t\t\t%%5396\r\n\t\t\t\t%%5399\r\n\t\t\t\t"
  AccessMask: '0x2d'
  PrivilegeList: "\x94\x02-"
  Properties: "---\r\n\t{19195a5a-6da0-11d0-afd3-00c04fd930c9}\r\n%%1538\r\n%%5394\r\n%%5396\r\n%%5399\r\n\t\t{c7407360-20bf-11d0-a768-00aa006e0529}\r\n\t\t\t{bf9679a4-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679a5-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679a6-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679bb-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679c2-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679c3-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a09-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a0b-0de6-11d0-a285-00aa003049e2}\r\n\t\t{b8119fd0-04f6-4762-ab7a-4986c76b3f9a}\r\n\t\t\t{bf967a34-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a33-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679c5-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a61-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967977-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf96795e-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679ea-0de6-11d0-a285-00aa003049e2}\r\n\t\t{ab721a52-1e2f-11d0-9819-00aa0040529b}\r\n"
  RestrictedSidCount: 0
  ProcessId: '0x1c4'
  ProcessName: C:\Windows\System32\lsass.exe

Community Notes

May indicate BloodHound-style LDAP reads.

Sigma Rules

References

Event ID 4662 — An operation was performed on an object.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An operation was performed on an object.

Subject :
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:		%5
	Object Type:		%6
	Object Name:		%7
	Handle ID:		%9

Operation:
	Operation Type:		%8
	Accesses:		%10
	Access Mask:		%11
	Properties:		%12

Additional Information:
	Parameter 1:		%13
	Parameter 2:		%14

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Operation_Type[Operation] Operation Type.
Handle_ID[Object] Handle ID.
Accesses[Operation] Accesses.
Access_Mask[Operation] Access Mask.
Properties[Operation] Properties.
Parameter_1[Additional Information] Parameter 1.
Parameter_2[Additional Information] Parameter 2.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4662
  version: 0
  level: 0
  task: 14080
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-25T10:05:30.695604Z'
  event_record_id: 198238041
  correlation: {}
  execution:
    process_id: 444
    thread_id: 4200
  channel: Security
  computer: DC1.insecurebank.local
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: DC1$
  SubjectDomainName: insecurebank
  SubjectLogonId: '0xb3ac2'
  ObjectServer: DS
  ObjectType: '%{19195a5b-6da0-11d0-afd3-00c04fd930c9}'
  ObjectName: '%{c6faf700-bfe4-452a-a766-424f84c29583}'
  OperationType: Object Access
  HandleId: '0x0'
  AccessList: "%%7688\r\n\t\t\t\t"
  AccessMask: '0x100'
  Properties: "%%7688\r\n\t\t{1131f6aa-9c07-11d1-f79f-00c04fc2dcd2}\r\n\t{19195a5b-6da0-11d0-afd3-00c04fd930c9}\r\n"
  AdditionalInfo: '-'
  AdditionalInfo2: ''

Community Notes

Operation on AD object, may indicate enum of domain trusts, OUs, SPNs, ACLs. Also logged when an attacker uses mimikatz or similar to extract the DPAPI Domain Backup Key.

Sigma Rules

Showing 5 of 7 matching Sigma rules.

References

Event ID 4663 — An attempt was made to access an object.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to access an object.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Handle ID:	%8

Process Information:
	Process ID:	%11
	Process Name:	%12

Access Request Information:
	Accesses:	%9
	Access Mask:	%10

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ObjectServer[Object] Object Server.
ObjectType[Object] Object Type.
ObjectName[Object] Object Name.
HandleId[Object] Handle ID.
AccessList[Access Request Information] Accesses.
AccessMask[Access Request Information] Access Mask.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.
ResourceAttributes[Object] Resource Attributes.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4663
  version: 1
  level: 0
  task: 12802
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:55:26.055947+00:00'
  event_record_id: 304894
  correlation: {}
  execution:
    process_id: 4
    thread_id: 15220
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ObjectServer: Security
  ObjectType: Process
  ObjectName: \Device\HarddiskVolume4\Windows\System32\lsass.exe
  HandleId: '0x1978'
  AccessList: "%%4484\r\n\t\t\t\t"
  AccessMask: '0x10'
  ProcessId: '0x4a28'
  ProcessName: C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe
  ResourceAttributes: '-'
message: ''

Community Notes

An attempt was made to access an object. May catch mass permission changes or tampering. Also catches renaming, and may be noisy (pair with 4660).

Sigma Rules

  • Azure AD Health Monitoring Agent Registry Keys Access
    This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent. This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object HKLM\SOFTWARE\Microsoft\Microsoft Online\Reporting\MonitoringAgent.
  • Azure AD Health Service Agents Registry Keys Access
    This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Azure AD Health service agents (e.g AD FS). Information from AD Health service agents can be used to potentially abuse some of the features provided by those services in the cloud (e.g. Federation). This detection requires an access control entry (ACE) on the system access control list (SACL) of the following securable object: HKLM:\SOFTWARE\Microsoft\ADHealthAgent. Make sure you set the SACL to propagate to its sub-keys.
  • Processes Accessing the Microphone and Webcam
    Potential adversaries accessing the microphone and webcam in an endpoint.
  • ISO Image Mounted
    Detects the mount of an ISO image on an endpoint
  • LSASS Access From Non System Account
    Detects potential mimikatz-like tools accessing LSASS from non system account

Showing 5 of 14 matching Sigma rules.

References

Event ID 4664 — An attempt was made to create a hard link.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to create a hard link.

Subject:
	Account Name:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Link Information:
	File Name:	%5
	Link Name:	%6
	Transaction ID:	%7

Fields

NameDescription
SubjectUserSid[Subject] Account Name.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
FileName[Link Information] File Name.
LinkName[Link Information] Link Name.
TransactionId[Link Information] Transaction ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4664
  version: 0
  level: 0
  task: 12800
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:40:05.111192+00:00'
  event_record_id: 275147
  correlation: {}
  execution:
    process_id: 4
    thread_id: 8800
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  FileName: C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\zh-TW\Microsoft.UI.Xaml.Phone.dll.mui
  LinkName: C:\Program Files\WindowsApps\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x86__8wekyb3d8bbwe\zh-TW\Microsoft.UI.Xaml.Phone.dll.mui
  TransactionId: 00000000-0000-0000-0000-000000000000
message: ''

References

Event ID 4665 — An attempt was made to create an application client context.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An attempt was made to create an application client context.

Subject:
	Client Name:		%3
	Client Domain:		%4
	Client Context ID:	%5

Application Information:
	Application Name:	%1
	Application Instance ID:	%2

Status:	%6

Fields

NameDescription
Application_Name[Application Information] Application Name.
Application_Instance_ID[Application Information] Application Instance ID.
Client_Name[Subject] Client Name.
Client_Domain[Subject] Client Domain.
Client_Context_ID[Subject] Client Context ID.
Status[Application Information] Status.
AppName
AppInstance
ClientName
ClientDomain
ClientLogonId

References

Event ID 4666 — An application attempted an operation: Subject: Client Name: %5 Client Domain: %6 Client Context ID: %7 Object: Object Name: %3 Scope Names: %4 App...

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An application attempted an operation:

Subject:
	Client Name:		%5
	Client Domain:		%6
	Client Context ID:	%7

Object:
	Object Name:		%3
	Scope Names:		%4

Application Information:
	Application Name:	%1
	Application Instance ID:	%2

Access Request Information:
	Role:			%8
	Groups:			%9
	Operation Name:	%10 (%11)

Fields

NameDescription
Application_Name[Application Information] Application Name.
Application_Instance_ID[Application Information] Application Instance ID.
Object_Name[Object] Object Name.
Scope_Names[Object] Scope Names.
Client_Name[Subject] Client Name.
Client_Domain[Subject] Client Domain.
Client_Context_ID[Subject] Client Context ID.
Role[Access Request Information] Role.
Groups[Access Request Information] Groups.
Operation_Name[Access Request Information] Operation Name.
AppName
AppInstance
ObjectName
ScopeName
ClientName
ClientDomain
ClientLogonId
Group
OperationName
OperationId

References

Event ID 4667 — An application client context was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An application client context was deleted.

Subject:
	Client Name:		%3
	Client Domain:		%4
	Client Context ID:	%5

Application Information:
	Application Name:	%1
	Application Instance ID:	%2

Fields

NameDescription
Application_Name[Application Information] Application Name.
Application_Instance_ID[Application Information] Application Instance ID.
Client_Name[Subject] Client Name.
Client_Domain[Subject] Client Domain.
Client_Context_ID[Subject] Client Context ID.
AppName
AppInstance
ClientName
ClientDomain
ClientLogonId

References

Event ID 4668 — An application was initialized.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An application was initialized.

Subject:
	Client Name:	%3
	Client Domain:	%4
	Client ID:	%5

Application Information:
	Application Name:	%1
	Application Instance ID:	%2

Additional Information:
	Policy Store URL:	%6

Fields

NameDescription
Application_Name[Application Information] Application Name.
Application_Instance_ID[Application Information] Application Instance ID.
Client_Name[Subject] Client Name.
Client_Domain[Subject] Client Domain.
Client_ID[Subject] Client ID.
Policy_Store_URL[Additional Information] Policy Store URL.
AppName
AppInstance
ClientName
ClientDomain
ClientLogonId
StoreUrl

References

Event ID 4670 — Permissions on an object were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Permissions on an object were changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Handle ID:	%8

Process:
	Process ID:	%11
	Process Name:	%12

Permissions Change:
	Original Security Descriptor:	%9
	New Security Descriptor:	%10

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ObjectServer[Object] Object Server.
ObjectType[Object] Object Type.
ObjectName[Object] Object Name.
HandleId[Object] Handle ID.
OldSd[Permissions Change] Original Security Descriptor.
NewSd[Permissions Change] New Security Descriptor.
ProcessId[Process] Process ID.
ProcessName[Process] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4670
  version: 0
  level: 0
  task: 13570
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T02:03:41.603666+00:00'
  event_record_id: 314599
  correlation: {}
  execution:
    process_id: 4
    thread_id: 21268
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ObjectServer: Security
  ObjectType: Token
  ObjectName: '-'
  HandleId: '0xddc'
  OldSd: D:(A;;GA;;;SY)(A;;GA;;;NS)
  NewSd: D:(A;;GA;;;SY)(A;;RC;;;OW)(A;;GA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)
  ProcessId: '0x30c'
  ProcessName: C:\Windows\System32\services.exe
message: ''

Community Notes

Permissions on an object were changed, may detect ACL edits on files, registry, or tokens that grant elevated rights.

References

Event ID 4671 — An application attempted to access a blocked ordinal through the TBS.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An application attempted to access a blocked ordinal through the TBS.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Ordinal:	%5

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Ordinal[Subject] Ordinal.
CallerUserSid
CallerUserName
CallerDomainName
CallerLogonId

References

Event ID 4672 — Special privileges assigned to new logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Special privileges assigned to new logon.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Privileges:		%5

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Subject] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4672
  version: 0
  level: 0
  task: 12548
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:52.440990+00:00'
  event_record_id: 2949
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: SYSTEM
  SubjectDomainName: NT AUTHORITY
  SubjectLogonId: '0x3e7'
  PrivilegeList: "SeAssignPrimaryTokenPrivilege\r\n\t\t\tSeTcbPrivilege\r\n\t\t\tSeSecurityPrivilege\r\n\t\t\tSeTakeOwnershipPrivilege\r\n\t\t\tSeLoadDriverPrivilege\r\n\t\t\tSeBackupPrivilege\r\n\t\t\tSeRestorePrivilege\r\n\t\t\tSeDebugPrivilege\r\n\t\t\tSeAuditPrivilege\r\n\t\t\tSeSystemEnvironmentPrivilege\r\n\t\t\tSeImpersonatePrivilege\r\n\t\t\tSeDelegateSessionUserImpersonatePrivilege"
message: ''

Community Notes

Detects Administrator or SYSTEM-equivalent sessions at logon time.

References

Event ID 4673 — A privileged service was called.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A privileged service was called.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Service:
	Server:	%5
	Service Name:	%6

Process:
	Process ID:	%8
	Process Name:	%9

Service Request Information:
	Privileges:		%7

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ObjectServer[Service] Server.
Service[Service] Service Name.
PrivilegeList[Service Request Information] Privileges.
ProcessId[Process] Process ID.
ProcessName[Process] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4673
  version: 0
  level: 0
  task: 13056
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2023-11-06T02:04:44.872475+00:00'
  event_record_id: 315408
  correlation: {}
  execution:
    process_id: 4
    thread_id: 9496
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x27844'
  ObjectServer: Security
  Service: '-'
  PrivilegeList: SeProfileSingleProcessPrivilege
  ProcessId: '0x33f0'
  ProcessName: C:\Program Files\Google\Chrome\Application\chrome.exe
message: ''

Community Notes

Logs use of SeDebugPrivilege (often precedes scraping memory), SeTcbPrivilege.

Sigma Rules

  • User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'
    The 'LsaRegisterLogonProcess' function verifies that the application making the function call is a logon process by checking that it has the SeTcbPrivilege privilege set. Possible Rubeus tries to get a handle to LSA.
  • Potential Privileged System Service Operation - SeLoadDriverPrivilege
    Detects the usage of the 'SeLoadDriverPrivilege' privilege. This privilege is required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers. This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

References

Event ID 4674 — An operation was attempted on a privileged object.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An operation was attempted on a privileged object.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Object Handle:	%8

Process Information:
	Process ID:	%11
	Process Name:	%12

Requested Operation:
	Desired Access:	%9
	Privileges:		%10

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ObjectServer[Object] Object Server.
ObjectType[Object] Object Type.
ObjectName[Object] Object Name.
HandleId[Object] Object Handle.
AccessMask[Requested Operation] Desired Access.
PrivilegeList[Requested Operation] Privileges.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4674
  version: 0
  level: 0
  task: 13056
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:39:25.936087+00:00'
  event_record_id: 273230
  correlation: {}
  execution:
    process_id: 4
    thread_id: 17676
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x277c6'
  ObjectServer: Security
  ObjectType: '-'
  ObjectName: '-'
  HandleId: '0xfffffffffffffffc'
  AccessMask: '1024'
  PrivilegeList: SeIncreaseBasePriorityPrivilege
  ProcessId: '0x39dc'
  ProcessName: C:\Program Files\WindowsApps\Microsoft.SysinternalsSuite_2023.10.0.0_x64__8wekyb3d8bbwe\Tools\Procmon.exe
message: ''

Community Notes

Logs direct interaction with objects that require SeSecurity/SeTakeOwnership, ie SAM hives.

Sigma Rules

References

Event ID 4675 — SIDs were filtered.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

SIDs were filtered.

Target Account:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3

Trust Information:
	Trust Direction:	%4
	Trust Attributes:	%5
	Trust Type:	%6
	TDO Domain SID:	%7

Filtered SIDs:	%8

Fields

NameDescription
Security_ID[Target Account] Security ID.
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Trust_Direction[Trust Information] Trust Direction.
Trust_Attributes[Trust Information] Trust Attributes.
Trust_Type[Trust Information] Trust Type.
TDO_Domain_SID[Trust Information] TDO Domain SID.
Filtered_SIDs[Trust Information] Filtered SIDs.
TargetUserSid
TargetUserName
TargetDomainName
TdoDirection
TdoAttributes
TdoType
TdoSid
SidList

References

Event ID 4688 — A new process has been created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A new process has been created.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Process Information:
	New Process ID:		%5
	New Process Name:	%6
	Token Elevation Type:	%7
	Creator Process ID:	%8

Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.

Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.

Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.

Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.

Fields

NameDescription
SubjectUserSid[Creator Subject] Security ID.
SubjectUserName[Creator Subject] Account Name.
SubjectDomainName[Creator Subject] Account Domain.
SubjectLogonId[Creator Subject] Logon ID.
NewProcessId[Process Information] New Process ID.
NewProcessName[Process Information] New Process Name.
TokenElevationType[Process Information] Token Elevation Type.
ProcessId[Process Information] Creator Process ID.
CommandLine[Process Information] Process Command Line.
TargetUserSid[Target Subject] Security ID.
TargetUserName[Target Subject] Account Name.
TargetDomainName[Target Subject] Account Domain.
TargetLogonId[Target Subject] Logon ID.
ParentProcessName[Process Information] Creator Process Name.
MandatoryLabel[Process Information] Mandatory Label.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4688
  version: 2
  level: 0
  task: 13312
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:27.153945+00:00'
  event_record_id: 2753
  correlation: {}
  execution:
    process_id: 4
    thread_id: 336
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: '-'
  SubjectDomainName: '-'
  SubjectLogonId: '0x3e7'
  NewProcessId: '0x328'
  NewProcessName: C:\Windows\System32\lsass.exe
  TokenElevationType: '%%1936'
  ProcessId: '0x27c'
  CommandLine: ''
  TargetUserSid: S-1-0-0
  TargetUserName: '-'
  TargetDomainName: '-'
  TargetLogonId: '0x0'
  ParentProcessName: C:\Windows\System32\wininit.exe
  MandatoryLabel: S-1-16-16384
message: ''

Sigma Rules

  • 7Zip Compressing Dump Files
    Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.
  • Compress Data and Lock With Password for Exfiltration With 7-ZIP
    An adversary may compress or encrypt data that is collected prior to exfiltration using 3rd party utilities
  • Potential DLL Injection Via AccCheckConsole
    Detects the execution "AccCheckConsole" a command-line tool for verifying the accessibility implementation of an application's UI. One of the tests that this checker can run are called "verification routine", which tests for things like Consistency, Navigation, etc. The tool allows a user to provide a DLL that can contain a custom "verification routine". An attacker can build such DLLs and pass it via the CLI, which would then be loaded in the context of the "AccCheckConsole" utility.
  • Suspicious AddinUtil.EXE CommandLine Execution
    Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) with suspicious Addinroot or Pipelineroot paths. An adversary may execute AddinUtil.exe with uncommon Addinroot/Pipelineroot paths that point to the adversaries Addins.Store payload.
  • Uncommon Child Process Of AddinUtil.EXE
    Detects uncommon child processes of the Add-In deployment cache updating utility (AddInutil.exe) which could be a sign of potential abuse of the binary to proxy execution via a custom Addins.Store payload.

Showing 5 of 1167 matching Sigma rules.

References

Event ID 4689 — A process has exited.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A process has exited.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Process Information:
	Process ID:	%6
	Process Name:	%7
	Exit Status:	%5

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
Status[Process Information] Exit Status.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4689
  version: 0
  level: 0
  task: 13313
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T02:04:26.563982+00:00'
  event_record_id: 315178
  correlation: {}
  execution:
    process_id: 4
    thread_id: 20768
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  Status: '0x0'
  ProcessId: '0x3f24'
  ProcessName: C:\Windows\System32\svchost.exe
message: ''

References

Event ID 4690 — An attempt was made to duplicate a handle to an object.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to duplicate a handle to an object.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Source Handle Information:
	Source Handle ID:	%5
	Source Process ID:	%6

New Handle Information:
	Target Handle ID:	%7
	Target Process ID:	%8

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Source_Handle_ID[Source Handle Information] Source Handle ID.
Source_Process_ID[Source Handle Information] Source Process ID.
Target_Handle_ID[New Handle Information] Target Handle ID.
Target_Process_ID[New Handle Information] Target Process ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4690
  version: 0
  level: 0
  task: 12807
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2021-04-26T08:26:03.063863Z'
  event_record_id: 463066
  correlation: {}
  execution:
    process_id: 4
    thread_id: 6080
  channel: Security
  computer: srvdefender01.offsec.lan
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: SRVDEFENDER01$
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x3e7'
  SourceHandleId: '0x2a4'
  SourceProcessId: '0xc8c'
  TargetHandleId: '0x11ac'
  TargetProcessId: '0x4'

References

Event ID 4691 — Indirect access to an object was requested.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Indirect access to an object was requested.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Type:	%5
	Object Name:	%6

Process Information:
	Process ID:	%9

Access Request Information:
	Accesses:	%7
	Access Mask:	%8

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Accesses[Access Request Information] Accesses.
Access_Mask[Access Request Information] Access Mask.
Process_ID[Process Information] Process ID.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectType
ObjectName
AccessList
AccessMask
ProcessId

References

Event ID 4692 — Backup of data protection master key was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Backup of data protection master key was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Key Information:
	Key Identifier:	%5
	Recovery Server:	%6
	Recovery Key ID:	%7

Status Information:
	Status Code:	%8

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Key_Identifier[Key Information] Key Identifier.
Recovery_Server[Key Information] Recovery Server.
Recovery_Key_ID[Key Information] Recovery Key ID.
Status_Code[Status Information] Status Code.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
MasterKeyId
RecoveryServer
RecoveryKeyId
FailureReason

Community Notes

Backup of a user/computer master key to the DC, rarely seen after first logon. Several events may indicate key theft or mass profile creation.

Sigma Rules

References

Event ID 4693 — Recovery of data protection master key was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Recovery of data protection master key was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Key Information:
	Key Identifier:	%5
	Recovery Server:	%6
	Recovery Key ID:	%8
	Recovery Reason:	%7

Status Information:
	Status Code:	%9

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Key_Identifier[Key Information] Key Identifier.
Recovery_Server[Key Information] Recovery Server.
Recovery_Reason[Key Information] Recovery Reason.
Recovery_Key_ID[Key Information] Recovery Key ID.
Status_Code[Status Information] Status Code.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
MasterKeyId
RecoveryReason
RecoveryServer
RecoveryKeyId
FailureId

Community Notes

May appear when an attacker re-uses offline profiles or moves tokens between hosts. Correlate with LogonType 7/9 in 4624. Detecting Credential Stealing Attacks Through Active In-Network Defense

References

Event ID 4694 — Protection of auditable protected data was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Protection of auditable protected data was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Protected Data:
	Data Description:	%6
	Key Identifier:	%5
	Protected Data Flags:	%7
	Protection Algorithms:	%8

Status Information:
	Status Code:	%9

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
DataDescription[Protected Data] Key Identifier.
MasterKeyId[Protected Data] Data Description.
ProtectedDataFlags[Protected Data] Protected Data Flags.
CryptoAlgorithms[Protected Data] Protection Algorithms.
FailureReason[Status Information] Status Code.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4694
  version: 0
  level: 0
  task: 13314
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:44:39.871358+00:00'
  event_record_id: 290370
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 844
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x27844'
  DataDescription: ecf918da-9b78-4ed5-bd64-9ff40e3484a1
  MasterKeyId: Chromium
  ProtectedDataFlags: '0x10'
  CryptoAlgorithms: 'AES-256 , SHA2-512 '
  FailureReason: '0x0'
message: ''

Community Notes

When seen outside of software installation it may indicate payload staging hidden in DPAPI.

References

Event ID 4695 — Unprotection of auditable protected data was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Unprotection of auditable protected data was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Protected Data:
	Data Description:	%6
	Key Identifier:	%5
	Protected Data Flags:	%7
	Protection Algorithms:	%8

Status Information:
	Status Code:	%9

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
DataDescription[Protected Data] Key Identifier.
MasterKeyId[Protected Data] Data Description.
ProtectedDataFlags[Protected Data] Protected Data Flags.
CryptoAlgorithms[Protected Data] Protection Algorithms.
FailureReason[Status Information] Status Code.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4695
  version: 0
  level: 0
  task: 13314
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:47:40.735119+00:00'
  event_record_id: 293247
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 15768
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x27844'
  DataDescription: ecf918da-9b78-4ed5-bd64-9ff40e3484a1
  MasterKeyId: Google Chrome
  ProtectedDataFlags: '0x0'
  CryptoAlgorithms: 'AES-256 , SHA2-512 '
  FailureReason: '0x0'
message: ''

Community Notes

Pair with 4694 to identify which user accessed encrypted blobs.

References

Event ID 4696 — A primary token was assigned to process.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A primary token was assigned to process.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Process Information:
	Process ID:	%11
	Process Name:	%12

Target Process:
	Target Process ID:	%9
	Target Process Name:	%10

New Token Information:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
TargetUserSid[New Token Information] Security ID.
TargetUserName[New Token Information] Account Name.
TargetDomainName[New Token Information] Account Domain.
TargetLogonId[New Token Information] Logon ID.
TargetProcessId[Target Process] Target Process ID.
TargetProcessName[Target Process] Target Process Name.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4696
  version: 0
  level: 0
  task: 13312
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:19.637636+00:00'
  event_record_id: 2742
  correlation: {}
  execution:
    process_id: 4
    thread_id: 96
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: '-'
  SubjectDomainName: '-'
  SubjectLogonId: '0x3e7'
  TargetUserSid: S-1-0-0
  TargetUserName: '-'
  TargetDomainName: '-'
  TargetLogonId: '0x3e7'
  TargetProcessId: '0x64'
  TargetProcessName: Registry
  ProcessId: '0x4'
  ProcessName: ''
message: ''

References

Event ID 4697 — A service was installed in the system.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A service was installed in the system.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Service Information:
	Service Name: 		%5
	Service File Name:	%6
	Service Type: 		%7
	Service Start Type:	%8
	Service Account: 		%9

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ServiceName[Service Information] Service Name.
ServiceFileName[Service Information] Service File Name.
ServiceType[Service Information] Service Type.
ServiceStartType[Service Information] Service Start Type.
ServiceAccount[Service Information] Service Account.
ClientProcessStartKey
ClientProcessId
ParentProcessId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4697
  version: 1
  level: 0
  task: 12289
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T14:08:37.173232+00:00'
  event_record_id: 34393
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 3964
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WIN-TKC15D7KHUR$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ServiceName: MpKsl6680716f
  ServiceFileName: C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{94297FD4-6E63-4B60-B47B-85D76376014D}\MpKslDrv.sys
  ServiceType: '0x1'
  ServiceStartType: 3
  ServiceAccount: LocalSystem
  ClientProcessStartKey: 1407374883553325
  ClientProcessId: 1796
  ParentProcessId: 604
message: ''

Sigma Rules

Showing 5 of 21 matching Sigma rules.

References

Event ID 4698 — A scheduled task was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A scheduled task was created.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Task Information:
	Task Name: 		%5
	Task Content: 		%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4698
  version: 0
  level: 0
  task: 12804
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-19T00:02:04.319945Z'
  event_record_id: 566836
  correlation: {}
  execution:
    process_id: 452
    thread_id: 2836
  channel: Security
  computer: WIN-77LTAPHIQ1R.example.corp
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1587066498-1489273250-1035260531-500
  SubjectUserName: Administrator
  SubjectDomainName: EXAMPLE
  SubjectLogonId: '0x17e2d2'
  TaskName: \CYAlyNSS
  TaskContent: "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\"
    xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <Triggers>\r\n
    \   <CalendarTrigger>\r\n      <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary>\r\n
    \     <Enabled>true</Enabled>\r\n      <ScheduleByDay>\r\n        <DaysInterval>1</DaysInterval>\r\n
    \     </ScheduleByDay>\r\n    </CalendarTrigger>\r\n  </Triggers>\r\n  <Principals>\r\n
    \   <Principal id=\"LocalSystem\">\r\n      <UserId>S-1-5-18</UserId>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n
    \     <LogonType>InteractiveToken</LogonType>\r\n    </Principal>\r\n  </Principals>\r\n
    \ <Settings>\r\n    <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>\r\n
    \   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n
    \   <AllowHardTerminate>true</AllowHardTerminate>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n
    \   <IdleSettings>\r\n      <StopOnIdleEnd>true</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n
    \   </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n
    \   <Hidden>true</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n
    \   <ExecutionTimeLimit>P3D</ExecutionTimeLimit>\r\n    <Priority>7</Priority>\r\n
    \ </Settings>\r\n  <Actions Context=\"LocalSystem\">\r\n    <Exec>\r\n      <Command>cmd.exe</Command>\r\n
    \     <Arguments>/C tasklist &gt; %windir%\\Temp\\CYAlyNSS.tmp 2&gt;&amp;1</Arguments>\r\n
    \   </Exec>\r\n  </Actions>\r\n</Task>"

Community Notes

May also indicate remote creation via relayed SMB/WinRM session, PS cmdlets, DCOM over RPC, WMI, others.

Sigma Rules

References

Event ID 4699 — A scheduled task was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A scheduled task was deleted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Task Information:
	Task Name: 		%5
	Task Content: 		%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4699
  version: 0
  level: 0
  task: 12804
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-19T00:02:04.351252Z'
  event_record_id: 566840
  correlation: {}
  execution:
    process_id: 452
    thread_id: 2836
  channel: Security
  computer: WIN-77LTAPHIQ1R.example.corp
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1587066498-1489273250-1035260531-500
  SubjectUserName: Administrator
  SubjectDomainName: EXAMPLE
  SubjectLogonId: '0x17e2d2'
  TaskName: \CYAlyNSS
  TaskContent: "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\"
    xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <Triggers>\r\n
    \   <CalendarTrigger>\r\n      <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary>\r\n
    \     <Enabled>true</Enabled>\r\n      <ScheduleByDay>\r\n        <DaysInterval>1</DaysInterval>\r\n
    \     </ScheduleByDay>\r\n    </CalendarTrigger>\r\n  </Triggers>\r\n  <Principals>\r\n
    \   <Principal id=\"LocalSystem\">\r\n      <UserId>S-1-5-18</UserId>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n
    \     <LogonType>InteractiveToken</LogonType>\r\n    </Principal>\r\n  </Principals>\r\n
    \ <Settings>\r\n    <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>\r\n
    \   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n
    \   <AllowHardTerminate>true</AllowHardTerminate>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n
    \   <IdleSettings>\r\n      <StopOnIdleEnd>true</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n
    \   </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n
    \   <Hidden>true</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n
    \   <ExecutionTimeLimit>P3D</ExecutionTimeLimit>\r\n    <Priority>7</Priority>\r\n
    \ </Settings>\r\n  <Actions Context=\"LocalSystem\">\r\n    <Exec>\r\n      <Command>cmd.exe</Command>\r\n
    \     <Arguments>/C tasklist &gt; %windir%\\Temp\\CYAlyNSS.tmp 2&gt;&amp;1</Arguments>\r\n
    \   </Exec>\r\n  </Actions>\r\n</Task>"

Sigma Rules

References

Event ID 4700 — A scheduled task was enabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A scheduled task was enabled.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Task Information:
	Task Name: 		%5
	Task Content: 		%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TaskName
TaskContent
ClientProcessStartKey
ClientProcessId
ParentProcessId
RpcCallClientLocality
FQDN

References

Event ID 4701 — A scheduled task was disabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A scheduled task was disabled.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Task Information:
	Task Name: 		%5
	Task Content: 		%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TaskName
TaskContent
ClientProcessStartKey
ClientProcessId
ParentProcessId
RpcCallClientLocality
FQDN

Sigma Rules

References

Event ID 4702 — A scheduled task was updated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A scheduled task was updated.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Task Information:
	Task Name: 		%5
	Task New Content: 		%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_New_Content[Task Information] Task New Content.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4702
  version: 0
  level: 0
  task: 12804
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-25T11:22:45.080609Z'
  event_record_id: 198238563
  correlation: {}
  execution:
    process_id: 444
    thread_id: 2260
  channel: Security
  computer: DC1.insecurebank.local
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-20
  SubjectUserName: DC1$
  SubjectDomainName: insecurebank
  SubjectLogonId: '0x3e4'
  TaskName: \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask
  TaskContentNew: "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.4\"
    xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo>\r\n
    \   <Source>$(@%systemroot%\\system32\\sppc.dll,-200)</Source>\r\n    <Author>$(@%systemroot%\\system32\\sppc.dll,-200)</Author>\r\n
    \   <Version>1.0</Version>\r\n    <Description>$(@%systemroot%\\system32\\sppc.dll,-201)</Description>\r\n
    \   <URI>\\Microsoft\\Windows\\SoftwareProtectionPlatform\\SvcRestartTask</URI>\r\n
    \   <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor>\r\n
    \ </RegistrationInfo>\r\n  <Triggers>\r\n    <CalendarTrigger>\r\n      <StartBoundary>2019-03-26T11:21:44Z</StartBoundary>\r\n
    \     <Enabled>true</Enabled>\r\n      <ScheduleByDay>\r\n        <DaysInterval>1</DaysInterval>\r\n
    \     </ScheduleByDay>\r\n    </CalendarTrigger>\r\n  </Triggers>\r\n  <Principals>\r\n
    \   <Principal id=\"NetworkService\">\r\n      <UserId>S-1-5-20</UserId>\r\n      <RunLevel>LeastPrivilege</RunLevel>\r\n
    \   </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>\r\n
    \   <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n
    \   <AllowHardTerminate>false</AllowHardTerminate>\r\n    <StartWhenAvailable>true</StartWhenAvailable>\r\n
    \   <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n
    \     <StopOnIdleEnd>true</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n
    \   </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n
    \   <Hidden>true</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>\r\n
    \   <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>\r\n    <WakeToRun>false</WakeToRun>\r\n
    \   <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>7</Priority>\r\n
    \   <RestartOnFailure>\r\n      <Interval>PT1M</Interval>\r\n      <Count>3</Count>\r\n
    \   </RestartOnFailure>\r\n  </Settings>\r\n  <Actions Context=\"NetworkService\">\r\n
    \   <ComHandler>\r\n      <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId>\r\n
    \     <Data><![CDATA[timer]]></Data>\r\n    </ComHandler>\r\n  </Actions>\r\n</Task>"

Community Notes

May indicate path or trigger edits.

Sigma Rules

References

Event ID 4703 — A user right was adjusted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A token right was adjusted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Target Account:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Process Information:
	Process ID:		%10
	Process Name:		%9

Enabled Privileges:
			%11

Disabled Privileges:
			%12

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
TargetUserSid[Target Account] Security ID.
TargetUserName[Target Account] Account Name.
TargetDomainName[Target Account] Account Domain.
TargetLogonId[Target Account] Logon ID.
ProcessName[Process Information] Process Name.
ProcessId[Process Information] Process ID.
EnabledPrivilegeListEnabled Privileges
DisabledPrivilegeListDisabled Privileges

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4703
  version: 0
  level: 0
  task: 13317
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T02:04:44.861115+00:00'
  event_record_id: 315382
  correlation: {}
  execution:
    process_id: 4
    thread_id: 9496
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  TargetUserSid: S-1-5-18
  TargetUserName: WINDEV2310EVAL$
  TargetDomainName: WORKGROUP
  TargetLogonId: '0x3e7'
  ProcessName: C:\Windows\System32\svchost.exe
  ProcessId: '0xd0c'
  EnabledPrivilegeList: "SeAssignPrimaryTokenPrivilege\r\n\t\t\tSeIncreaseQuotaPrivilege\r\n\t\t\tSeSecurityPrivilege\r\n\t\t\tSeTakeOwnershipPrivilege\r\n\t\t\tSeLoadDriverPrivilege\r\n\t\t\tSeSystemtimePrivilege\r\n\t\t\tSeBackupPrivilege\r\n\t\t\tSeRestorePrivilege\r\n\t\t\tSeShutdownPrivilege\r\n\t\t\tSeSystemEnvironmentPrivilege\r\n\t\t\tSeUndockPrivilege\r\n\t\t\tSeManageVolumePrivilege"
  DisabledPrivilegeList: '-'
message: ''

Community Notes

Generated when token privileges are changed (tracks rights like SeDebugPrivilege, SeLoadDriverPrivilege).

References

Event ID 4704 — A user right was assigned.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user right was assigned.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Target Account:
	Account Name:		%5

New Right:
	User Right:		%6

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
TargetSid[Target Account] Account Name.
PrivilegeList[New Right] User Right.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4704
  version: 0
  level: 0
  task: 13570
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T23:16:25.782413+00:00'
  event_record_id: 71899
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 844
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  TargetSid: S-1-5-83-0
  PrivilegeList: SeCreateSymbolicLinkPrivilege
message: ''

Community Notes

Tracks changes to token privileges.

Sigma Rules

References

Event ID 4705 — A user right was removed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user right was removed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Target Account:
	Account Name:		%5

Removed Right:
	User Right:		%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Account_Name[Target Account] Account Name.
User_Right[Removed Right] User Right.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4705
  version: 0
  level: 0
  task: 13570
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-12T20:23:39.973927Z'
  event_record_id: 1239002
  correlation: {}
  execution:
    process_id: 464
    thread_id: 2980
  channel: Security
  computer: fs02.offsec.lan
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x202dac8'
  TargetSid: S-1-5-21-4230534742-2542757381-3142984815-1158
  PrivilegeList: SeCreateTokenPrivilege

References

Event ID 4706 — A new trust was created to a domain.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A new trust was created to a domain.

Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6

Trusted Domain:
	Domain Name:		%1
	Domain ID:		%2

Trust Information:
	Trust Type:		%7
	Trust Direction:		%8
	Trust Attributes:		%9
	SID Filtering:		%10

Fields

NameDescription
Domain_Name[Trusted Domain] Domain Name.
Domain_ID[Trusted Domain] Domain ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Trust_Type[Trust Information] Trust Type.
Trust_Direction[Trust Information] Trust Direction.
Trust_Attributes[Trust Information] Trust Attributes.
SID_Filtering[Trust Information] SID Filtering.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4706
  version: 0
  level: 0
  task: 13569
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2024-06-22T14:02:41.639162Z'
  event_record_id: 3175612
  correlation: {}
  execution:
    process_id: 596
    thread_id: 11064
  channel: Security
  computer: CDCWTRDC01.mypartner.lan
  security:
    user_id: ''
event_data:
  DomainName: rootblue.lan
  DomainSid: S-1-5-21-392370121-190461309-2151315433
  SubjectUserSid: S-1-5-21-1407145384-2259788832-4099636412-500
  SubjectUserName: Administrator
  SubjectDomainName: MYPARTNER
  SubjectLogonId: '0xffad8559'
  TdoType: 2
  TdoDirection: 3
  TdoAttributes: 8
  SidFilteringEnabled: '%%1796'

Sigma Rules

References

Event ID 4707 — A trust to a domain was removed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A trust to a domain was removed.

Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6

Domain Information:
	Domain Name:		%1
	Domain ID:		%2

Fields

NameDescription
Domain_Name[Domain Information] Domain Name.
Domain_ID[Domain Information] Domain ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
DomainName
DomainSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4709 — The IPsec Policy Agent service was started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The IPsec Policy Agent service was started.

%1

Policy Source: 	%2

%3

Fields

NameDescription
param1
param2
param3

References

Event ID 4710 — The IPsec Policy Agent service was disabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The IPsec Policy Agent service was disabled.

%1
%2

Fields

NameDescription
param1
param2

References

Event ID 4711 — %1

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

%1

Fields

NameDescription
param1

References

Event ID 4712 — IPsec Policy Agent encountered a potentially serious failure.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent encountered a potentially serious failure.
%1

Fields

NameDescription
param1

References

Event ID 4713 — Kerberos policy was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Kerberos policy was changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Changes Made:
('--' means no changes, otherwise each change is shown as:
(Parameter Name):	(new value) (old value))
%5

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
KerberosPolicyChange

References

Event ID 4714 — Data Recovery Agent group policy for Encrypting File System (EFS) has changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Data Recovery Agent group policy for Encrypting File System (EFS) has changed. The new changes have been applied.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
EfsPolicyChange

References

Event ID 4715 — The audit policy (SACL) on an object was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The audit policy (SACL) on an object was changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain: 	%3
	Logon ID: 		%4

Audit Policy Change:
	Original Security Descriptor: 	%5
	New Security Descriptor: 		%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Original_Security_Descriptor[Audit Policy Change] Original Security Descriptor.
New_Security_Descriptor[Audit Policy Change] New Security Descriptor.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
OldSd
NewSd

References

Event ID 4716 — Trusted domain information was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Trusted domain information was modified.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Trusted Domain:
	Domain Name:		%5
	Domain ID:		%6

New Trust Information:
	Trust Type:		%7
	Trust Direction:		%8
	Trust Attributes:		%9
	SID Filtering:		%10

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Domain_Name[Trusted Domain] Domain Name.
Domain_ID[Trusted Domain] Domain ID.
Trust_Type[New Trust Information] Trust Type.
Trust_Direction[New Trust Information] Trust Direction.
Trust_Attributes[New Trust Information] Trust Attributes.
SID_Filtering[New Trust Information] SID Filtering.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DomainName
DomainSid
TdoType
TdoDirection
TdoAttributes
SidFilteringEnabled

References

Event ID 4717 — System security access was granted to an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

System security access was granted to an account.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Account Modified:
	Account Name:		%5

Access Granted:
	Access Right:		%6

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
TargetSid[Account Modified] Account Name.
AccessGranted[Access Granted] Access Right.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4717
  version: 0
  level: 0
  task: 13569
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T23:16:25.814727+00:00'
  event_record_id: 71900
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 844
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  TargetSid: S-1-5-83-0
  AccessGranted: SeServiceLogonRight
message: ''

References

Event ID 4718 — System security access was removed from an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

System security access was removed from an account.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Account Modified:
	Account Name:		%5

Access Removed:
	Access Right:		%6

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
TargetSid[Account Modified] Account Name.
AccessRemoved[Access Removed] Access Right.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4718
  version: 0
  level: 0
  task: 13569
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-07T16:44:47.045997+00:00'
  event_record_id: 89
  correlation:
    ActivityID: C1DC836A-4A9E-0000-8485-DCC19E4AD801
  execution:
    process_id: 648
    thread_id: 700
  channel: Security
  computer: WIN-FPV0DSIC9O6
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: MINWINPC$
  SubjectDomainName: ''
  SubjectLogonId: '0x3e7'
  TargetSid: S-1-5-90-0
  AccessRemoved: SeInteractiveLogonRight
message: ''

References

Event ID 4719 — System audit policy was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

System audit policy was changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Audit Policy Change:
	Category:		%5
	Subcategory:		%6
	Subcategory GUID:	%7
	Changes:		%8

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
CategoryId[Audit Policy Change] Category.
SubcategoryId[Audit Policy Change] Subcategory.
SubcategoryGuid[Audit Policy Change] Subcategory GUID.
AuditPolicyChanges[Audit Policy Change] Changes.
ClientProcessId
ClientProcessStartKey

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4719
  version: 1
  level: 0
  task: 13568
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T23:49:58.098445+00:00'
  event_record_id: 112372
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 8228
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  CategoryId: '%%8279'
  SubcategoryId: '%%14080'
  SubcategoryGuid: 0CCE923B-69AE-11D9-BED3-505054503030
  AuditPolicyChanges: '%%8449, %%8451'
  ClientProcessId: 8540
  ClientProcessStartKey: 3659174697239635
message: ''

Community Notes

System audit policy changed. Attackers often disable auditing to reduce detection.

Sigma Rules

  • Windows Event Auditing Disabled
    Detects scenarios where system auditing (i.e.: Windows event log auditing) is disabled. This may be used in a scenario where an entity would want to bypass local logging to evade detection when Windows event logging is enabled and reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc". Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications - however, it is recommended to perform these modifications in Active Directory anyways.
  • Important Windows Event Auditing Disabled
    Detects scenarios where system auditing for important events such as "Process Creation" or "Logon" events is disabled.

References

Event ID 4720 — A user account was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user account was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

New Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Attributes:
	SAM Account Name:	%9
	Display Name:		%10
	User Principal Name:	%11
	Home Directory:		%12
	Home Drive:		%13
	Script Path:		%14
	Profile Path:		%15
	User Workstations:	%16
	Password Last Set:	%17
	Account Expires:		%18
	Primary Group ID:	%19
	Allowed To Delegate To:	%20
	Old UAC Value:		%21
	New UAC Value:		%22
	User Account Control:	%23
	User Parameters:	%24
	SID History:		%25
	Logon Hours:		%26

Additional Information:
	Privileges		%8

Fields

NameDescription
TargetUserName[New Account] Account Name.
TargetDomainName[New Account] Account Domain.
TargetSid[New Account] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList
SamAccountName[Attributes] SAM Account Name.
DisplayName[Attributes] Display Name.
UserPrincipalName[Attributes] User Principal Name.
HomeDirectory[Attributes] Home Directory.
HomePath[Attributes] Home Drive.
ScriptPath[Attributes] Script Path.
ProfilePath[Attributes] Profile Path.
UserWorkstations[Attributes] User Workstations.
PasswordLastSet[Attributes] Password Last Set.
AccountExpires[Attributes] Account Expires.
PrimaryGroupId[Attributes] Primary Group ID.
AllowedToDelegateTo[Attributes] Allowed To Delegate To.
OldUacValue[Attributes] Old UAC Value.
NewUacValue[Attributes] New UAC Value.
UserAccountControl[Attributes] User Account Control.
UserParameters[Attributes] User Parameters.
SidHistory[Attributes] SID History.
LogonHours[Attributes] Logon Hours.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4720
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:34.963101+00:00'
  event_record_id: 2779
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserName: User
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
  SamAccountName: User
  DisplayName: '%%1793'
  UserPrincipalName: '-'
  HomeDirectory: '%%1793'
  HomePath: '%%1793'
  ScriptPath: '%%1793'
  ProfilePath: '%%1793'
  UserWorkstations: '%%1793'
  PasswordLastSet: '%%1794'
  AccountExpires: '%%1794'
  PrimaryGroupId: '513'
  AllowedToDelegateTo: '-'
  OldUacValue: '0x0'
  NewUacValue: '0x15'
  UserAccountControl: "\r\n\t\t%%2080\r\n\t\t%%2082\r\n\t\t%%2084"
  UserParameters: '%%1793'
  SidHistory: '-'
  LogonHours: '%%1797'
message: ''

Sigma Rules

  • Hidden Local User Creation
    Detects the creation of a local hidden user account which should not happen for event ID 4720.
  • New or Renamed User Account with '$' Character
    Detects the creation of a user with the "$" character. This can be used by attackers to hide a user or trick detection systems that lack the parsing mechanisms.
  • Suspicious Windows ANONYMOUS LOGON Local Account Created
    Detects the creation of suspicious accounts similar to ANONYMOUS LOGON, such as using additional spaces. Created as an covering detection for exclusion of Logon Type 3 from ANONYMOUS LOGON accounts.
  • Local User Creation
    Detects local user creation on Windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your Windows server logs and not on your DC logs.

References

Event ID 4722 — A user account was enabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user account was enabled.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Fields

NameDescription
TargetUserName[Target Account] Account Name.
TargetDomainName[Target Account] Account Domain.
TargetSid[Target Account] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4722
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:34.966226+00:00'
  event_record_id: 2780
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserName: User
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
message: ''

References

Event ID 4723 — An attempt was made to change an account's password.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to change an account's password.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Additional Information:
	Privileges		%8

Fields

NameDescription
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4723
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2021-12-04T22:47:47.872773Z'
  event_record_id: 233289145
  correlation:
    '#attributes':
      ActivityID: D96638DA-E4F9-0001-F038-66D9F9E4D701
  execution:
    process_id: 596
    thread_id: 3492
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  TargetUserName: hacker2
  TargetDomainName: OFFSEC
  TargetSid: S-1-5-21-4230534742-2542757381-3142984815-1242
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x10e7c4430'
  PrivilegeList: '-'

References

Event ID 4724 — An attempt was made to reset an account's password.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to reset an account's password.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Fields

NameDescription
TargetUserName[Target Account] Account Name.
TargetDomainName[Target Account] Account Domain.
TargetSid[Target Account] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4724
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:35.054380+00:00'
  event_record_id: 2787
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserName: User
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
message: ''

References

Event ID 4725 — A user account was disabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user account was disabled.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Fields

NameDescription
TargetUserName[Target Account] Account Name.
TargetDomainName[Target Account] Account Domain.
TargetSid[Target Account] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4725
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-10-25T22:53:19.612560+00:00'
  event_record_id: 2634
  correlation:
    ActivityID: D5BBEBF4-0795-0001-A8EC-BBD59507DA01
  execution:
    process_id: 824
    thread_id: 880
  channel: Security
  computer: WinDevEval
  security:
    user_id: ''
event_data:
  TargetUserName: Administrator
  TargetDomainName: WINDEVEVAL
  TargetSid: S-1-5-21-2533829718-189860685-2477588761-500
  SubjectUserSid: S-1-5-21-2533829718-189860685-2477588761-500
  SubjectUserName: Administrator
  SubjectDomainName: WINDEVEVAL
  SubjectLogonId: '0x42eea'
message: ''

References

Event ID 4726 — A user account was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user account was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Additional Information:
	Privileges	%8

Fields

NameDescription
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4726
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-01-24T17:03:25.009874Z'
  event_record_id: 1934526
  correlation: {}
  execution:
    process_id: 480
    thread_id: 1496
  channel: Security
  computer: fs03vuln.offsec.lan
  security:
    user_id: ''
event_data:
  TargetUserName: 3teamssixf$
  TargetDomainName: FS03VULN
  TargetSid: S-1-5-21-2721507831-1374043488-2540227515-1008
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x14f509e2'
  PrivilegeList: '-'

References

Event ID 4727 — A security-enabled global group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A security-enabled global group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

New Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
TargetUserName[New Group] Group Name.
TargetDomainName[New Group] Group Domain.
TargetSid[New Group] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.
SamAccountName[Attributes] SAM Account Name.
SidHistory[Attributes] SID History.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4727
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-07T16:44:41.241410+00:00'
  event_record_id: 51
  correlation:
    ActivityID: C1DC836A-4A9E-0000-8485-DCC19E4AD801
  execution:
    process_id: 648
    thread_id: 652
  channel: Security
  computer: WIN-FPV0DSIC9O6
  security:
    user_id: ''
event_data:
  TargetUserName: Storage Replica Administrators
  TargetDomainName: Builtin
  TargetSid: S-1-5-32-582
  SubjectUserSid: S-1-5-18
  SubjectUserName: MINWINPC$
  SubjectDomainName: ''
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
  SamAccountName: Storage Replica Administrators
  SidHistory: '-'
message: ''

References

Event ID 4728 — A member was added to a security-enabled global group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A member was added to a security-enabled global group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
MemberName[Member] Account Name.
MemberSid[Member] Security ID.
TargetUserName[Group] Group Name.
TargetDomainName[Group] Group Domain.
TargetSid[Group] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4728
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:34.961043+00:00'
  event_record_id: 2778
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  MemberName: '-'
  MemberSid: S-1-5-21-1992711665-1655669231-58201500-1000
  TargetUserName: None
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-513
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
message: ''

Community Notes

Member added to security-enabled global group. May indicate domain-level privilege escalation, ie membership in Domain Admins.

Sigma Rules

References

Event ID 4729 — A member was removed from a security-enabled global group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A member was removed from a security-enabled global group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4729
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-01-24T17:03:25.009874Z'
  event_record_id: 1934525
  correlation: {}
  execution:
    process_id: 480
    thread_id: 1496
  channel: Security
  computer: fs03vuln.offsec.lan
  security:
    user_id: ''
event_data:
  MemberName: '-'
  MemberSid: S-1-5-21-2721507831-1374043488-2540227515-1008
  TargetUserName: None
  TargetDomainName: FS03VULN
  TargetSid: S-1-5-21-2721507831-1374043488-2540227515-513
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x14f509e2'
  PrivilegeList: '-'

Community Notes

A member was removed from a security-enabled global group, may be an effort to slow IR or clean-up after escalation. Security-enabled local group changed, indicates changes to local Administrators or Remote Desktop Users.

Sigma Rules

References

Event ID 4730 — A security-enabled global group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-enabled global group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Deleted Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Deleted Group] Group Name.
Group_Domain[Deleted Group] Group Domain.
Security_ID[Deleted Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

Sigma Rules

References

Event ID 4731 — A security-enabled local group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A security-enabled local group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

New Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
TargetUserName[New Group] Group Name.
TargetDomainName[New Group] Group Domain.
TargetSid[New Group] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.
SamAccountName[Attributes] SAM Account Name.
SidHistory[Attributes] SID History.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4731
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-07T16:44:41.241162+00:00'
  event_record_id: 49
  correlation:
    ActivityID: C1DC836A-4A9E-0000-8485-DCC19E4AD801
  execution:
    process_id: 648
    thread_id: 652
  channel: Security
  computer: WIN-FPV0DSIC9O6
  security:
    user_id: ''
event_data:
  TargetUserName: Remote Management Users
  TargetDomainName: Builtin
  TargetSid: S-1-5-32-580
  SubjectUserSid: S-1-5-18
  SubjectUserName: MINWINPC$
  SubjectDomainName: ''
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
  SamAccountName: Remote Management Users
  SidHistory: '-'
message: ''

References

Event ID 4732 — A member was added to a security-enabled local group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A member was added to a security-enabled local group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
MemberName[Member] Account Name.
MemberSid[Member] Security ID.
TargetUserName[Group] Group Name.
TargetDomainName[Group] Group Domain.
TargetSid[Group] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4732
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:35.063652+00:00'
  event_record_id: 2788
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  MemberName: '-'
  MemberSid: S-1-5-21-1992711665-1655669231-58201500-1000
  TargetUserName: Administrators
  TargetDomainName: Builtin
  TargetSid: S-1-5-32-544
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
message: ''

Sigma Rules

References

Event ID 4733 — A member was removed from a security-enabled local group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A member was removed from a security-enabled local group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4733
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2013-10-23T16:22:40.036000Z'
  event_record_id: 117
  correlation: {}
  execution:
    process_id: 508
    thread_id: 1032
  channel: Security
  computer: IE8Win7
  security:
    user_id: ''
event_data:
  MemberName: '-'
  MemberSid: S-1-5-21-3463664321-2923530833-3546627382-1000
  TargetUserName: Users
  TargetDomainName: Builtin
  TargetSid: S-1-5-32-545
  SubjectUserSid: S-1-5-18
  SubjectUserName: WIN-QALA5Q3KJ43$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'

References

Event ID 4734 — A security-enabled local group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-enabled local group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4735 — A security-enabled local group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A security-enabled local group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Changed Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
TargetUserName[Group] Group Name.
TargetDomainName[Group] Group Domain.
TargetSid[Group] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.
SamAccountName[Changed Attributes] SAM Account Name.
SidHistory[Changed Attributes] SID History.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4735
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:37.334332+00:00'
  event_record_id: 2847
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserName: Device Owners
  TargetDomainName: Builtin
  TargetSid: S-1-5-32-583
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
  SamAccountName: Device Owners
  SidHistory: '-'
message: ''

References

Event ID 4737 — A security-enabled global group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A security-enabled global group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Changed Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
TargetUserName[Group] Group Name.
TargetDomainName[Group] Group Domain.
TargetSid[Group] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.
SamAccountName[Changed Attributes] SAM Account Name.
SidHistory[Changed Attributes] SID History.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4737
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:37.340456+00:00'
  event_record_id: 2858
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserName: None
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-513
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
  SamAccountName: None
  SidHistory: '-'
message: ''

References

Event ID 4738 — A user account was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user account was changed.

Subject:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Target Account:
	Security ID:		%4
	Account Name:		%2
	Account Domain:		%3

Changed Attributes:
	SAM Account Name:	%10
	Display Name:		%11
	User Principal Name:	%12
	Home Directory:		%13
	Home Drive:		%14
	Script Path:		%15
	Profile Path:		%16
	User Workstations:	%17
	Password Last Set:	%18
	Account Expires:		%19
	Primary Group ID:	%20
	AllowedToDelegateTo:	%21
	Old UAC Value:		%22
	New UAC Value:		%23
	User Account Control:	%24
	User Parameters:	%25
	SID History:		%26
	Logon Hours:		%27

Additional Information:
	Privileges:		%9

Fields

NameDescription
Dummy
TargetUserName[Target Account] Account Name.
TargetDomainName[Target Account] Account Domain.
TargetSid[Target Account] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.
SamAccountName[Changed Attributes] SAM Account Name.
DisplayName[Changed Attributes] Display Name.
UserPrincipalName[Changed Attributes] User Principal Name.
HomeDirectory[Changed Attributes] Home Directory.
HomePath[Changed Attributes] Home Drive.
ScriptPath[Changed Attributes] Script Path.
ProfilePath[Changed Attributes] Profile Path.
UserWorkstations[Changed Attributes] User Workstations.
PasswordLastSet[Changed Attributes] Password Last Set.
AccountExpires[Changed Attributes] Account Expires.
PrimaryGroupId[Changed Attributes] Primary Group ID.
AllowedToDelegateTo[Changed Attributes] AllowedToDelegateTo.
OldUacValue[Changed Attributes] Old UAC Value.
NewUacValue[Changed Attributes] New UAC Value.
UserAccountControl[Changed Attributes] User Account Control.
UserParameters[Changed Attributes] User Parameters.
SidHistory[Changed Attributes] SID History.
LogonHours[Changed Attributes] Logon Hours.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4738
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:37.339747+00:00'
  event_record_id: 2855
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  Dummy: '-'
  TargetUserName: WDAGUtilityAccount
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-504
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
  SamAccountName: WDAGUtilityAccount
  DisplayName: '%%1793'
  UserPrincipalName: '-'
  HomeDirectory: '%%1793'
  HomePath: '%%1793'
  ScriptPath: '%%1793'
  ProfilePath: '%%1793'
  UserWorkstations: '%%1793'
  PasswordLastSet: 10/25/2023 8:16:53 PM
  AccountExpires: '%%1794'
  PrimaryGroupId: '513'
  AllowedToDelegateTo: '-'
  OldUacValue: '0x11'
  NewUacValue: '0x11'
  UserAccountControl: '-'
  UserParameters: '%%1793'
  SidHistory: '-'
  LogonHours: '%%1797'
message: ''

Community Notes

User account changed, may capture priv-esc, password changes, or UAC flag changes.

Sigma Rules

References

Event ID 4739 — Domain Policy was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Domain Policy was changed.

Change Type:		%1 modified

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Domain:
	Domain Name:		%2
	Domain ID:		%3

Changed Attributes:
	Min. Password Age:	%9
	Max. Password Age:	%10
	Force Logoff:		%11
	Lockout Threshold:	%12
	Lockout Observation Window:	%13
	Lockout Duration:	%14
	Password Properties:	%15
	Min. Password Length:	%16
	Password History Length:	%17
	Machine Account Quota:	%18
	Mixed Domain Mode:	%19
	Domain Behavior Version:	%20
	OEM Information:	%21

Additional Information:
	Privileges:		%8

Fields

NameDescription
DomainPolicyChangedChange Type.
DomainName[Domain] Domain Name.
DomainSid[Domain] Domain ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.
MinPasswordAge[Changed Attributes] Min. Password Age.
MaxPasswordAge[Changed Attributes] Max. Password Age.
ForceLogoff[Changed Attributes] Force Logoff.
LockoutThreshold[Changed Attributes] Lockout Threshold.
LockoutObservationWindow[Changed Attributes] Lockout Observation Window.
LockoutDuration[Changed Attributes] Lockout Duration.
PasswordProperties[Changed Attributes] Password Properties.
MinPasswordLength[Changed Attributes] Min. Password Length.
PasswordHistoryLength[Changed Attributes] Password History Length.
MachineAccountQuota[Changed Attributes] Machine Account Quota.
MixedDomainMode[Changed Attributes] Mixed Domain Mode.
DomainBehaviorVersion[Changed Attributes] Domain Behavior Version.
OemInformation[Changed Attributes] OEM Information.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4739
  version: 0
  level: 0
  task: 13569
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:34.991613+00:00'
  event_record_id: 2783
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  DomainPolicyChanged: Password Policy
  DomainName: WINDEV2310EVAL
  DomainSid: S-1-5-21-1992711665-1655669231-58201500
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
  MinPasswordAge: ퟏ~
  MaxPasswordAge: ퟏ~
  ForceLogoff: '-'
  LockoutThreshold: '-'
  LockoutObservationWindow: '-'
  LockoutDuration: '-'
  PasswordProperties: '8'
  MinPasswordLength: '0'
  PasswordHistoryLength: '0'
  MachineAccountQuota: '-'
  MixedDomainMode: '-'
  DomainBehaviorVersion: '-'
  OemInformation: '-'
message: ''

Community Notes

Attackers with Domain Admin may weaken password/lockout requirements to speed credential attacks. May precede password spraying or Kerberos ticket forgery. Pair with 4768 and 4771. Also a prelude to DCShadow or other directory-level attacks.

References

Event ID 4740 — A user account was locked out.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A user account was locked out.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Account That Was Locked Out:
	Security ID:		%3
	Account Name:		%1

Additional Information:
	Caller Computer Name:	%2

Fields

NameDescription
Account_Name[Account That Was Locked Out] Account Name.
Caller_Computer_Name[Additional Information] Caller Computer Name.
Security_ID[Account That Was Locked Out] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Community Notes

Pair with 4625 and related IPs during investigation. Review Caller_Computer_Name.

References

Event ID 4741 — A computer account was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A computer account was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

New Computer Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Attributes:
	SAM Account Name:	%9
	Display Name:		%10
	User Principal Name:	%11
	Home Directory:		%12
	Home Drive:		%13
	Script Path:		%14
	Profile Path:		%15
	User Workstations:	%16
	Password Last Set:	%17
	Account Expires:		%18
	Primary Group ID:	%19
	AllowedToDelegateTo:	%20
	Old UAC Value:		%21
	New UAC Value:		%22
	User Account Control:	%23
	User Parameters:	%24
	SID History:		%25
	Logon Hours:		%26
	DNS Host Name:		%27
	Service Principal Names:	%28

Additional Information:
	Privileges		%8

Fields

NameDescription
Account_Name[New Computer Account] Account Name.
Account_Domain[New Computer Account] Account Domain.
Security_ID[New Computer Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
SAM_Account_Name
Display_Name[Attributes] SAM Account Name.
User_Principal_Name[Attributes] Display Name.
Home_Directory[Attributes] User Principal Name.
Home_Drive[Attributes] Home Directory.
Script_Path[Attributes] Home Drive.
Profile_Path[Attributes] Script Path.
User_Workstations[Attributes] Profile Path.
Password_Last_Set[Attributes] User Workstations.
Account_Expires[Attributes] Password Last Set.
Primary_Group_ID[Attributes] Account Expires.
AllowedToDelegateTo[Attributes] Primary Group ID.
Old_UAC_Value[Attributes] AllowedToDelegateTo.
New_UAC_Value[Attributes] Old UAC Value.
User_Account_Control[Attributes] New UAC Value.
User_Parameters[Attributes] User Account Control.
SID_History[Attributes] User Parameters.
Logon_Hours[Attributes] SID History.
DNS_Host_Name[Attributes] Logon Hours.
Service_Principal_Names[Attributes] DNS Host Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4741
  version: 0
  level: 0
  task: 13825
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2021-12-12T17:57:52.313673Z'
  event_record_id: 2982085
  correlation: {}
  execution:
    process_id: 624
    thread_id: 3652
  channel: Security
  computer: 01566s-win16-ir.threebeesco.com
  security:
    user_id: ''
event_data:
  TargetUserName: DC012$
  TargetDomainName: 3B
  TargetSid: S-1-5-21-308926384-506822093-3341789130-220105
  SubjectUserSid: S-1-5-21-308926384-506822093-3341789130-101606
  SubjectUserName: lgrove
  SubjectDomainName: 3B
  SubjectLogonId: '0x738ae4'
  PrivilegeList: '-'
  SamAccountName: DC012$
  DisplayName: '-'
  UserPrincipalName: '-'
  HomeDirectory: '-'
  HomePath: '-'
  ScriptPath: '-'
  ProfilePath: '-'
  UserWorkstations: '-'
  PasswordLastSet: 12/12/2021 9:57:52 AM
  AccountExpires: '%%1794'
  PrimaryGroupId: '515'
  AllowedToDelegateTo: '-'
  OldUacValue: '0x0'
  NewUacValue: '0x80'
  UserAccountControl: "\r\n\t\t%%2087"
  UserParameters: '-'
  SidHistory: '-'
  LogonHours: '%%1793'
  DnsHostName: DC012.threebeesco.com
  ServicePrincipalNames: "\r\n\t\tHOST/DC012.threebeesco.com\r\n\t\tRestrictedKrbHost/DC012.threebeesco.com\r\n\t\tHOST/DC012\r\n\t\tRestrictedKrbHost/DC012"

Community Notes

May alert on golden ticket style attacks.

Sigma Rules

  • Add or Remove Computer from DC
    Detects the creation or removal of a computer. Can be used to detect attacks such as DCShadow via the creation of a new SPN.

References

Event ID 4742 — A computer account was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A computer account was changed.

Subject:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Computer Account That Was Changed:
	Security ID:		%4
	Account Name:		%2
	Account Domain:		%3

Changed Attributes:
	SAM Account Name:	%10
	Display Name:		%11
	User Principal Name:	%12
	Home Directory:		%13
	Home Drive:		%14
	Script Path:		%15
	Profile Path:		%16
	User Workstations:	%17
	Password Last Set:	%18
	Account Expires:		%19
	Primary Group ID:	%20
	AllowedToDelegateTo:	%21
	Old UAC Value:		%22
	New UAC Value:		%23
	User Account Control:	%24
	User Parameters:	%25
	SID History:		%26
	Logon Hours:		%27
	DNS Host Name:		%28
	Service Principal Names:	%29

Additional Information:
	Privileges:		%9

Fields

NameDescription
Account_Name
Account_Domain[Computer Account That Was Changed] Account Name.
Security_ID[Computer Account That Was Changed] Account Domain.
Security_ID[Computer Account That Was Changed] Security ID.
Account_Name[Subject] Security ID.
Account_Domain[Subject] Account Name.
Logon_ID[Subject] Account Domain.
Privileges[Subject] Logon ID.
SAM_Account_Name[Additional Information] Privileges.
Display_Name[Changed Attributes] SAM Account Name.
User_Principal_Name[Changed Attributes] Display Name.
Home_Directory[Changed Attributes] User Principal Name.
Home_Drive[Changed Attributes] Home Directory.
Script_Path[Changed Attributes] Home Drive.
Profile_Path[Changed Attributes] Script Path.
User_Workstations[Changed Attributes] Profile Path.
Password_Last_Set[Changed Attributes] User Workstations.
Account_Expires[Changed Attributes] Password Last Set.
Primary_Group_ID[Changed Attributes] Account Expires.
AllowedToDelegateTo[Changed Attributes] Primary Group ID.
Old_UAC_Value[Changed Attributes] AllowedToDelegateTo.
New_UAC_Value[Changed Attributes] Old UAC Value.
User_Account_Control[Changed Attributes] New UAC Value.
User_Parameters[Changed Attributes] User Account Control.
SID_History[Changed Attributes] User Parameters.
Logon_Hours[Changed Attributes] SID History.
DNS_Host_Name[Changed Attributes] Logon Hours.
Service_Principal_Names[Changed Attributes] DNS Host Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4742
  version: 0
  level: 0
  task: 13825
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-25T13:01:41.935605Z'
  event_record_id: 198239294
  correlation: {}
  execution:
    process_id: 444
    thread_id: 3948
  channel: Security
  computer: DC1.insecurebank.local
  security:
    user_id: ''
event_data:
  ComputerAccountChange: '-'
  TargetUserName: ALICE$
  TargetDomainName: insecurebank
  TargetSid: S-1-5-21-738609754-2819869699-4189121830-1120
  SubjectUserSid: S-1-5-21-738609754-2819869699-4189121830-1108
  SubjectUserName: bob
  SubjectDomainName: insecurebank
  SubjectLogonId: '0x3d8e8db'
  PrivilegeList: '-'
  SamAccountName: '-'
  DisplayName: '-'
  UserPrincipalName: '-'
  HomeDirectory: '-'
  HomePath: '-'
  ScriptPath: '-'
  ProfilePath: '-'
  UserWorkstations: '-'
  PasswordLastSet: '-'
  AccountExpires: '-'
  PrimaryGroupId: '-'
  AllowedToDelegateTo: '-'
  OldUacValue: '-'
  NewUacValue: '-'
  UserAccountControl: '-'
  UserParameters: '-'
  SidHistory: '-'
  LogonHours: '-'
  DnsHostName: '-'
  ServicePrincipalNames: '-'

Sigma Rules

References

Event ID 4743 — A computer account was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A computer account was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Computer:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Target Computer] Account Name.
Account_Domain[Target Computer] Account Domain.
Security_ID[Target Computer] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4743
  version: 0
  level: 0
  task: 13825
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-12T19:36:44.227880Z'
  event_record_id: 16334944
  correlation: {}
  execution:
    process_id: 528
    thread_id: 3156
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  TargetUserName: HIDDEN-PC$
  TargetDomainName: OFFSEC
  TargetSid: S-1-5-21-4230534742-2542757381-3142984815-1167
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1158
  SubjectUserName: lambda-user
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x87e482b'
  PrivilegeList: '-'

Sigma Rules

  • Add or Remove Computer from DC
    Detects the creation or removal of a computer. Can be used to detect attacks such as DCShadow via the creation of a new SPN.

References

Event ID 4744 — A security-disabled local group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled local group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

New Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[New Group] Group Name.
Group_Domain[New Group] Group Domain.
Security_ID[New Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4745 — A security-disabled local group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled local group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Changed Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Changed Attributes] SAM Account Name.
SID_History[Changed Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4746 — A member was added to a security-disabled local group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was added to a security-disabled local group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
MembershipExpirationTime

References

Event ID 4747 — A member was removed from a security-disabled local group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was removed from a security-disabled local group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4748 — A security-disabled local group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled local group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4749 — A security-disabled global group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled global group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4750 — A security-disabled global group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled global group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Changed Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Changed Attributes] SAM Account Name.
SID_History[Changed Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4751 — A member was added to a security-disabled global group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was added to a security-disabled global group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
MembershipExpirationTime

References

Event ID 4752 — A member was removed from a security-disabled global group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was removed from a security-disabled global group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4753 — A security-disabled global group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled global group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4754 — A security-enabled universal group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-enabled universal group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4755 — A security-enabled universal group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-enabled universal group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Changed Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Changed Attributes] SAM Account Name.
SID_History[Changed Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4756 — A member was added to a security-enabled universal group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A member was added to a security-enabled universal group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Account Name:		%3
	Account Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4756
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-12T06:01:13.765572Z'
  event_record_id: 16088267
  correlation: {}
  execution:
    process_id: 528
    thread_id: 3156
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  MemberName: CN=honey-pot1,OU=Test-OU,OU=OFFSEC-COMPANY,DC=offsec,DC=lan
  MemberSid: S-1-5-21-4230534742-2542757381-3142984815-1159
  TargetUserName: Enterprise Admins
  TargetDomainName: OFFSEC
  TargetSid: S-1-5-21-4230534742-2542757381-3142984815-519
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1158
  SubjectUserName: lambda-user
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x80e25b9'
  PrivilegeList: '-'

Community Notes

May capture cross-domain privilege escalation in a multi-forest trust.

References

Event ID 4757 — A member was removed from a security-enabled universal group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was removed from a security-enabled universal group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4758 — A security-enabled universal group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-enabled universal group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4759 — A security-disabled universal group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled universal group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4760 — A security-disabled universal group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled universal group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Changed Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Changed Attributes] SAM Account Name.
SID_History[Changed Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4761 — A member was added to a security-disabled universal group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was added to a security-disabled universal group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
MembershipExpirationTime

References

Event ID 4762 — A member was removed from a security-disabled universal group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was removed from a security-disabled universal group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4763 — A security-disabled universal group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A security-disabled universal group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4764 — A group’s type was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A group?s type was changed.

Subject:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Change Type:			%1

Group:
	Security ID:		%4
	Group Name:		%2
	Group Domain:		%3

Additional Information:
	Privileges:		%9

Fields

NameDescription
Change_Type[Subject] Change Type.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
GroupTypeChange
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4765 — SID History was added to an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

SID History was added to an account.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Target Account:
	Security ID:		%5
	Account Name:		%3
	Account Domain:		%4

Source Account:
	Security ID:		%2
	Account Name:		%1

Additional Information:
	Privileges:		%10
	SID List:			%11

Fields

NameDescription
Account_Name[Source Account] Account Name.
Security_ID[Source Account] Security ID.
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SID_List[Additional Information] SID List.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4765
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2017-06-12T23:39:43.512986Z'
  event_record_id: 8075
  correlation: {}
  execution:
    process_id: 496
    thread_id: 1696
  channel: Security
  computer: 2012r2srv.maincorp.local
  security:
    user_id: ''
event_data:
  SourceUserName: maincorp.local\Domain Admins
  SourceSid: S-1-5-21-2634088540-571122920-1382659128-512
  TargetUserName: Andrei
  TargetDomainName: MAINCORP
  TargetSid: S-1-5-21-2634088540-571122920-1382659128-1104
  SubjectUserSid: S-1-5-21-2634088540-571122920-1382659128-500
  SubjectUserName: Administrator
  SubjectDomainName: MAINCORP
  SubjectLogonId: '0x432c8'
  PrivilegeList: '-'
  SidList: '-'

Community Notes

May indicate DCShadow or similar lateral movement attacks.

Sigma Rules

References

Event ID 4766 — An attempt to add SID History to an account failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An attempt to add SID History to an account failed.

Subject:
	Security ID:
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%4
	Account Name:		%2
	Account Domain:		%3

Source Account
	Account Name:		%1

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Target Account] Account Name.
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Account_Name[Security ID] Account Name.
Account_Domain[Security ID] Account Domain.
Logon_ID[Security ID] Logon ID.
Privileges[Additional Information] Privileges.
SourceUserName
TargetUserName
TargetDomainName
TargetSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

Community Notes

May indicate DCShadow or similar lateral movement attacks.

Sigma Rules

References

Event ID 4767 — A user account was unlocked.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A user account was unlocked.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Fields

NameDescription
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4768 — A Kerberos authentication ticket (TGT) was requested.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A Kerberos authentication ticket (TGT) was requested.

Account Information:
	Account Name:		%1
	Supplied Realm Name:	%2
	User ID:			%3

Service Information:
	Service Name:		%4
	Service ID:		%5

Network Information:
	Client Address:		%10
	Client Port:		%11

Additional Information:
	Ticket Options:		%6
	Result Code:		%7
	Ticket Encryption Type:	%8
	Pre-Authentication Type:	%9

Certificate Information:
	Certificate Issuer Name:		%12
	Certificate Serial Number:	%13
	Certificate Thumbprint:		%14

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Supplied_Realm_Name[Account Information] Supplied Realm Name.
User_ID[Account Information] User ID.
Service_Name[Service Information] Service Name.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Result_Code[Additional Information] Result Code.
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
PreAuthentication_Type[Additional Information] Pre-Authentication Type.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Certificate_Issuer_Name[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint[Certificate Information] Certificate Thumbprint.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4768
  version: 0
  level: 0
  task: 14339
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2020-07-22T20:29:36.414827Z'
  event_record_id: 887107
  correlation: {}
  execution:
    process_id: 568
    thread_id: 2476
  channel: Security
  computer: 01566s-win16-ir.threebeesco.com
  security:
    user_id: ''
event_data:
  TargetUserName: HD01
  TargetDomainName: THREEBEESCO.COM
  TargetSid: S-1-0-0
  ServiceName: krbtgt/THREEBEESCO.COM
  ServiceSid: S-1-0-0
  TicketOptions: '0x10'
  Status: '0x6'
  TicketEncryptionType: '0xffffffff'
  PreAuthType: '-'
  IpAddress: 172.16.66.1
  IpPort: '55961'
  CertIssuerName: ''
  CertSerialNumber: ''
  CertThumbprint: ''

Community Notes

Kerberos TGT request (consider Pass-the-Ticket, Golden TGT attacks). Requests from a non-interactive source prior to 4769 may indicate ticket replay or Pass-the-Ticket staging.

Sigma Rules

  • Potential AS-REP Roasting via Kerberos TGT Requests
    Detects suspicious Kerberos TGT requests with pre-authentication disabled (Pre-Authentication Type = 0) and Ticket Encryption Type (0x17) i.e, RC4-HMAC. This may indicate an AS-REP Roasting attack, where attackers request AS-REP messages for accounts without pre-authentication and attempt to crack the encrypted ticket offline to recover user passwords.
  • PetitPotam Suspicious Kerberos TGT Request
    Detect suspicious Kerberos TGT requests. Once an attacer obtains a computer certificate by abusing Active Directory Certificate Services in combination with PetitPotam, the next step would be to leverage the certificate for malicious purposes. One way of doing this is to request a Kerberos Ticket Granting Ticket using a tool like Rubeus. This request will generate a 4768 event with some unusual fields depending on the environment. This analytic will require tuning, we recommend filtering Account_Name to the Domain Controller computer accounts.
  • Kerberos Manipulation
    Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.

References

Event ID 4769 — A Kerberos service ticket was requested.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A Kerberos service ticket was requested.

Account Information:
	Account Name:		%1
	Account Domain:		%2
	Logon GUID:		%10

Service Information:
	Service Name:		%3
	Service ID:		%4

Network Information:
	Client Address:		%7
	Client Port:		%8

Additional Information:
	Ticket Options:		%5
	Ticket Encryption Type:	%6
	Failure Code:		%9
	Transited Services:	%11

This event is generated every time access is requested to a resource such as a computer or a Windows service.  The service name indicates the resource to which access was requested.

This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event.  The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.

Ticket options, encryption types, and failure codes are defined in RFC 4120.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Account_Domain[Account Information] Account Domain.
Service_Name[Service Information] Service Name. Indicates the resource to which access was requested.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Failure_Code[Additional Information] Failure Code.
Logon_GUID[Account Information] Logon GUID.
Transited_Services[Additional Information] Transited Services.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4769
  version: 0
  level: 0
  task: 14337
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2021-12-12T17:57:52.277095Z'
  event_record_id: 2982083
  correlation: {}
  execution:
    process_id: 624
    thread_id: 3652
  channel: Security
  computer: 01566s-win16-ir.threebeesco.com
  security:
    user_id: ''
event_data:
  TargetUserName: lgrove@THREEBEESCO.COM
  TargetDomainName: THREEBEESCO.COM
  ServiceName: 01566S-WIN16-IR$
  ServiceSid: S-1-5-21-308926384-506822093-3341789130-35103
  TicketOptions: '0x40810000'
  TicketEncryptionType: '0x12'
  IpAddress: ::ffff:172.16.66.19
  IpPort: '50612'
  Status: '0x0'
  LogonGuid: 58ADC6C7-668E-A999-C52A-384B1CB8E553
  TransmittedServices: '-'

Community Notes

Tickets for hosts that a user previously hasn’t accessed may indicate Pass-the-Ticket or RDP/WMI pivoting. Confirm that the target server is also the host that is contacted, and unusual/vulnerable encryption types (may indicate S4U2Proxy) like RC4. Check for movement between services or SPNs, and unusual service names.

Sigma Rules

  • Kerberoasting Activity - Initial Query
    This rule will collect the data needed to start looking into possible kerberoasting activity. Further analysis or computation within the query is needed focusing on requests from one specific host/IP towards multiple service names within a time period of 5 seconds. You can then set a threshold for the number of requests and time between the requests to turn this into an alert.
  • Kerberos Manipulation
    Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.
  • Suspicious Kerberos RC4 Ticket Encryption
    Detects service ticket requests using RC4 encryption type

References

Event ID 4770 — A Kerberos service ticket was renewed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Kerberos service ticket was renewed.

Account Information:
	Account Name:		%1
	Account Domain:		%2

Service Information:
	Service Name:		%3
	Service ID:		%4

Network Information:
	Client Address:		%7
	Client Port:		%8

Additional Information:
	Ticket Options:		%5
	Ticket Encryption Type:	%6

Ticket options and encryption types are defined in RFC 4120.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Account_Domain[Account Information] Account Domain.
Service_Name[Service Information] Service Name.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
TargetUserName
TargetDomainName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
RequestTicketHash
ResponseTicketHash

References

Event ID 4771 — Kerberos pre-authentication failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Kerberos pre-authentication failed.

Account Information:
	Security ID:		%2
	Account Name:		%1

Service Information:
	Service Name:		%3

Network Information:
	Client Address:		%7
	Client Port:		%8

Additional Information:
	Ticket Options:		%4
	Failure Code:		%5
	Pre-Authentication Type:	%6

Certificate Information:
	Certificate Issuer Name:		%9
	Certificate Serial Number: 	%10
	Certificate Thumbprint:		%11

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Security_ID[Account Information] Security ID.
Service_Name[Service Information] Service Name.
Ticket_Options[Additional Information] Ticket Options. Was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.
Failure_Code[Additional Information] Failure Code.
PreAuthentication_Type[Additional Information] Pre-Authentication Type.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Certificate_Issuer_Name[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint[Certificate Information] Certificate Thumbprint.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4771
  version: 0
  level: 0
  task: 14339
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2020-07-22T20:29:36.425365Z'
  event_record_id: 887114
  correlation: {}
  execution:
    process_id: 568
    thread_id: 2356
  channel: Security
  computer: 01566s-win16-ir.threebeesco.com
  security:
    user_id: ''
event_data:
  TargetUserName: Administrator
  TargetSid: S-1-5-21-308926384-506822093-3341789130-500
  ServiceName: krbtgt/THREEBEESCO.COM
  TicketOptions: '0x10'
  Status: '0x18'
  PreAuthType: '2'
  IpAddress: 172.16.66.1
  IpPort: '55967'
  CertIssuerName: ''
  CertSerialNumber: ''
  CertThumbprint: ''

Community Notes

May indicate password spraying. Pivot on ClientAddress.

Sigma Rules

  • Kerberos Manipulation
    Detects failed Kerberos TGT issue operation. This can be a sign of manipulations of TGT messages by an attacker.

References

Event ID 4772 — A Kerberos authentication ticket request failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Kerberos authentication ticket request failed.

Account Information:
	Account Name:		%1
	Supplied Realm Name:	%2

Service Information:
	Service Name:	%3

Network Information:
	Client Address:	%6
	Client Port:	%7

Additional Information:
	Ticket Options:	%4
	Failure Code:	%5

Ticket options and failure codes are defined in RFC 4120.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Supplied_Realm_Name[Account Information] Supplied Realm Name.
Service_Name[Service Information] Service Name.
Ticket_Options[Additional Information] Ticket Options.
Failure_Code[Additional Information] Failure Code.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
TargetUserName
TargetDomainName
ServiceName
TicketOptions
FailureCode
IpAddress
IpPort

References

Event ID 4773 — A Kerberos service ticket request failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Kerberos service ticket request failed.

Account Information:
	Account Name:		%1
	Account Domain:		%2

Service Information:
	Service Name:	%3

Network Information:
	Client Address:	%6
	Client Port:	%7

Additional Information:
	Ticket Options:	%4
	Failure Code:	%5

Ticket options and failure codes are defined in RFC 4120.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Account_Domain[Account Information] Account Domain.
Service_Name[Service Information] Service Name.
Ticket_Options[Additional Information] Ticket Options.
Failure_Code[Additional Information] Failure Code.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
TargetUserName
TargetDomainName
ServiceName
TicketOptions
FailureCode
IpAddress
IpPort

References

Event ID 4774 — An account was mapped for logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An account was mapped for logon.

Authentication Package:	%1
Account UPN:	%2
Mapped Name:	%3

Fields

NameDescription
Authentication_Package
Account_UPN
Mapped_Name
MappingBy
ClientUserName
MappedName

References

Event ID 4775 — An account could not be mapped for logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An account could not be mapped for logon.

Authentication Package:		%1
Account Name:		%2

Fields

NameDescription
Authentication_Package
Account_Name
ClientUserName
MappingBy

References

Event ID 4776 — The domain controller attempted to validate the credentials for an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The computer attempted to validate the credentials for an account.

Authentication Package:	%1
Logon Account:	%2
Source Workstation:	%3
Error Code:	%4

Fields

NameDescription
PackageNameAuthentication Package.
TargetUserNameLogon Account.
WorkstationSource Workstation.
StatusError Code.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4776
  version: 0
  level: 0
  task: 14336
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-07T16:48:22.599068+00:00'
  event_record_id: 388
  correlation:
    ActivityID: DD7B0B6A-4A9E-0000-E519-7BDD9E4AD801
  execution:
    process_id: 648
    thread_id: 3868
  channel: Security
  computer: WIN-FPV0DSIC9O6
  security:
    user_id: ''
event_data:
  PackageName: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
  TargetUserName: Administrator
  Workstation: WIN-FPV0DSIC9O6
  Status: '0x0'
message: ''

Community Notes

This may capture fall-back NTLM use. Note Workstation (does it list the client? If not, this may be NTLM coercion).

Sigma Rules

References

Event ID 4777 — The domain controller failed to validate the credentials for an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The domain controller failed to validate the credentials for an account.

Authentication Package:	%1
Logon Account:	%2
Source Workstation:	%3
Error Code:	%4

Fields

NameDescription
Authentication_Package
Logon_Account
Source_Workstation
Error_Code
ClientUserName
TargetUserName
Workstation
Status

References

Event ID 4778 — A session was reconnected to a Window Station.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A session was reconnected to a Window Station.

Subject:
	Account Name:		%1
	Account Domain:		%2
	Logon ID:		%3

Session:
	Session Name:		%4

Additional Information:
	Client Name:		%5
	Client Address:		%6

This event is generated when a user reconnects to an existing Terminal Services session, or when a user switches to an existing desktop using Fast User Switching.

Fields

NameDescription
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_Name[Session] Session Name.
Client_Name[Additional Information] Client Name.
Client_Address[Additional Information] Client Address.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4778
  version: 0
  level: 0
  task: 12551
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2021-05-14T21:01:05.831748Z'
  event_record_id: 1829819
  correlation:
    '#attributes':
      ActivityID: A67BE420-4636-0001-36E4-7BA63646D701
  execution:
    process_id: 576
    thread_id: 4904
  channel: Security
  computer: fs01.offsec.lan
  security:
    user_id: ''
event_data:
  AccountName: admmarsid
  AccountDomain: OFFSEC
  LogonID: '0x6a423'
  SessionName: RDP-Tcp#8
  ClientName: JUMP01
  ClientAddress: 10.23.23.9

Community Notes

Useful for tracing session re-use.

References

Event ID 4779 — A session was disconnected from a Window Station.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A session was disconnected from a Window Station.

Subject:
	Account Name:		%1
	Account Domain:		%2
	Logon ID:		%3

Session:
	Session Name:		%4

Additional Information:
	Client Name:		%5
	Client Address:		%6


This event is generated when a user disconnects from an existing Terminal Services session, or when a user switches away from an existing desktop using Fast User Switching.

Fields

NameDescription
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_Name[Session] Session Name.
Client_Name[Additional Information] Client Name.
Client_Address[Additional Information] Client Address.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4779
  version: 0
  level: 0
  task: 12551
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2021-05-14T21:01:05.370030Z'
  event_record_id: 1829816
  correlation:
    '#attributes':
      ActivityID: A67BE420-4636-0001-36E4-7BA63646D701
  execution:
    process_id: 576
    thread_id: 628
  channel: Security
  computer: fs01.offsec.lan
  security:
    user_id: ''
event_data:
  AccountName: admmig
  AccountDomain: OFFSEC
  LogonID: '0x13b5e1e'
  SessionName: RDP-Tcp#8
  ClientName: JUMP01
  ClientAddress: 10.23.23.9

References

Event ID 4780 — The ACL was set on accounts which are members of administrators groups.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The ACL was set on accounts which are members of administrators groups.


Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Target Account:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Additional Information:
	Privileges:		%8

Every hour, the Windows domain controller that holds the primary domain controller (PDC) Flexible Single Master Operation (FSMO) role compares the ACL on all security principal accounts (users, groups, and machine accounts) present for its domain in Active Directory and that are in administrative groups against the ACL on the AdminSDHolder object.  If the ACL on the principal account differs from the ACL on the AdminSDHolder object, then the ACL on the principal account is reset to match the ACL on the AdminSDHolder object and this event is generated.

Fields

NameDescription
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4781 — The name of an account was changed:

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The name of an account was changed:

Subject:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Target Account:
	Security ID:		%4
	Account Domain:		%3
	Old Account Name:	%1
	New Account Name:	%2

Additional Information:
	Privileges:		%9

Fields

NameDescription
OldTargetUserName[Target Account] Old Account Name.
NewTargetUserName[Target Account] New Account Name.
TargetDomainName[Target Account] Account Domain.
TargetSid[Target Account] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
PrivilegeList[Additional Information] Privileges.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4781
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:37.340432+00:00'
  event_record_id: 2857
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  OldTargetUserName: None
  NewTargetUserName: None
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-513
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  PrivilegeList: '-'
message: ''

Community Notes

Attackers may rename an existing, highly privileged account to blend in.

Sigma Rules

References

Event ID 4782 — The password hash an account was accessed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The password hash an account was accessed.

Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6

Target Account:
	Account Name:		%1
	Account Domain:		%2

Fields

NameDescription
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
TargetUserName
TargetDomainName
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Community Notes

May indicate Pass-the-Hash. Legitimate use occurs during AD password migration operations under SYSTEM or a dedicated migration account.

References

Event ID 4783 — A basic application group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A basic application group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4784 — A basic application group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A basic application group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4785 — A member was added to a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was added to a basic application group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
MembershipExpirationTime

References

Event ID 4786 — A member was removed from a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A member was removed from a basic application group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Group Name:		%3
	Group Domain:		%4

Additional Information:
	Privileges:		%10

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4787 — A non-member was added to a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A non-member was added to a basic application group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Account Name:		%3
	Account Domain:		%4

Additional Information:
	Privileges:		%10

A non-member is an account that is explicitly excluded from membership in a basic application group.  Even if the account is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name. Is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4788 — A non-member was removed from a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A non-member was removed from a basic application group.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Member:
	Security ID:		%2
	Account Name:		%1

Group:
	Security ID:		%5
	Account Name:		%3
	Account Domain:		%4

Additional Information:
	Privileges:		%10

A non-member is an account that is explicitly excluded from membership in a basic application group.  Even if the account is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.

Fields

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name. Is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
MemberName
MemberSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4789 — A basic application group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A basic application group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4790 — An LDAP query group was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An LDAP query group was created.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4791 — A basic application group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A basic application group was changed.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Attributes:
	SAM Account Name:	%9
	SID History:		%10

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
SAM_Account_Name[Attributes] SAM Account Name.
SID_History[Attributes] SID History.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SamAccountName
SidHistory

References

Event ID 4792 — An LDAP query group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An LDAP query group was deleted.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Additional Information:
	Privileges:		%8

Fields

NameDescription
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges.
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList

References

Event ID 4793 — The Password Policy Checking API was called.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Password Policy Checking API was called.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Additional Information:
	Caller Workstation:	%5
	Provided Account Name (unauthenticated):	%6
	Status Code:	%7

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Caller_Workstation[Additional Information] Caller Workstation.
Provided_Account_Name_unauthenticated[Additional Information] Provided Account Name (unauthenticated).
Status_Code[Additional Information] Status Code.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Workstation
TargetUserName
Status

References

Event ID 4794 — An attempt was made to set the Directory Services Restore Mode administrator password.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to set the Directory Services Restore Mode
administrator password.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Additional Information:
	Caller Workstation:	%5
	Status Code:	%6

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Caller_Workstation[Additional Information] Caller Workstation.
Status_Code[Additional Information] Status Code.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4794
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2017-06-09T19:21:26.968669Z'
  event_record_id: 3139859
  correlation:
    '#attributes':
      ActivityID: 3B48C871-DFE6-0000-A5C8-483BE6DFD201
  execution:
    process_id: 792
    thread_id: 1648
  channel: Security
  computer: 2016dc.hqcorp.local
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1913345275-1711810662-261465553-500
  SubjectUserName: administrator
  SubjectDomainName: HQCORP
  SubjectLogonId: '0x2f336f'
  Workstation: 2016DC
  Status: '0x0'

Sigma Rules

  • Password Change on Directory Service Restore Mode (DSRM) Account
    Detects potential attempts made to set the Directory Services Restore Mode administrator password. The Directory Service Restore Mode (DSRM) account is a local administrator account on Domain Controllers. Attackers may change the password in order to obtain persistence.

References

Event ID 4797 — An attempt was made to query the existence of a blank password for an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to query the existence of a blank password for an account.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Additional Information:
	Caller Workstation:	%5
	Target Account Name:	%6
	Target Account Domain:	%7

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
Workstation[Additional Information] Caller Workstation.
TargetUserName[Additional Information] Target Account Name.
TargetDomainName[Additional Information] Target Account Domain.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4797
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T00:43:39.992357+00:00'
  event_record_id: 184918
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 1928
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x27844'
  Workstation: WINDEV2310EVAL
  TargetUserName: WDAGUtilityAccount
  TargetDomainName: WINDEV2310EVAL
message: ''

References

Event ID 4798 — A user's local group membership was enumerated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user's local group membership was enumerated.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

User:
	Security ID:		%3
	Account Name:		%1
	Account Domain:		%2

Process Information:
	Process ID:		%8
	Process Name:		%9

Fields

NameDescription
TargetUserName[User] Account Name.
TargetDomainName[User] Account Domain.
TargetSid[User] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
CallerProcessId[Process Information] Process ID.
CallerProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4798
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:35.014146+00:00'
  event_record_id: 2785
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserName: User
  TargetDomainName: WINDEV2310EVAL
  TargetSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  CallerProcessId: '0x57c'
  CallerProcessName: C:\Windows\System32\rundll32.exe
message: ''

References

Event ID 4799 — A security-enabled local group membership was enumerated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A security-enabled local group membership was enumerated.

Subject:
	Security ID:		%4
	Account Name:		%5
	Account Domain:		%6
	Logon ID:		%7

Group:
	Security ID:		%3
	Group Name:		%1
	Group Domain:		%2

Process Information:
	Process ID:		%8
	Process Name:		%9

Fields

NameDescription
TargetUserName[Group] Group Name.
TargetDomainName[Group] Group Domain.
TargetSid[Group] Security ID.
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
CallerProcessId[Process Information] Process ID.
CallerProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4799
  version: 0
  level: 0
  task: 13826
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:50.749994+00:00'
  event_record_id: 2946
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  TargetUserName: Backup Operators
  TargetDomainName: Builtin
  TargetSid: S-1-5-32-551
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  CallerProcessId: '0x138c'
  CallerProcessName: C:\Windows\System32\SearchIndexer.exe
message: ''

References

Event ID 4800 — The workstation was locked.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The workstation was locked.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4
	Session ID:	%5

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_ID[Subject] Session ID.
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
SessionId

Sigma Rules

  • Locked Workstation
    Detects locked workstation session events that occur automatically after a standard period of inactivity.

References

Event ID 4801 — The workstation was unlocked.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The workstation was unlocked.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4
	Session ID:	%5

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_ID[Subject] Session ID.
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
SessionId

References

Event ID 4802 — The screen saver was invoked.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The screen saver was invoked.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4
	Session ID:	%5

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_ID[Subject] Session ID.
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
SessionId

References

Event ID 4803 — The screen saver was dismissed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The screen saver was dismissed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4
	Session ID:	%5

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_ID[Subject] Session ID.
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
SessionId

References

Event ID 4816 — RPC detected an integrity violation while decrypting an incoming message.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

RPC detected an integrity violation while decrypting an incoming message.

Peer Name:	%1
Protocol Sequence:	%2
Security Error:	%3

Fields

NameDescription
Peer_Name
Protocol_Sequence
Security_Error
PeerName
ProtocolSequence
SecurityError

References

Event ID 4817 — Auditing settings on object were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Auditing settings on object were changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7

Auditing Settings:
	Original Security Descriptor:	%8
	New Security Descriptor:		%9

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Original_Security_Descriptor[Auditing Settings] Original Security Descriptor.
New_Security_Descriptor[Auditing Settings] New Security Descriptor.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectServer
ObjectType
ObjectName
OldSd
NewSd

Community Notes

Attackers that wish to suppress object-access logging can clear/replace the global SACL.

References

Event ID 4818 — Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:		%5
	Object Type:		%6
	Object Name:		%7
	Handle ID:		%8

Process Information:
	Process ID:		%9
	Process Name:		%10

Current Central Access Policy results:

	Access Reasons:		%11
Proposed Central Access Policy results that differ from the current Central Access Policy results:

	Access Reasons:		%12

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Handle_ID[Object] Handle ID.
Process_ID[Process Information] Process ID.
Process_Name[Process Information] Process Name.
Access_Reasons[Current Central Access Policy results] Access Reasons.
Access_Reasons[Proposed Central Access Policy results that differ from the current Central Access Policy results] Access Reasons.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectServer
ObjectType
ObjectName
HandleId
ProcessId
ProcessName
AccessReason
StagingReason

References

Event ID 4819 — Central Access Policies on the machine have been changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Central Access Policies on the machine have been changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:		%5
	Object Type:		%6

CAPs Added:%7

CAPs Deleted:%8

CAPs Modified:%9

CAPs As-Is:%10

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
CAPs_Added[Object] CAPs Added.
CAPs_Deleted[Object] CAPs Deleted.
CAPs_Modified[Object] CAPs Modified.
CAPs_AsIs[Object] CAPs As-Is.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectServer
ObjectType
AddedCAPs
DeletedCAPs
ModifiedCAPs
AsIsCAPs

References

Event ID 4820 — A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Account Information:
	Account Name:		%1
	Supplied Realm Name:	%2
	User ID:			%3

Authentication Policy Information:
	Silo Name:		%16
	Policy Name:		%17
	TGT Lifetime:		%18

Device Information:
	Device Name:		%4

Service Information:
	Service Name:		%5
	Service ID:		%6

Network Information:
	Client Address:		%11
	Client Port:		%12

Additional Information:
	Ticket Options:		%7
	Result Code:		%8
	Ticket Encryption Type:	%9
	Pre-Authentication Type:	%10

Certificate Information:
	Certificate Issuer Name:		%13
	Certificate Serial Number:	%14
	Certificate Thumbprint:		%15

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Supplied_Realm_Name[Account Information] Supplied Realm Name.
User_ID[Account Information] User ID.
Device_Name[Device Information] Device Name.
Service_Name[Service Information] Service Name.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Result_Code[Additional Information] Result Code.
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
PreAuthentication_Type[Additional Information] Pre-Authentication Type.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Certificate_Issuer_Name[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint[Certificate Information] Certificate Thumbprint.
Silo_Name[Authentication Policy Information] Silo Name.
Policy_Name[Authentication Policy Information] Policy Name.
TGT_Lifetime[Authentication Policy Information] TGT Lifetime.
TargetUserName
TargetDomainName
TargetSid
DeviceName
ServiceName
ServiceSid
TicketOptions
Status
TicketEncryptionType
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint
SiloName
PolicyName
TGTLifetime

References

Event ID 4821 — A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.

Account Information:
	Account Name:		%1
	Account Domain:		%2
	Logon GUID:		%11

Authentication Policy Information:
	Silo Name:		%13
	Policy Name:		%14

Device Information:
	Device Name:		%3

Service Information:
	Service Name:		%4
	Service ID:		%5

Network Information:
	Client Address:		%8
	Client Port:		%9

Additional Information:
	Ticket Options:		%6
	Ticket Encryption Type:	%7
	Failure Code:		%10
	Transited Services:	%12

This event is generated every time access is requested to a resource such as a computer or a Windows service.  The service name indicates the resource to which access was requested.

This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event.  The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.

Ticket options, encryption types, and failure codes are defined in RFC 4120.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Account_Domain[Account Information] Account Domain.
Device_Name[Device Information] Device Name.
Service_Name[Service Information] Service Name. Indicates the resource to which access was requested.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Failure_Code[Additional Information] Failure Code.
Logon_GUID[Account Information] Logon GUID.
Transited_Services[Additional Information] Transited Services.
Silo_Name[Authentication Policy Information] Silo Name.
Policy_Name[Authentication Policy Information] Policy Name.
TargetUserName
TargetDomainName
DeviceName
ServiceName
ServiceSid
TicketOptions
TicketEncryptionType
IpAddress
IpPort
Status
LogonGuid
TransitedServices
SiloName
PolicyName

References

Event ID 4822 — NTLM authentication failed because the account was a member of the Protected User group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

NTLM authentication failed because the account was a member of the Protected User group.

Account Name:	%1
Device Name:	%2
Error Code:	%3

Fields

NameDescription
Account_Name
Device_Name
Error_Code
AccountName
DeviceName
Status

References

Event ID 4823 — NTLM authentication failed because access control restrictions are required.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

NTLM authentication failed because access control restrictions are required.

Account Name:	%1
Device Name:	%2
Error Code:	%3

Authentication Policy Information:
	Silo Name:	%4
	PolicyName:	%5

Fields

NameDescription
Account_Name
Device_Name
Error_Code
Silo_Name[Authentication Policy Information] Silo Name.
PolicyName[Authentication Policy Information] PolicyName.
AccountName
DeviceName
Status
SiloName

References

Event ID 4824 — Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.

Account Information:
	Security ID:		%2
	Account Name:		%1

Service Information:
	Service Name:		%3

Network Information:
	Client Address:		%7
	Client Port:		%8

Additional Information:
	Ticket Options:		%4
	Failure Code:		%5
	Pre-Authentication Type:	%6

Certificate Information:
	Certificate Issuer Name:		%9
	Certificate Serial Number: 	%10
	Certificate Thumbprint:		%11

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.

Fields

NameDescription
Account_Name[Account Information] Account Name.
Security_ID[Account Information] Security ID.
Service_Name[Service Information] Service Name.
Ticket_Options[Additional Information] Ticket Options. Was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.
Failure_Code[Additional Information] Failure Code.
PreAuthentication_Type[Additional Information] Pre-Authentication Type.
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Certificate_Issuer_Name[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint[Certificate Information] Certificate Thumbprint.
TargetUserName
TargetSid
ServiceName
TicketOptions
Status
PreAuthType
IpAddress
IpPort
CertIssuerName
CertSerialNumber
CertThumbprint

References

Event ID 4825 — A user was denied the access to Remote Desktop.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group.

Subject:
	User Name:	%1
	Domain:		%2
	Logon ID:	%3

Additional Information:
	Client Address:	%4


This event is generated when an authenticated user who is not allowed to log on remotely attempts to connect to this computer through Remote Desktop.

Fields

NameDescription
User_Name[Subject] User Name.
Domain[Subject] Domain.
Logon_ID[Subject] Logon ID.
Client_Address[Additional Information] Client Address.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4825
  version: 0
  level: 0
  task: 12551
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2020-07-12T05:27:05.579704Z'
  event_record_id: 1231498
  correlation: {}
  execution:
    process_id: 464
    thread_id: 992
  channel: Security
  computer: fs02.offsec.lan
  security:
    user_id: ''
event_data:
  AccountName: svc6test1
  AccountDomain: OFFSEC
  LogonID: '0x3457272'
  ClientAddress: 10.23.23.9

Sigma Rules

  • Denied Access To Remote Desktop
    This event is generated when an authenticated user who is not allowed to log on remotely attempts to connect to this computer through Remote Desktop. Often, this event can be generated by attackers when searching for available windows servers in the network.

References

Event ID 4826 — Boot Configuration Data loaded.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Boot Configuration Data loaded.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

General Settings:
	Load Options:		%5
	Advanced Options:		%6
	Configuration Access Policy:	%7
	System Event Logging:	%8
	Kernel Debugging:	%9
	VSM Launch Type:	%10

Signature Settings:
	Test Signing:		%11
	Flight Signing:		%12
	Disable Integrity Checks:	%13

HyperVisor Settings:
	HyperVisor Load Options:	%14
	HyperVisor Launch Type:	%15
	HyperVisor Debugging:	%16

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
LoadOptions[General Settings] Load Options.
AdvancedOptions[General Settings] Advanced Options.
ConfigAccessPolicy[General Settings] Configuration Access Policy.
RemoteEventLogging[General Settings] System Event Logging.
KernelDebug[General Settings] Kernel Debugging.
VsmLaunchType[General Settings] VSM Launch Type.
TestSigning[Signature Settings] Test Signing.
FlightSigning[Signature Settings] Flight Signing.
DisableIntegrityChecks[Signature Settings] Disable Integrity Checks.
HypervisorLoadOptions[HyperVisor Settings] HyperVisor Load Options.
HypervisorLaunchType[HyperVisor Settings] HyperVisor Launch Type.
HypervisorDebug[HyperVisor Settings] HyperVisor Debugging.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4826
  version: 0
  level: 0
  task: 13573
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:19.637649+00:00'
  event_record_id: 2743
  correlation: {}
  execution:
    process_id: 4
    thread_id: 96
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: '-'
  SubjectDomainName: '-'
  SubjectLogonId: '0x3e7'
  LoadOptions: '-'
  AdvancedOptions: '%%1843'
  ConfigAccessPolicy: '%%1846'
  RemoteEventLogging: '%%1843'
  KernelDebug: '%%1843'
  VsmLaunchType: '%%1849'
  TestSigning: '%%1843'
  FlightSigning: '%%1843'
  DisableIntegrityChecks: '%%1843'
  HypervisorLoadOptions: '-'
  HypervisorLaunchType: '%%1849'
  HypervisorDebug: '%%1843'
message: ''

References

Event ID 4830 — SID History was removed from an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

SID History was removed from an account.

Subject:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9

Target Account:
	Security ID:		%5
	Account Name:		%3
	Account Domain:		%4

Additional Information:
	Privileges:		%10
	SID List:			%11

Fields

NameDescription
Account_Name
Account_Domain
Security_ID[Target Account] Account Name.
Security_ID[Target Account] Account Domain.
Account_Name[Target Account] Security ID.
Account_Domain[Subject] Security ID.
Logon_ID[Subject] Account Name.
Privileges[Subject] Account Domain.
SID_List[Subject] Logon ID.
SourceUserName
SourceSid
TargetUserName
TargetDomainName
TargetSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
PrivilegeList
SidList

References

Event ID 4864 — A namespace collision was detected.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A namespace collision was detected.

Target Type:	%1
Target Name:	%2
Forest Root:	%3
Top Level Name:	%4
DNS Name:	%5
NetBIOS Name:	%6
Security ID:		%7
New Flags:	%8

Fields

NameDescription
Target_Type
Target_Name
Forest_Root
Top_Level_Name
DNS_Name
NetBIOS_Name
Security_ID
New_Flags
CollisionTargetType
CollisionTargetName
ForestRoot
TopLevelName
DnsName
NetbiosName
DomainSid
Flags

References

Event ID 4865 — A trusted forest information entry was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A trusted forest information entry was added.

Subject:
	Security ID:		%10
	Account Name:		%11
	Account Domain:		%12
	Logon ID:		%13

Trust Information:
	Forest Root:	%1
	Forest Root SID:	%2
	Operation ID:	%3
	Entry Type:	%4
	Flags:	%5
	Top Level Name:	%6
	DNS Name:	%7
	NetBIOS Name:	%8
	Domain SID:	%9

Fields

NameDescription
Forest_Root[Trust Information] Forest Root.
Forest_Root_SID[Trust Information] Forest Root SID.
Operation_ID[Trust Information] Operation ID.
Entry_Type[Trust Information] Entry Type.
Flags[Trust Information] Flags.
Top_Level_Name[Trust Information] Top Level Name.
DNS_Name[Trust Information] DNS Name.
NetBIOS_Name[Trust Information] NetBIOS Name.
Domain_SID[Trust Information] Domain SID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4865
  version: 0
  level: 0
  task: 13569
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2024-06-22T14:02:41.749935Z'
  event_record_id: 3175613
  correlation: {}
  execution:
    process_id: 596
    thread_id: 3360
  channel: Security
  computer: CDCWTRDC01.mypartner.lan
  security:
    user_id: ''
event_data:
  ForestRoot: rootblue.lan
  ForestRootSid: S-1-5-21-392370121-190461309-2151315433
  OperationId: '0xffadf358'
  EntryType: 0
  Flags: 0
  TopLevelName: rootblue.lan
  DnsName: '-'
  NetbiosName: '-'
  DomainSid: S-1-0-0
  SubjectUserSid: S-1-5-21-1407145384-2259788832-4099636412-500
  SubjectUserName: Administrator
  SubjectDomainName: MYPARTNER
  SubjectLogonId: '0xffad8559'

References

Event ID 4866 — A trusted forest information entry was removed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A trusted forest information entry was removed.

Subject:
	Security ID:		%10
	Account Name:		%11
	Account Domain:		%12
	Logon ID:		%13

Trust Information:
	Forest Root:	%1
	Forest Root SID:	%2
	Operation ID:	%3
	Entry Type:	%4
	Flags:	%5
	Top Level Name:	%6
	DNS Name:	%7
	NetBIOS Name:	%8
	Domain SID:	%9

Fields

NameDescription
Forest_Root[Trust Information] Forest Root.
Forest_Root_SID[Trust Information] Forest Root SID.
Operation_ID[Trust Information] Operation ID.
Entry_Type[Trust Information] Entry Type.
Flags[Trust Information] Flags.
Top_Level_Name[Trust Information] Top Level Name.
DNS_Name[Trust Information] DNS Name.
NetBIOS_Name[Trust Information] NetBIOS Name.
Domain_SID[Trust Information] Domain SID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
ForestRoot
ForestRootSid
OperationId
EntryType
TopLevelName
DnsName
NetbiosName
DomainSid
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4867 — A trusted forest information entry was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A trusted forest information entry was modified.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Trust Information:
	Forest Root:	%5
	Forest Root SID:	%6
	Operation ID:	%7
	Entry Type:	%8
	Flags:	%9
	Top Level Name:	%10
	DNS Name:	%11
	NetBIOS Name:	%12
	Domain SID:	%13

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Forest_Root[Trust Information] Forest Root.
Forest_Root_SID[Trust Information] Forest Root SID.
Operation_ID[Trust Information] Operation ID.
Entry_Type[Trust Information] Entry Type.
Flags[Trust Information] Flags.
Top_Level_Name[Trust Information] Top Level Name.
DNS_Name[Trust Information] DNS Name.
NetBIOS_Name[Trust Information] NetBIOS Name.
Domain_SID[Trust Information] Domain SID.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ForestRoot
ForestRootSid
OperationId
EntryType
TopLevelName
DnsName
NetbiosName
DomainSid

References

Event ID 4868 — The certificate manager denied a pending certificate request.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The certificate manager denied a pending certificate request.
	
Request ID:	%1

Fields

NameDescription
Request_ID
RequestId
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4869 — Certificate Services received a resubmitted certificate request.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services received a resubmitted certificate request.
	
Request ID:	%1

Fields

NameDescription
Request_ID
RequestId
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4870 — Certificate Services revoked a certificate.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services revoked a certificate.
	
Serial Number:	%1
Reason:	%2

Fields

NameDescription
Serial_Number
Reason
CertificateSerialNumber
RevocationReason
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4871 — Certificate Services received a request to publish the certificate revocation list (CRL).

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services received a request to publish the certificate revocation list (CRL).
	
Next Update:	%1
Publish Base:	%2
Publish Delta:	%3

Fields

NameDescription
Next_Update
Publish_Base
Publish_Delta
NextUpdate
NextPublishForBaseCRL
NextPublishForDeltaCRL
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4872 — Certificate Services published the certificate revocation list (CRL).

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services published the certificate revocation list (CRL).
	
Base CRL:	%1
CRL Number:	%2
Key Container:	%3
Next Publish:	%4
Publish URLs:	%5

Fields

NameDescription
Base_CRL
CRL_Number
Key_Container
Next_Publish
Publish_URLs
IsBaseCRL
CRLNumber
KeyContainer
NextPublish
PublishURLs

References

Event ID 4873 — A certificate request extension changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A certificate request extension changed.
	
Request ID:	%1
Name:	%2
Type:	%3
Flags:	%4
Data:	%5

Fields

NameDescription
Request_ID
Name
Type
Flags
Data
RequestId
ExtensionName
ExtensionDataType
ExtensionPolicyFlags
ExtensionData
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4874 — One or more certificate request attributes changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

One or more certificate request attributes changed.
	
Request ID:	%1
Attributes:	%2

Fields

NameDescription
Request_ID
Attributes
RequestId
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4875 — Certificate Services received a request to shut down.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services received a request to shut down.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4876 — Certificate Services backup started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Certificate Services backup started.

Backup Type:	%1

Fields

NameDescription
Backup_Type

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4876
  version: 0
  level: 0
  task: 12805
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2024-09-03T10:41:30.959534Z'
  event_record_id: 376329
  correlation:
    '#attributes':
      ActivityID: D702B00C-FB0E-0000-8CB1-02D70EFBDA01
  execution:
    process_id: 640
    thread_id: 4156
  channel: Security
  computer: CDCWPKI01.rootblue.lan
  security:
    user_id: ''
event_data:
  BackupType: '1'
  SubjectUserSid: S-1-5-21-392370121-190461309-2151315433-1108
  SubjectUserName: domadm
  SubjectDomainName: ROOTBLUE
  SubjectLogonId: '0x91861a6'

References

Event ID 4877 — Certificate Services backup completed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Certificate Services backup completed.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4877
  version: 0
  level: 0
  task: 12805
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2024-09-03T10:41:31.145540Z'
  event_record_id: 376330
  correlation:
    '#attributes':
      ActivityID: D702B00C-FB0E-0000-8CB1-02D70EFBDA01
  execution:
    process_id: 640
    thread_id: 4156
  channel: Security
  computer: CDCWPKI01.rootblue.lan
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-392370121-190461309-2151315433-1108
  SubjectUserName: domadm
  SubjectDomainName: ROOTBLUE
  SubjectLogonId: '0x91861a6'

References

Event ID 4878 — Certificate Services restore started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services restore started.

References

Event ID 4879 — Certificate Services restore completed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services restore completed.

References

Event ID 4880 — Certificate Services started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services started.
	
Certificate Database Hash:	%1
Private Key Usage Count:	%2
CA Certificate Hash:	%3
CA Public Key Hash:	%4

Fields

NameDescription
Certificate_Database_Hash
Private_Key_Usage_Count
CA_Certificate_Hash
CA_Public_Key_Hash
CertificateDatabaseHash
PrivateKeyUsageCount
CACertificateHash
CAPublicKeyHash

References

Event ID 4881 — Certificate Services stopped.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services stopped.
	
Certificate Database Hash:	%1
Private Key Usage Count:	%2
CA Certificate Hash:	%3
CA Public Key Hash:	%4

Fields

NameDescription
Certificate_Database_Hash
Private_Key_Usage_Count
CA_Certificate_Hash
CA_Public_Key_Hash
CertificateDatabaseHash
PrivateKeyUsageCount
CACertificateHash
CAPublicKeyHash

References

Event ID 4882 — The security permissions for Certificate Services changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The security permissions for Certificate Services changed.
	
%1

Fields

NameDescription
SecuritySettings
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Community Notes

Records changes to a CA ACL, may indicate privilege escalation via addition of rogue accounts. Critical for detecting AD CS abuse.

References

Event ID 4883 — Certificate Services retrieved an archived key.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services retrieved an archived key.
	
Request ID:	%1

Fields

NameDescription
Request_ID
RequestId
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4884 — Certificate Services imported a certificate into its database.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services imported a certificate into its database.
	
Certificate:	%1
Request ID:	%2

Fields

NameDescription
Certificate
Request_ID
RequestId
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4885 — The audit filter for Certificate Services changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The audit filter for Certificate Services changed.
	
Filter:	%1

Fields

NameDescription
Filter

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4885
  version: 0
  level: 0
  task: 12805
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2024-09-03T10:42:09.373562Z'
  event_record_id: 376331
  correlation:
    '#attributes':
      ActivityID: D702B00C-FB0E-0000-8CB1-02D70EFBDA01
  execution:
    process_id: 640
    thread_id: 4156
  channel: Security
  computer: CDCWPKI01.rootblue.lan
  security:
    user_id: ''
event_data:
  AuditFilter: '111'
  SubjectUserSid: S-1-5-21-392370121-190461309-2151315433-1108
  SubjectUserName: domadm
  SubjectDomainName: ROOTBLUE
  SubjectLogonId: '0x91861a6'

Community Notes

May be a prelude to AD CS abuse, ie, ESC1/ESC5.

References

Event ID 4886 — Certificate Services received a certificate request.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services received a certificate request.
	
Request ID:	%1
Requester:	%2
Attributes:	%3

Fields

NameDescription
Request_ID
Requester
Attributes
RequestId
Subject
SubjectAlternativeName
CertificateTemplate
RequestOSVersion
RequestCSPProvider
RequestClientInfo
AuthenticationService
AuthenticationLevel
DCOMorRPC

References

Event ID 4887 — Certificate Services approved a certificate request and issued a certificate.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services approved a certificate request and issued a certificate.
	
Request ID:	%1
Requester:	%2
Attributes:	%3
Disposition:	%4
SKI:		%5
Subject:	%6

Fields

NameDescription
Request_ID
Requester
Attributes
Disposition
SKI
Subject
RequestId
SubjectKeyIdentifier
SubjectAlternativeName
CertificateTemplate
SerialNumber
AuthenticationService
AuthenticationLevel
DCOMorRPC

References

Event ID 4888 — Certificate Services denied a certificate request.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services denied a certificate request.
	
Request ID:	%1
Requester:	%2
Attributes:	%3
Disposition:	%4
SKI:		%5
Subject:	%6

Fields

NameDescription
Request_ID
Requester
Attributes
Disposition
SKI
Subject
RequestId
SubjectKeyIdentifier
AuthenticationService
AuthenticationLevel
DCOMorRPC

References

Event ID 4889 — Certificate Services set the status of a certificate request to pending.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services set the status of a certificate request to pending.
	
Request ID:	%1
Requester:	%2
Attributes:	%3
Disposition:	%4
SKI:		%5
Subject:	%6

Fields

NameDescription
Request_ID
Requester
Attributes
Disposition
SKI
Subject
RequestId
SubjectKeyIdentifier
AuthenticationService
AuthenticationLevel
DCOMorRPC

References

Event ID 4890 — The certificate manager settings for Certificate Services changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The certificate manager settings for Certificate Services changed.
	
Enable:	%1

%2

Fields

NameDescription
Enable
EnableRestrictedPermissions
RestrictedPermissions
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Community Notes

May indicate tampering with permissions to issue trusted certificates and impersonate any domain principal. Can detect AD CS abuse techniques, ie ESC1. Any Subject SID that is not NT AUTHORITY\SYSTEM or approved service identity indicates unauthorized privilege abuse.

References

Event ID 4891 — A configuration entry changed in Certificate Services.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A configuration entry changed in Certificate Services.
	
Node:	%1
Entry:	%2
Value:	%3

Fields

NameDescription
Node
Entry
Value
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4892 — A property of Certificate Services changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A property of Certificate Services changed.
	
Property:	%1
Index:	%2
Type:	%3
Value:	%4

Fields

NameDescription
Property
Index
Type
Value
PropertyName
PropertyIndex
PropertyType
PropertyValue
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4893 — Certificate Services archived a key.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services archived a key.
	
Request ID:	%1
Requester:	%2
KRA Hashes:	%3

Fields

NameDescription
Request_ID
Requester
KRA_Hashes
RequestId
KRAHashes

References

Event ID 4894 — Certificate Services imported and archived a key.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services imported and archived a key.
	
Request ID:	%1

Fields

NameDescription
Request_ID
RequestId
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4895 — Certificate Services published the CA certificate to Active Directory Domain Services.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services published the CA certificate to Active Directory Domain Services.
	
Certificate Hash:	%1
Valid From:	%2
Valid To:		%3

Fields

NameDescription
Certificate_Hash
Valid_From
Valid_To
CertificateHash
ValidFrom
ValidTo

References

Event ID 4896 — One or more rows have been deleted from the certificate database.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

One or more rows have been deleted from the certificate database.
	
Table ID:	%1
Filter:	%2
Rows Deleted:	%3

Fields

NameDescription
Table_ID
Filter
Rows_Deleted
TableId
RowsDeleted
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 4897 — Role separation enabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Role separation enabled:	%1

Fields

NameDescription
Role_separation_enabled
RoleSeparationEnabled

References

Event ID 4898 — Certificate Services loaded a template.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services loaded a template.

%1 v%2 (Schema V%3)
%4
%5

Template Information:
	Template Content:		%7
	Security Descriptor:		%8

Additional Information:
	Domain Controller:	%6

Fields

NameDescription
Domain_Controller
Template_Content
Security_Descriptor
TemplateInternalName
TemplateVersion
TemplateSchemaVersion
TemplateOID
TemplateDSObjectFQDN
DCDNSName
TemplateContent
SecurityDescriptor

Sigma Rules

References

Event ID 4899 — A Certificate Services template was updated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Certificate Services template was updated.

%1 v%2 (Schema V%3)
%4
%5

Template Change Information:
	Old Template Content:	%8
	New Template Content:		%7

Additional Information:
	Domain Controller:	%6

Fields

NameDescription
Domain_Controller
New_Template_Content
Old_Template_Content
TemplateInternalName
TemplateVersion
TemplateSchemaVersion
TemplateOID
TemplateDSObjectFQDN
DCDNSName
NewTemplateContent
OldTemplateContent

Sigma Rules

References

Event ID 4900 — Certificate Services template security was updated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Certificate Services template security was updated.

%1 v%2 (Schema V%3)
%4
%5

Template Change Information:
	Old Template Content:		%9
	New Template Content:	%7
	Old Security Descriptor:		%10
	New Security Descriptor:		%8

Additional Information:
	Domain Controller:	%6

Fields

NameDescription
Domain_Controller
New_Template_Content
New_Security_Descriptor
Old_Template_Content
Old_Security_Descriptor
TemplateInternalName
TemplateVersion
TemplateSchemaVersion
TemplateOID
TemplateDSObjectFQDN
DCDNSName
NewTemplateContent
NewSecurityDescriptor
OldTemplateContent
OldSecurityDescriptor

References

Event ID 4902 — The Per-user audit policy table was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The Per-user audit policy table was created.

Number of Elements:	%1
Policy ID:	%2

Fields

NameDescription
PuaCountNumber of Elements.
PuaPolicyIdPolicy ID.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4902
  version: 0
  level: 0
  task: 13568
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:28.032941+00:00'
  event_record_id: 2756
  correlation: {}
  execution:
    process_id: 808
    thread_id: 860
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  PuaCount: 0
  PuaPolicyId: '0xa128'
message: ''

References

Event ID 4904 — An attempt was made to register a security event source.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to register a security event source.

Subject :
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Process:
	Process ID:	%7
	Process Name:	%8

Event Source:
	Source Name:	%5
	Event Source ID:	%6

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
AuditSourceName[Event Source] Source Name.
EventSourceId[Event Source] Event Source ID.
ProcessId[Process] Process ID.
ProcessName[Process] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4904
  version: 0
  level: 0
  task: 13568
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:19.368595+00:00'
  event_record_id: 25620
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 664
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WIN-TKC15D7KHUR$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  AuditSourceName: IIS-METABASE
  EventSourceId: '0x21062'
  ProcessId: '0x648'
  ProcessName: C:\Windows\System32\inetsrv\inetinfo.exe
message: ''

Sigma Rules

References

Event ID 4905 — An attempt was made to unregister a security event source.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An attempt was made to unregister a security event source.

Subject
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Process:
	Process ID:	%7
	Process Name:	%8

Event Source:
	Source Name:	%5
	Event Source ID:	%6

Fields

NameDescription
Security_ID
Account_Name
Account_Domain
Logon_ID
Source_Name[Event Source] Source Name.
Event_Source_ID[Event Source] Event Source ID.
Process_ID[Process] Process ID.
Process_Name[Process] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4905
  version: 0
  level: 0
  task: 13568
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2013-10-23T16:26:16.473750Z'
  event_record_id: 135
  correlation: {}
  execution:
    process_id: 508
    thread_id: 1032
  channel: Security
  computer: IE8Win7
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WIN-QALA5Q3KJ43$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  AuditSourceName: VSSAudit
  EventSourceId: '0xe5eb0'
  ProcessId: '0x9fc'
  ProcessName: C:\Windows\System32\VSSVC.exe

Sigma Rules

References

Event ID 4906 — The CrashOnAuditFail value has changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The CrashOnAuditFail value has changed.

New Value of CrashOnAuditFail:	%1

Fields

NameDescription
CrashOnAuditFailValue

References

Event ID 4907 — Auditing settings on object were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Auditing settings on object were changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Handle ID:	%8

Process Information:
	Process ID:	%11
	Process Name:	%12

Auditing Settings:
	Original Security Descriptor:	%9
	New Security Descriptor:		%10

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ObjectServer[Object] Object Server.
ObjectType[Object] Object Type.
ObjectName[Object] Object Name.
HandleId[Object] Handle ID.
OldSd[Auditing Settings] Original Security Descriptor.
NewSd[Auditing Settings] New Security Descriptor.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4907
  version: 0
  level: 0
  task: 13568
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:39.659624+00:00'
  event_record_id: 2879
  correlation: {}
  execution:
    process_id: 4
    thread_id: 228
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ObjectServer: Security
  ObjectType: File
  ObjectName: C:\Windows\Temp\winre\ExtractedFromWim
  HandleId: '0x5e0'
  OldSd: ''
  NewSd: S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)
  ProcessId: '0x590'
  ProcessName: C:\Windows\System32\oobe\msoobe.exe
message: ''

Community Notes

Captures SACL changes to files, registry keys, and services.

References

Event ID 4908 — Special Groups Logon table modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Special Groups Logon table modified.

Special Groups:	%1

This event is generated when the list of special groups is updated in the registry or through security policy. The updated list of special groups is indicated in the event.

Fields

NameDescription
Special_Groups

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4908
  version: 0
  level: 0
  task: 13568
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-12T06:01:51.798027Z'
  event_record_id: 16088364
  correlation: {}
  execution:
    process_id: 528
    thread_id: 548
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  SidList: '-'

Community Notes

Deleting privileged SIDs will prevent Event ID 4964 from firing. Also appears at every reboot, so IR can compare boot-time record against later changes.

References

Event ID 4909 — The local policy settings for the TBS were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The local policy settings for the TBS were changed.

Old Blocked Ordinals:	%1
New Blocked Ordinals:	%2

Fields

NameDescription
Old_Blocked_Ordinals
New_Blocked_Ordinals
OldBlockedOrdinals
NewBlockedOrdinals

References

Event ID 4910 — The group policy settings for the TBS were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The group policy settings for the TBS were changed.

Group Policy Setting:		Ignore Default Settings
	Old Value:		%1
	New Value:		%2

Group Policy Setting:		Ignore Local Settings
	Old Value:		%3
	New Value:		%4

Old Blocked Ordinals:	%5
New Blocked Ordinals:	%6

Fields

NameDescription
Old_Value
New_Value
Old_Value
New_Value
Old_Blocked_Ordinals
New_Blocked_Ordinals
OldIgnoreDefaultSettings
NewIgnoreDefaultSettings
OldIgnoreLocalSettings
NewIgnoreLocalSettings
OldBlockedOrdinals
NewBlockedOrdinals

References

Event ID 4911 — Resource attributes of the object were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Resource attributes of the object were changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Handle ID:	%8

Process Information:
	Process ID:	%11
	Process Name:	%12

Resource Attributes:
	Original Security Descriptor:	%9
	New Security Descriptor:		%10

Fields

NameDescription
SubjectUserSid[Subject] Security ID.
SubjectUserName[Subject] Account Name.
SubjectDomainName[Subject] Account Domain.
SubjectLogonId[Subject] Logon ID.
ObjectServer[Object] Object Server.
ObjectType[Object] Object Type.
ObjectName[Object] Object Name.
HandleId[Object] Handle ID.
OldSd[Resource Attributes] Original Security Descriptor.
NewSd[Resource Attributes] New Security Descriptor.
ProcessId[Process Information] Process ID.
ProcessName[Process Information] Process Name.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4911
  version: 0
  level: 0
  task: 13570
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:51:41.950925+00:00'
  event_record_id: 300251
  correlation: {}
  execution:
    process_id: 4
    thread_id: 5816
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x27844'
  ObjectServer: Security
  ObjectType: File
  ObjectName: C:\Users\User\AppData\Local\Temp\763cba47-20ad-4480-91e6-3dc02233f103.tmp
  HandleId: '0x1d6c'
  OldSd: ''
  NewSd: S:ARAI(RA;;;;;WD;("IMAGELOAD",TU,0x0,1))
  ProcessId: '0x33f0'
  ProcessName: C:\Program Files\Google\Chrome\Application\chrome.exe
message: ''

References

Event ID 4912 — Per User Audit Policy was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Per User Audit Policy was changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Policy For Account:
	Security ID:		%5

Policy Change Details:
	Category:	%6
	Subcategory:	%7
	Subcategory GUID:	%8
	Changes:	%9

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Security_ID[Policy For Account] Security ID.
Category[Policy Change Details] Category.
Subcategory[Policy Change Details] Subcategory.
Subcategory_GUID[Policy Change Details] Subcategory GUID.
Changes[Policy Change Details] Changes.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetUserSid
CategoryId
SubcategoryId
SubcategoryGuid
AuditPolicyChanges

Community Notes

If Changes is set to None or Failure include removed, this may be an attempt to hide activity. Pair with 4719, 4902, and 4624 to reconstruct a timeline.

References

Event ID 4913 — Central Access Policy on the object was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Central Access Policy on the object was changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Object Server:	%5
	Object Type:	%6
	Object Name:	%7
	Handle ID:	%8

Process Information:
	Process ID:	%11
	Process Name:	%12

Central Policy ID:
	Original Security Descriptor:	%9
	New Security Descriptor:		%10

Fields

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Handle_ID[Object] Handle ID.
Original_Security_Descriptor[Central Policy ID] Original Security Descriptor.
New_Security_Descriptor[Central Policy ID] New Security Descriptor.
Process_ID[Process Information] Process ID.
Process_Name[Process Information] Process Name.
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectServer
ObjectType
ObjectName
HandleId
OldSd
NewSd
ProcessId
ProcessName

References

Event ID 4928 — An Active Directory replica source naming context was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An Active Directory replica source naming context was established.

Destination DRA:	%1
Source DRA:	%2
Source Address:	%3
Naming Context:	%4
Options:		%5
Status Code:	%6

Fields

NameDescription
Destination_DRA
Source_DRA
Source_Address
Naming_Context
Options
Status_Code
DestinationDRA
SourceDRA
SourceAddr
NamingContext
StatusCode

References

Event ID 4929 — An Active Directory replica source naming context was removed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An Active Directory replica source naming context was removed.

Destination DRA:	%1
Source DRA:	%2
Source Address:	%3
Naming Context:	%4
Options:		%5
Status Code:	%6

Fields

NameDescription
Destination_DRA
Source_DRA
Source_Address
Naming_Context
Options
Status_Code

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4929
  version: 1
  level: 0
  task: 14083
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2021-04-27T11:04:45.557748Z'
  event_record_id: 138520244
  correlation:
    '#attributes':
      ActivityID: 9816F041-2BBE-0000-53F0-1698BE2BD701
  execution:
    process_id: 548
    thread_id: 5276
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  DestinationDRA: CN=NTDS Settings,CN=ROOTDC1,CN=Servers,CN=OFFSEC-PREMISE,CN=Sites,CN=Configuration,DC=offsec,DC=lan
  SourceDRA: '-'
  SourceAddr: jump01.offsec.lan
  NamingContext: DC=offsec,DC=lan
  Options: 16
  StatusCode: 8452

References

Event ID 4930 — An Active Directory replica source naming context was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An Active Directory replica source naming context was modified.

Destination DRA:	%1
Source DRA:	%2
Source Address:	%3
Naming Context:	%4
Options:		%5
Status Code:	%6

Fields

NameDescription
Destination_DRA
Source_DRA
Source_Address
Naming_Context
Options
Status_Code
DestinationDRA
SourceDRA
SourceAddr
NamingContext
StatusCode

References

Event ID 4931 — An Active Directory replica destination naming context was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An Active Directory replica destination naming context was modified.

Destination DRA:	%1
Source DRA:	%2
Destination Address:	%3
Naming Context:	%4
Options:		%5
Status Code:	%6

Fields

NameDescription
Destination_DRA
Source_DRA
Destination_Address
Naming_Context
Options
Status_Code
DestinationDRA
SourceDRA
SourceAddr
NamingContext
StatusCode

References

Event ID 4932 — Synchronization of a replica of an Active Directory naming context has begun.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Synchronization of a replica of an Active Directory naming context has begun.

Destination DRA:	%1
Source DRA:	%2
Naming Context:	%3
Options:		%4
Session ID:	%5
Start USN:	%6

Fields

NameDescription
Destination_DRA
Source_DRA
Naming_Context
Options
Session_ID
Start_USN
DestinationDRA
SourceDRA
NamingContext
SessionID
StartUSN

References

Event ID 4933 — Synchronization of a replica of an Active Directory naming context has ended.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Synchronization of a replica of an Active Directory naming context has ended.

Destination DRA:	%1
Source DRA:	%2
Naming Context:	%3
Options:		%4
Session ID:	%5
End USN:	%6
Status Code:	%7

Fields

NameDescription
Destination_DRA
Source_DRA
Naming_Context
Options
Session_ID
End_USN
Status_Code
DestinationDRA
SourceDRA
NamingContext
SessionID
EndUSN
StatusCode

References

Event ID 4934 — Attributes of an Active Directory object were replicated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Attributes of an Active Directory object were replicated.

Session ID:	%1
Object:		%2
Attribute:	%3
Type of change:	%4
New Value:	%5
USN:		%6
Status Code:	%7

Fields

NameDescription
SessionID
Object
Attribute
TypeOfChange
NewValue
USN
StatusCode

References

Event ID 4935 — Replication failure begins.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Replication failure begins.

Replication Event:	%1
Audit Status Code:	%2

Fields

NameDescription
Replication_Event
Audit_Status_Code

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4935
  version: 0
  level: 0
  task: 14083
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2021-04-27T11:04:03.510255Z'
  event_record_id: 138520219
  correlation:
    '#attributes':
      ActivityID: 9816F041-2BBE-0000-53F0-1698BE2BD701
  execution:
    process_id: 548
    thread_id: 5276
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  ReplicationEvent: 1
  AuditStatusCode: 8419

References

Event ID 4936 — Replication failure ends.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Replication failure ends.

Replication Event:	%1
Audit Status Code:	%2
Replication Status Code:	%3

Fields

NameDescription
Replication_Event
Audit_Status_Code
Replication_Status_Code

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4936
  version: 0
  level: 0
  task: 14083
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2021-04-27T11:04:45.556800Z'
  event_record_id: 138520242
  correlation:
    '#attributes':
      ActivityID: 9816F041-2BBE-0000-53F0-1698BE2BD701
  execution:
    process_id: 548
    thread_id: 5276
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  ReplicationEvent: 1
  AuditStatusCode: 8419
  ReplicationStatusCode: 1722

References

Event ID 4937 — A lingering object was removed from a replica.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A lingering object was removed from a replica.

Destination DRA:	%1
Source DRA:	%2
Object:	%3
Options:	%4
Status Code:	%5

Fields

NameDescription
Destination_DRA
Source_DRA
Object
Options
Status_Code
DestinationDRA
SourceDRA
StatusCode

References

Event ID 4944 — The following policy was active when the Windows Firewall started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The following policy was active when the Windows Firewall started.

Group Policy Applied:	%1
Profile Used:	%2
Operational mode:	%3
Allow Remote Administration:	%4
Allow Unicast Responses to Multicast/Broadcast Traffic:	%5
Security Logging:
	Log Dropped Packets:	%6
	Log Successful Connections:	%7

Fields

NameDescription
GroupPolicyApplied
Profile
OperationMode
RemoteAdminEnabled
MulticastFlowsEnabled
LogDroppedPacketsEnabled
LogSuccessfulConnectionsEnabled

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4944
  version: 0
  level: 0
  task: 13571
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:21.036853+00:00'
  event_record_id: 26014
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 664
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  GroupPolicyApplied: 'No'
  Profile: (null)
  OperationMode: 'On'
  RemoteAdminEnabled: Disabled
  MulticastFlowsEnabled: Enabled
  LogDroppedPacketsEnabled: Disabled
  LogSuccessfulConnectionsEnabled: Disabled
message: ''

References

Event ID 4945 — A rule was listed when the Windows Firewall started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A rule was listed when the Windows Firewall started.
	
Profile used:	%1

Rule:
	Rule ID:	%2
	Rule Name:	%3

Fields

NameDescription
ProfileUsed
RuleId
RuleName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4945
  version: 0
  level: 0
  task: 13571
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:21.045018+00:00'
  event_record_id: 26315
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 664
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProfileUsed: (null)
  RuleId: IIS-WebServerRole-FTP-Passive-In-TCP
  RuleName: FTP Server Passive (FTP Passive Traffic-In)
message: ''

References

Event ID 4946 — A change has been made to Windows Firewall exception list. A rule was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to the Windows Firewall exception list. A rule was added.
	
Profile Changed:	%1

Added Rule:
	Rule ID:	%2
	Rule Name:	%3

Fields

NameDescription
ProfileChanged
RuleId
RuleName

Community Notes

Logs rules that open ports or disable filtering. Attackers may add rules to enable implants to communicate with external servers.

References

Event ID 4947 — A change has been made to Windows Firewall exception list. A rule was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to the Windows Firewall exception list. A rule was modified.
	
Profile Changed:	%1

Modified Rule:
	Rule ID:	%2
	Rule Name:	%3

Fields

NameDescription
ProfileChanged
RuleId
RuleName

Event ID 4948 — A change has been made to Windows Firewall exception list. A rule was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to the Windows Firewall exception list. A rule was deleted.
	
Profile Changed:	%1

Deleted Rule:
	Rule ID:	%2
	Rule Name:	%3

Fields

NameDescription
ProfileChanged
RuleId
RuleName

Event ID 4949 — Windows Firewall settings were restored to the default values.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall settings were restored to the default values.

Event ID 4950 — A Windows Firewall setting has changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A Windows Firewall setting was changed.
	
Changed Profile:	%1

New Setting:
	Type:	%2
	Value:	%3

Fields

NameDescription
ProfileChanged
SettingType
SettingValue

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: '{54849625-5478-4994-A5BA-3E3B0328C30D}'
  event_source_name: ''
  event_id: 4950
  version: '0'
  level: '0'
  task: '13571'
  opcode: '0'
  keywords: 9232379236109516800
  time_created: '2021-06-03T19:39:52.893115500Z'
  event_record_id: '1974770'
  correlation:
    '#attributes':
      ActivityID: '{38068009-512D-0000-1D80-06382D51D701}'
  execution:
    process_id: '556'
    thread_id: '2532'
  channel: Security
  computer: fs01.offsec.lan
  security:
    user_id: ''
event_data:
  ProfileChanged: Domain
  SettingType: Enable Windows Firewall
  SettingValue: 'Yes'

Community Notes

Tracks changes to core settings such as disabling a profile (domain, private, public), or default block/allow behavior.

References

Event ID 4951 — A rule has been ignored because its major version number was not recognized by Windows Firewall.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall ignored a rule because its major version number is not recognized.
	
Profile:	%1

Ignored Rule:
	ID:	%2
	Name:	%3

Fields

NameDescription
Profile
RuleId
RuleName

References

Event ID 4952 — Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall ignored parts of a rule because its minor version number is not recognized. Other parts of the rule will be enforced.
	
Profile:	%1

Partially Ignored Rule:
	ID:	%2
	Name:	%3

Fields

NameDescription
Profile
RuleId
RuleName

Event ID 4953 — A rule has been ignored by Windows Firewall because it could not parse the rule.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Windows Firewall ignored a rule because it could not be parsed.
	
Profile:	%1

Reason for Rejection:	%2

Rule:
	ID:	%3
	Name:	%4

Fields

NameDescription
Profile
ReasonForRejection
RuleId
RuleName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4953
  version: 0
  level: 0
  task: 13571
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2022-04-04T13:11:19.737706+00:00'
  event_record_id: 25625
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 668
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  Profile: All
  ReasonForRejection: An error occurred.
  RuleId: MDEServer-1
  RuleName: '-'
message: ''

References

Event ID 4954 — Windows Firewall Group Policy settings has changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Group Policy settings for Windows Firewall were changed, and the new settings were applied.

Event ID 4956 — Windows Firewall has changed the active profile.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall changed the active profile.

New Active Profile:	%1

Fields

NameDescription
ActiveProfile

References

Event ID 4957 — Windows Firewall did not apply the following rule:

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Windows Firewall did not apply the following rule:

Rule Information:
	ID:	%1
	Name:	%2

Error Information:
	Reason:	%3 resolved to an empty set.

Fields

NameDescription
RuleId
RuleName
RuleAttr

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4957
  version: 0
  level: 0
  task: 13571
  opcode: 0
  keywords: 9227875636482146304
  time_created: '2022-04-04T13:13:38.719617+00:00'
  event_record_id: 29324
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 664
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  RuleId: CoreNet-IPHTTPS-In
  RuleName: Core Networking - IPHTTPS (TCP-In)
  RuleAttr: Local Port
message: ''

References

Event ID 4958 — Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:

Rule Information:
	ID:	%1
	Name:	%2

Error Information:
	Error:	%3
	Reason:	%4

Fields

NameDescription
RuleId
RuleName
Error
Reason

References

Event ID 4960 — IPsec dropped an inbound packet that failed an integrity check.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations.

Remote Network Address:	%1
Inbound SA SPI:		%2

Fields

NameDescription
RemoteAddress
SPI

References

Event ID 4961 — IPsec dropped an inbound packet that failed a replay check.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer.

Remote Network Address:	%1
Inbound SA SPI:		%2

Fields

NameDescription
RemoteAddress
SPI

Event ID 4962 — IPsec dropped an inbound packet that failed a replay check.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay.

Remote Network Address:	%1
Inbound SA SPI:		%2

Fields

NameDescription
RemoteAddress
SPI

Event ID 4963 — IPsec dropped an inbound clear text packet that should have been secured.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec dropped an inbound clear text packet that should have been secured. If the remote computer is configured with a Request Outbound IPsec policy, this might be benign and expected.  This can also be caused by the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attempt.

Remote Network Address:	%1
Inbound SA SPI:		%2

Fields

NameDescription
RemoteAddress
SPI

Event ID 4964 — Special groups have been assigned to a new logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Special groups have been assigned to a new logon.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4
	Logon GUID:	%5

New Logon:
	Security ID:		%6
	Account Name:		%7
	Account Domain:		%8
	Logon ID:		%9
	Logon GUID:	%10
	Special Groups Assigned:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
LogonGuid
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
TargetLogonGuid
SidList

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4964
  version: 0
  level: 0
  task: 12548
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2021-04-22T08:51:04.686763Z'
  event_record_id: 435111
  correlation: {}
  execution:
    process_id: 480
    thread_id: 2416
  channel: Security
  computer: fs03vuln.offsec.lan
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: FS03VULN$
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x3e7'
  LogonGuid: 00000000-0000-0000-0000-000000000000
  TargetUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  TargetUserName: admmig
  TargetDomainName: OFFSEC
  TargetLogonId: '0x74872'
  TargetLogonGuid: 00000000-0000-0000-0000-000000000000
  SidList: "\r\n\t\t%{S-1-5-21-4230534742-2542757381-3142984815-1613}"

Community Notes

Detects Domain Admins or other high-value SIDs logging onto non-DC hosts.

References

Event ID 4965 — IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI).

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by malfunctioning hardware that is corrupting packets. If these errors persist, verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations. In that case, if connectivity is not impeded, then these events can be ignored.

Remote Network Address:	%1
Inbound SA SPI:		%2

Fields

NameDescription
RemoteAddress
SPI

Event ID 4976 — During Main Mode negotiation, IPsec received an invalid negotiation packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

During main mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Local Network Address:	%1
Remote Network Address:	%2
Keying Module Name:	%3

Fields

NameDescription
LocalAddress
RemoteAddress
KeyModName

References

Event ID 4977 — During Quick Mode negotiation, IPsec received an invalid negotiation packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

During quick mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Local Network Address:	%1
Remote Network Address:	%2
Keying Module Name:	%3

Fields

NameDescription
LocalAddress
RemoteAddress
KeyModName

Event ID 4978 — During Extended Mode negotiation, IPsec received an invalid negotiation packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

During extended mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Local Network Address:	%1
Remote Network Address:	%2
Keying Module Name:	%3

Fields

NameDescription
LocalAddress
RemoteAddress
KeyModName

Event ID 4979 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec main mode and extended mode security associations were established.

Main Mode Local Endpoint:
	Principal Name:		%1
	Network Address:	%3
	Keying Module Port:	%4

Main Mode Remote Endpoint:
	Principal Name:	%2
	Network Address:	%5
	Keying Module Port:	%6

Main Mode Cryptographic Information:
	Cipher Algorithm:	%8
	Integrity Algorithm:	%9
	Diffie-Hellman Group:	%10

Main Mode Security Association:
	Lifetime (minutes):	%11
	Quick Mode Limit:	%12
	Main Mode SA ID:	%16
	
Main Mode Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	%7
	Role:			%13
	Impersonation State:	%14
	Main Mode Filter ID:	%15

Extended Mode Information:
	Local Principal Name:	%17
	Remote Principal Name:	%18
	Authentication Method:	%19
	Impersonation State:	%20
	Quick Mode Filter ID:	%21

Fields

NameDescription
LocalMMPrincipalName
RemoteMMPrincipalName
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
MMAuthMethod
MMCipherAlg
MMIntegrityAlg
DHGroup
MMLifetime
QMLimit
Role
MMImpersonationState
MMFilterID
MMSAID
LocalEMPrincipalName
RemoteEMPrincipalName
EMAuthMethod
EMImpersonationState
QMFilterID

References

Event ID 4980 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec main mode and extended mode security associations were established.

Main Mode Local Endpoint:
	Principal Name:		%1
	Network Address:	%3
	Keying Module Port:	%4

Main Mode Remote Endpoint:
	Principal Name:	%2
	Network Address:	%5
	Keying Module Port:	%6

Main Mode Cryptographic Information:
	Cipher Algorithm:	%8
	Integrity Algorithm:	%9
	Diffie-Hellman Group:	%10

Main Mode Security Association:
	Lifetime (minutes):	%11
	Quick Mode Limit:	%12
	Main Mode SA ID:	%16
	
Main Mode Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	%7
	Role:			%13
	Impersonation State:	%14
	Main Mode Filter ID:	%15

Extended Mode Local Endpoint:
	Principal Name:	%17
	Certificate SHA Thumbprint:	%18
	Certificate Issuing CA:	%19
	Certificate Root CA:	%20

Extended Mode Remote Endpoint:
	Principal Name:	%21
	Certificate SHA Thumbprint:	%22
	Certificate Issuing CA:	%23
	Certificate Root CA:	%24

Extended Mode Additional Information:
	Authentication Method:	SSL
	Impersonation State:	%25
	Quick Mode Filter ID:	%26

Fields

NameDescription
LocalMMPrincipalName
RemoteMMPrincipalName
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
MMAuthMethod
MMCipherAlg
MMIntegrityAlg
DHGroup
MMLifetime
QMLimit
Role
MMImpersonationState
MMFilterID
MMSAID
LocalEMPrincipalName
LocalEMCertHash
LocalEMIssuingCA
LocalEMRootCA
RemoteEMPrincipalName
RemoteEMCertHash
RemoteEMIssuingCA
RemoteEMRootCA
EMImpersonationState
QMFilterID

References

Event ID 4981 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec main mode and extended mode security associations were established.

Local Endpoint:
	Principal Name:		%1
	Network Address:	%9
	Keying Module Port:	%10

Local Certificate:
	SHA Thumbprint:	%2
	Issuing CA:		%3
	Root CA:		%4

Remote Endpoint:
	Principal Name:		%5
	Network Address:	%11
	Keying Module Port:	%12

Remote Certificate:
	SHA Thumbprint:	%6
	Issuing CA:		%7
	Root CA:		%8

Cryptographic Information:
	Cipher Algorithm:	%13
	Integrity Algorithm:	%14
	Diffie-Hellman Group:	%15

Security Association Information:
	Lifetime (minutes):	%16
	Quick Mode Limit:	%17
	Main Mode SA ID:	%21

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	SSL
	Role:			%18
	Impersonation State:	%19
	Main Mode Filter ID:	%20
	
Extended Mode Information:
	Local Principal Name:	%22
	Remote Principal Name:	%23
	Authentication Method:	%24
	Impersonation State:	%25
	Quick Mode Filter ID:	%26

Fields

NameDescription
LocalMMPrincipalName
LocalMMCertHash
LocalMMIssuingCA
LocalMMRootCA
RemoteMMPrincipalName
RemoteMMCertHash
RemoteMMIssuingCA
RemoteMMRootCA
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
MMCipherAlg
MMIntegrityAlg
DHGroup
MMLifetime
QMLimit
Role
MMImpersonationState
MMFilterID
MMSAID
LocalEMPrincipalName
RemoteEMPrincipalName
EMAuthMethod
EMImpersonationState
QMFilterID

References

Event ID 4982 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec main mode and extended mode security associations were established.

Local Endpoint:
	Principal Name:		%1
	Network Address:	
	Keying Module Port:	%9

Local Certificate:
	SHA Thumbprint:	%2
	Issuing CA:		%3
	Root CA:		%4

Remote Endpoint:
	Principal Name:		%5
	Network Address:	%10
	Keying Module Port:	%11

Remote Certificate:
	SHA Thumbprint:	%6
	Issuing CA:		%7
	Root CA:		%8

Cryptographic Information:
	Cipher Algorithm:	%12
	Integrity Algorithm:	%13
	Diffie-Hellman Group:	%14

Security Association Information:
	Lifetime (minutes):	%15
	Quick Mode Limit:	%16
	Main Mode SA ID:	%20

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	SSL
	Role:			%17
	Impersonation State:	%18
	Main Mode Filter ID:	%19
	
Extended Mode Local Endpoint:
	Principal Name:		%21
	Certificate SHA Thumbprint:	%22
	Certificate Issuing CA:	%23
	Certificate Root CA:	%24

Extended Mode Remote Endpoint:
	Principal Name:		%25
	Certificate SHA Thumbprint:	%26
	Certificate Issuing CA:	%27
	Certificate Root CA:	%28
Extended Mode Additional Information:
	Authentication Method:	SSL
	Impersonation State:	%29
	Quick Mode Filter ID:	%30

Fields

NameDescription
LocalMMPrincipalName
LocalMMCertHash
LocalMMIssuingCA
LocalMMRootCA
RemoteMMPrincipalName
RemoteMMCertHash
RemoteMMIssuingCA
RemoteMMRootCA
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
MMCipherAlg
MMIntegrityAlg
DHGroup
MMLifetime
QMLimit
Role
MMImpersonationState
MMFilterID
MMSAID
LocalEMPrincipalName
LocalEMCertHash
LocalEMIssuingCA
LocalEMRootCA
RemoteEMPrincipalName
RemoteEMCertHash
RemoteEMIssuingCA
RemoteEMRootCA
EMImpersonationState
QMFilterID

References

Event ID 4983 — An IPsec Extended Mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted.


Local Endpoint:
	Principal Name:		%1
	Network Address:	%9
	Keying Module Port:	%10

Local Certificate:
	SHA Thumbprint:	%2
	Issuing CA:		%3
	Root CA:		%4

Remote Endpoint:
	Principal Name:		%5
	Network Address:	%11
	Keying Module Port:	%12

Remote Certificate:
	SHA Thumbprint:	%6
	Issuing CA:		%7
	Root CA:		%8

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	SSL
	Role:			%16
	Impersonation State:	%17
	Quick Mode Filter ID:	%18

Failure Information:
	Failure Point:		%13
	Failure Reason:		%14
	State:			%15

Fields

NameDescription
LocalEMPrincipalName
LocalEMCertHash
LocalEMIssuingCA
LocalEMRootCA
RemoteEMPrincipalName
RemoteEMCertHash
RemoteEMIssuingCA
RemoteEMRootCA
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
FailurePoint
FailureReason
State
Role
EMImpersonationState
QMFilterID

References

Event ID 4984 — An IPsec Extended Mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted.

Local Endpoint:
	Principal Name:		%1
	Network Address:	%3
	Keying Module Port:	%4

Remote Endpoint:
	Principal Name:		%2
	Network Address:	%5
	Keying Module Port:	%6

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	%9
	Role:			%11
	Impersonation State:	%12
	Quick Mode Filter ID:	%13

Failure Information:
	Failure Point:		%7
	Failure Reason:		%8
	State:			%10

Fields

NameDescription
LocalEMPrincipalName
RemoteEMPrincipalName
LocalAddress
LocalKeyModPort
RemoteAddress
RemoteKeyModPort
FailurePoint
FailureReason
EMAuthMethod
State
Role
EMImpersonationState
QMFilterID

References

Event ID 4985 — The state of a transaction has changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The state of a transaction has changed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Transaction Information:
	RM Transaction ID:	%5
	New State:		%6
	Resource Manager:	%7

Process Information:
	Process ID:		%8
	Process Name:		%9

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TransactionId
NewState
ResourceManager
ProcessId
ProcessName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 4985
  version: 0
  level: 0
  task: 12800
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T14:08:17.810656+00:00'
  event_record_id: 34392
  correlation: {}
  execution:
    process_id: 4
    thread_id: 3104
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1958040314-2592322477-2606035944-500
  SubjectUserName: Administrator
  SubjectDomainName: WIN-TKC15D7KHUR
  SubjectLogonId: '0x33bf51'
  TransactionId: B1B0A54B-B418-11EC-8F27-080027EAB5C7
  NewState: 52
  ResourceManager: 64ED659C-9BDD-11EC-AFD4-9083472C0AE8
  ProcessId: '0x12c8'
  ProcessName: C:\Windows\System32\inetsrv\InetMgr.exe
message: ''

References

Event ID 5024 — The Windows Firewall Service has started successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The Windows Firewall service started successfully.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5024
  version: 0
  level: 0
  task: 12292
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:51.345615+00:00'
  event_record_id: 2947
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data: {}
message: ''

References

Event ID 5025 — The Windows Firewall Service has been stopped.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Firewall service was stopped.

Event ID 5027 — The Windows Firewall Service was unable to retrieve the security policy from the local storage.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Firewall service was unable to retrieve the security policy from the local storage. Windows Firewall will continue to enforce the current policy.

Error Code:	%1

Fields

NameDescription
ErrorCode

References

Event ID 5028 — The Windows Firewall Service was unable to parse the new security policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall was unable to parse the new security policy. Windows Firewall will continue to enforce the current policy.

Error Code:	%1

Fields

NameDescription
ErrorCode

Event ID 5029 — The Windows Firewall Service failed to initialize the driver.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Firewall service failed to initialize the driver. Windows Firewall will continue to enforce the current policy.

Error Code:	%1

Fields

NameDescription
ErrorCode

Event ID 5030 — The Windows Firewall Service failed to start.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Firewall service failed to start.

Error Code:	%1

Fields

NameDescription
ErrorCode

Event ID 5031 — The Windows Firewall Service blocked an application from accepting incoming connections on the network.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall blocked an application from accepting incoming connections on the network.

Profiles:		%1
Application:		%2

Fields

NameDescription
Profiles
Application

References

Event ID 5032 — Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.

Error Code:	%1

Fields

NameDescription
ErrorCode

Event ID 5033 — The Windows Firewall Driver has started successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The Windows Firewall Driver started successfully.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5033
  version: 0
  level: 0
  task: 12292
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:42.319074+00:00'
  event_record_id: 2907
  correlation: {}
  execution:
    process_id: 4
    thread_id: 224
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data: {}
message: ''

References

Event ID 5034 — The Windows Firewall Driver has been stopped.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Firewall Driver was stopped.

Event ID 5035 — The Windows Firewall Driver failed to start.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Firewall Driver failed to start.

Error Code:	%1

Fields

NameDescription
ErrorCode

Event ID 5037 — The Windows Firewall Driver detected critical runtime error.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Firewall Driver detected a critical runtime error, terminating.

Error Code:	%1

Fields

NameDescription
ErrorCode

Event ID 5038 — Code integrity determined that the image hash of a file is not valid.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Code integrity determined that the image hash of a file is not valid.  The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.

File Name:	%1

Fields

NameDescription
param1

Community Notes

May indicate that malware attempted to load an unsigned or tampered driver/system file.

Sigma Rules

  • Failed Code Integrity Checks
    Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.

Event ID 5039 — A registry key was virtualized.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A registry key was virtualized.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	Key Name:		%5
	Virtual Key Name:		%6

Process Information:
	Process ID:		%7
	Process Name:		%8

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectPath
ObjectVirtualPath
ProcessId
ProcessName

References

Event ID 5040 — A change has been made to IPsec settings. An Authentication Set was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. An authentication set was added.
	
Profile Changed:		%1

Added Authentication Set:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
AuthenticationSetId
AuthenticationSetName

References

Event ID 5041 — A change has been made to IPsec settings. An Authentication Set was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. An authentication set was modified.
	
Profile Changed:		%1

Modified Authentication Set:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
AuthenticationSetId
AuthenticationSetName

Event ID 5042 — A change has been made to IPsec settings. An Authentication Set was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. An authentication set was deleted.
	
Profile Changed:		%1

Deleted Authentication Set:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
AuthenticationSetId
AuthenticationSetName

Event ID 5043 — A change has been made to IPsec settings. A Connection Security Rule was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. A connection security rule was added.
	
Profile Changed:		%1

Added Connection Security Rule:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
ConnectionSecurityRuleId
ConnectionSecurityRuleName

References

Event ID 5044 — A change has been made to IPsec settings. A Connection Security Rule was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. A connection security rule was modified.
	
Profile Changed:	%1

Modified Connection Security Rule:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
ConnectionSecurityRuleId
ConnectionSecurityRuleName

Event ID 5045 — A change has been made to IPsec settings. A Connection Security Rule was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. A connection security rule was deleted.
	
Profile Changed:	%1

Deleted Connection Security Rule:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
ConnectionSecurityRuleId
ConnectionSecurityRuleName

Event ID 5046 — A change has been made to IPsec settings. A Crypto Set was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. A crypto set was added.
	
Profile Changed:	%1

Added Crypto Set:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
CryptographicSetId
CryptographicSetName

References

Event ID 5047 — A change has been made to IPsec settings. A Crypto Set was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. A crypto set was modified.
	
Profile Changed:	%1

Modified Crypto Set:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
CryptographicSetId
CryptographicSetName

Event ID 5048 — A change has been made to IPsec settings. A Crypto Set was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A change was made to IPsec settings. A crypto set was deleted.
	
Profile Changed:	%1

Deleted Crypto Set:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
CryptographicSetId
CryptographicSetName

Event ID 5049 — An IPsec Security Association was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec security association was deleted.
	
Profile Changed:	%1

Deleted SA:
	ID:			%2
	Name:			%3

Fields

NameDescription
ProfileChanged
IpSecSecurityAssociationId
IpSecSecurityAssociationName

References

Event ID 5050 — An attempt to programmatically disable the Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE) interface was rejected.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An attempt to programmatically disable Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE) interface was rejected because this API is not supported on this version of Windows. This is most likely due to a program that is incompatible with this version of Windows. Please contact the program's manufacturer to make sure you have a compatible program version.

Error Code:		E_NOTIMPL
Caller Process Name:		%1
Process Id:		%2
Publisher:		%3

Fields

NameDescription
CallerProcessName
ProcessId
Publisher

References

Event ID 5051 — A file was virtualized.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A file was virtualized.

Subject:
	Security ID:			%1
	Account Name:			%2
	Account Domain:		%3
	Logon ID:			%4

Object:
	File Name:			%5
	Virtual File Name:	%6

Process Information:
	Process ID:			%7
	Process Name:			%8

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
FileName
VirtualFileName
ProcessId
ProcessName

References

Event ID 5056 — A cryptographic self test was performed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic self test was performed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Module:		%5

Return Code:	%6

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Module
ReturnCode

References

Event ID 5057 — A cryptographic primitive operation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic primitive operation failed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Cryptographic Parameters:
	Provider Name:		%5
	Algorithm Name:	%6

Failure Information:
	Reason:			%7
	Return Code:		%8

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ProviderName
AlgorithmName
Reason
ReturnCode

References

Event ID 5058 — Key file operation.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Key file operation.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Cryptographic Parameters:
	Provider Name:	%5
	Algorithm Name:	%6
	Key Name:	%7
	Key Type:	%8

Key File Operation Information:
	File Path:	%9
	Operation:	%10
	Return Code:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ClientProcessId
ClientCreationTime
ProviderName
AlgorithmName
KeyName
KeyType
KeyFilePath
Operation
ReturnCode

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5058
  version: 1
  level: 0
  task: 12292
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:39.883187+00:00'
  event_record_id: 2882
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ClientProcessId: 1612
  ClientCreationTime: '2023-11-06T06:25:38.635483Z'
  ProviderName: Microsoft Software Key Storage Provider
  AlgorithmName: UNKNOWN
  KeyName: b87f845a-3278-6909-ee85-d3025f077fea
  KeyType: '%%2500'
  KeyFilePath: C:\ProgramData\Microsoft\Crypto\SystemKeys\fb28f36d176f9b9a964a506f1b386c99_31383106-803d-411b-9763-a28cdc0f0c3f
  Operation: '%%2458'
  ReturnCode: '0x0'
message: ''

References

Event ID 5059 — Key migration operation.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Key migration operation.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Cryptographic Parameters:
	Provider Name:	%5
	Algorithm Name:	%6
	Key Name:	%7
	Key Type:	%8

Additional Information:
	Operation:	%9
	Return Code:	%10

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ClientProcessId
ClientCreationTime
ProviderName
AlgorithmName
KeyName
KeyType
Operation
ReturnCode

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5059
  version: 1
  level: 0
  task: 12292
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:39.884224+00:00'
  event_record_id: 2884
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ClientProcessId: 1612
  ClientCreationTime: '2023-11-06T06:25:38.635483Z'
  ProviderName: Microsoft Software Key Storage Provider
  AlgorithmName: RSA
  KeyName: b87f845a-3278-6909-ee85-d3025f077fea
  KeyType: '%%2500'
  Operation: '%%2464'
  ReturnCode: '0x0'
message: ''

References

Event ID 5060 — Verification operation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Verification operation failed.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Cryptographic Parameters:
	Provider Name:	%5
	Algorithm Name:	%6
	Key Name:	%7
	Key Type:	%8

Failure Information:
	Reason:	%9
	Return Code:	%10

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ProviderName
AlgorithmName
KeyName
KeyType
Reason
ReturnCode

References

Event ID 5061 — Cryptographic operation.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Cryptographic operation.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Cryptographic Parameters:
	Provider Name:	%5
	Algorithm Name:	%6
	Key Name:	%7
	Key Type:	%8

Cryptographic Operation:
	Operation:	%9
	Return Code:	%10

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ProviderName
AlgorithmName
KeyName
KeyType
Operation
ReturnCode

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5061
  version: 0
  level: 0
  task: 12290
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:39.884031+00:00'
  event_record_id: 2883
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 856
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  ProviderName: Microsoft Software Key Storage Provider
  AlgorithmName: RSA
  KeyName: b87f845a-3278-6909-ee85-d3025f077fea
  KeyType: '%%2500'
  Operation: '%%2480'
  ReturnCode: '0x0'
message: ''

References

Event ID 5062 — A kernel-mode cryptographic self test was performed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A kernel-mode cryptographic self test was performed.

Module:	%1

Return Code:	%2

Fields

NameDescription
Module
ReturnCode

References

Event ID 5063 — A cryptographic provider operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic provider operation was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Cryptographic Provider:
	Name:	%5
	Module:	%6

Operation:	%7

Return Code:	%8

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ProviderName
ModuleName
Operation
ReturnCode

References

Event ID 5064 — A cryptographic context operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic context operation was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Configuration Parameters:
	Scope:	%5
	Context:	%6

Operation:	%7

Return Code:	%8

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Scope
ContextName
Operation
ReturnCode

References

Event ID 5065 — A cryptographic context modification was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic context modification was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Configuration Parameters:
	Scope:	%5
	Context:	%6

Change Information:
	Old Value:	%7
	New Value:	%8

Return Code:	%9

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Scope
ContextName
OldValue
NewValue
ReturnCode

References

Event ID 5066 — A cryptographic function operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic function operation was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Configuration Parameters:
	Scope:	%5
	Context:	%6
	Interface:	%7
	Function:	%8
	Position:	%9

Operation:	%10

Return Code:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Scope
ContextName
InterfaceId
FunctionName
Position
Operation
ReturnCode

References

Event ID 5067 — A cryptographic function modification was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic function modification was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Configuration Parameters:
	Scope:	%5
	Context:	%6
	Interface:	%7
	Function:	%8

Change Information:
	Old Value:	%9
	New Value:	%10

Return Code:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Scope
ContextName
InterfaceId
FunctionName
OldValue
NewValue
ReturnCode

References

Event ID 5068 — A cryptographic function provider operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic function provider operation was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Configuration Parameters:
	Scope:	%5
	Context:	%6
	Interface:	%7
	Function:	%8
	Provider:	%9
	Position:	%10

Operation:	%11

Return Code:	%12

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Scope
ContextName
InterfaceId
FunctionName
ProviderName
Position
Operation
ReturnCode

References

Event ID 5069 — A cryptographic function property operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic function property operation was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Configuration Parameters:
	Scope:	%5
	Context:	%6
	Interface:	%7
	Function:	%8
	Property:	%9

Operation:	%10

Value:	%11

Return Code:	%12

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Scope
ContextName
InterfaceId
FunctionName
PropertyName
Operation
Value
ReturnCode

References

Event ID 5070 — A cryptographic function property modification was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A cryptographic function property modification was attempted.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Configuration Parameters:
	Scope:	%5
	Context:	%6
	Interface:	%7
	Function:	%8
	Property:	%9

Change Information:
	Old Value:	%10
	New Value:	%11

Return Code:	%12

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Scope
ContextName
InterfaceId
FunctionName
PropertyName
OldValue
NewValue
ReturnCode

References

Event ID 5071 — Key access denied by Microsoft key distribution service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Key access denied by Microsoft key distribution service.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Security Descriptor:	%5

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
SecurityDescriptor

Event ID 5120 — OCSP Responder Service Started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

OCSP Responder Service Started.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5120
  version: 0
  level: 0
  task: 12805
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-11T09:20:46.158376Z'
  event_record_id: 1207920
  correlation:
    '#attributes':
      ActivityID: 2FEE2C3A-4F79-0001-502C-EE2F794FD601
  execution:
    process_id: 576
    thread_id: 3212
  channel: Security
  computer: pki01.offsec.lan
  security:
    user_id: ''
event_data: {}

References

Event ID 5121 — OCSP Responder Service Stopped.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

OCSP Responder Service Stopped.

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5121
  version: 0
  level: 0
  task: 12805
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-11T09:20:43.401378Z'
  event_record_id: 1207901
  correlation:
    '#attributes':
      ActivityID: 2FEE2C3A-4F79-0001-502C-EE2F794FD601
  execution:
    process_id: 576
    thread_id: 3212
  channel: Security
  computer: pki01.offsec.lan
  security:
    user_id: ''
event_data: {}

References

Event ID 5122 — A Configuration entry changed in the OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Configuration entry changed in the OCSP Responder Service.

CA Configuration ID:		%1
New Value:		%2

Fields

NameDescription
CAConfigurationId
NewValue
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

References

Event ID 5123 — A configuration entry changed in the OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A configuration entry changed in the OCSP Responder Service.

Property Name:		%1
New Value:		%2

Fields

NameDescription
PropertyName
NewValue
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5123
  version: 0
  level: 0
  task: 12805
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-11T09:21:24.702958Z'
  event_record_id: 1207931
  correlation:
    '#attributes':
      ActivityID: 2FEE2C3A-4F79-0001-502C-EE2F794FD601
  execution:
    process_id: 576
    thread_id: 3544
  channel: Security
  computer: pki01.offsec.lan
  security:
    user_id: ''
event_data:
  PropertyName: MaxNumOfCacheEntries
  NewValue: '5000'
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x477ac56'

References

Event ID 5124 — A security setting was updated on OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A security setting was updated on OCSP Responder Service.

New Value:	%1

Fields

NameDescription
NewSecuritySettings
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5124
  version: 0
  level: 0
  task: 12805
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-11T09:21:50.109681Z'
  event_record_id: 1207947
  correlation:
    '#attributes':
      ActivityID: 2FEE2C3A-4F79-0001-502C-EE2F794FD601
  execution:
    process_id: 576
    thread_id: 3544
  channel: Security
  computer: pki01.offsec.lan
  security:
    user_id: ''
event_data:
  NewSecuritySettings: "\nAllow(0x00000101)\tBUILTIN\\Administrators\n\tOCSP Administrator\n\tRead\nAllow(0x00000300)\tIIS
    APPPOOL\\OCSPISAPIAppPool\n\tRead\n\tOCSP Requestor\n"
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x477ac56'

References

Event ID 5125 — A request was submitted to OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A request was submitted to OCSP Responder Service.

Fields

NameDescription
SerialNumber
CAName
Status
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId

Event ID 5126 — Signing Certificate was automatically updated by the OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Signing Certificate was automatically updated by the OCSP Responder Service.

CA Configuration ID:		%1
New Signing Certificate Hash:		%2

Fields

NameDescription
CAConfigurationId
NewSigningCertificateHash

References

Event ID 5127 — The OCSP Revocation Provider successfully updated the revocation information.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The OCSP Revocation Provider successfully updated the revocation information.

CA Configuration ID:		%1
Base CRL Number:		%2
Base CRL This Update:		%3
Base CRL Hash:		%4
Delta CRL Number:		%5
Delta CRL Indicator:		%6
Delta CRL This Update:		%7
Delta CRL Hash:		%8

Fields

NameDescription
CAConfigurationId
BaseCRLNumber
BaseCRLThisUpdate
BaseCRLHash
DeltaCRLNumber
DeltaCRLIndicator
DeltaCRLThisUpdate
DeltaCRLHash

References

Event ID 5136 — A directory service object was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A directory service object was modified.
	
Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6

Directory Service:
	Name:	%7
	Type:	%8
	
Object:
	DN:	%9
	GUID:	%10
	Class:	%11
	
Attribute:
	LDAP Display Name:	%12
	Syntax (OID):	%13
	Value:	%14
	
Operation:
	Type:	%15
	Correlation ID:	%1
	Application Correlation ID:	%2

Fields

NameDescription
OpCorrelationID
AppCorrelationID
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DSName
DSType
ObjectDN
ObjectGUID
ObjectClass
AttributeLDAPDisplayName
AttributeSyntaxOID
AttributeValue
OperationType

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5136
  version: 0
  level: 0
  task: 14081
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-25T10:33:56.457629Z'
  event_record_id: 198238043
  correlation: {}
  execution:
    process_id: 444
    thread_id: 3488
  channel: Security
  computer: DC1.insecurebank.local
  security:
    user_id: ''
event_data:
  OpCorrelationID: 780EA6E1-6307-48D6-8B0D-8C45CC7534AE
  AppCorrelationID: '-'
  SubjectUserSid: S-1-5-21-738609754-2819869699-4189121830-1108
  SubjectUserName: bob
  SubjectDomainName: insecurebank
  SubjectLogonId: '0x8d7099'
  DSName: insecurebank.local
  DSType: '%%14676'
  ObjectDN: CN={6AC1786C-016F-11D2-945F-00C04FB984F9},CN=POLICIES,CN=SYSTEM,DC=INSECUREBANK,DC=LOCAL
  ObjectGUID: 6CDECDB5-7515-4511-8141-C34A7C3D4A0A
  ObjectClass: groupPolicyContainer
  AttributeLDAPDisplayName: versionNumber
  AttributeSyntaxOID: 2.5.5.9
  AttributeValue: '5'
  OperationType: '%%14675'

Community Notes

May indicate high-impact changes in AD, like adding SID history or malicious GPOs. Attribute change to msDS-AllowedToActOnBehalfOfOtherIdentity is usually suspicious and indicates a Kerberos relay attack.

Sigma Rules

  • Powerview Add-DomainObjectAcl DCSync AD Extend Right
    Backdooring domain object to grant the rights associated with DCSync to a regular user or machine account using Powerview\Add-DomainObjectAcl DCSync Extended Right cmdlet, will allow to re-obtain the pwd hashes of any user/computer
  • Active Directory User Backdoors
    Detects scenarios where one can control another users or computers account without having to use their credentials.
  • Windows Default Domain GPO Modification
    Detects modifications to Default Domain or Default Domain Controllers Group Policy Objects (GPOs). Adversaries may modify these default GPOs to deploy malicious configurations across the domain.
  • Persistence and Execution at Scale via GPO Scheduled Task
    Detect lateral movement using GPO scheduled task, usually used to deploy ransomware at scale
  • Potential Kerberos Coercion by Spoofing SPNs via DNS Manipulation
    Detects modifications to DNS records in Active Directory where the Distinguished Name (DN) contains a base64-encoded blob matching the pattern "1UWhRCAAAAA...BAAAA". This pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, commonly used in Kerberos coercion attacks. Adversaries may exploit this to coerce victim systems into authenticating to attacker-controlled hosts by spoofing SPNs via DNS. It is one of the strong indicators of a Kerberos coercion attack,. where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073. Please investigate the user account that made the changes, as it is likely a low-privileged account that has been compromised.

Showing 5 of 10 matching Sigma rules.

References

Event ID 5137 — A directory service object was created.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A directory service object was created.
	
Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6
	
Directory Service:
	Name:	%7
	Type:	%8
	
Object:
	DN:	%9
	GUID:	%10
	Class:	%11
	
Operation:
	Correlation ID:	%1
	Application Correlation ID:	%2

Fields

NameDescription
OpCorrelationID
AppCorrelationID
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DSName
DSType
ObjectDN
ObjectGUID
ObjectClass

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5137
  version: 0
  level: 0
  task: 14081
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2021-04-27T11:04:13.291038Z'
  event_record_id: 138520223
  correlation:
    '#attributes':
      ActivityID: 9816F041-2BBE-0000-53F0-1698BE2BD701
  execution:
    process_id: 548
    thread_id: 4324
  channel: Security
  computer: rootdc1.offsec.lan
  security:
    user_id: ''
event_data:
  OpCorrelationID: B960A203-A3DF-4586-A2ED-740024D6C42A
  AppCorrelationID: '-'
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x31a24611'
  DSName: offsec.lan
  DSType: '%%14676'
  ObjectDN: CN=JUMP01,CN=Servers,CN=OFFSEC-PREMISE,CN=Sites,CN=Configuration,DC=offsec,DC=lan
  ObjectGUID: 590B1EF4-6143-4C18-B554-1EE0A59BB7F8
  ObjectClass: server

Community Notes

May indicate high-impact changes in AD.

Sigma Rules

  • Potential Kerberos Coercion by Spoofing SPNs via DNS Manipulation
    Detects modifications to DNS records in Active Directory where the Distinguished Name (DN) contains a base64-encoded blob matching the pattern "1UWhRCAAAAA...BAAAA". This pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, commonly used in Kerberos coercion attacks. Adversaries may exploit this to coerce victim systems into authenticating to attacker-controlled hosts by spoofing SPNs via DNS. It is one of the strong indicators of a Kerberos coercion attack,. where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073. Please investigate the user account that made the changes, as it is likely a low-privileged account that has been compromised.

References

Event ID 5138 — A directory service object was undeleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A directory service object was undeleted.
	
Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6
	
Directory Service:
	Name:	%7
	Type:	%8
	
Object:
	Old DN:	%9
	New DN:	%10
	GUID:	%11
	Class:	%12
	
Operation:
	Correlation ID:	%1
	Application Correlation ID:	%2

Fields

NameDescription
OpCorrelationID
AppCorrelationID
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DSName
DSType
OldObjectDN
NewObjectDN
ObjectGUID
ObjectClass

References

Event ID 5139 — A directory service object was moved.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A directory service object was moved.
	
Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6
	
Directory Service:
	Name:		%7
	Type:		%8
	
Object:
	Old DN:		%9
	New DN:	%10
	GUID:		%11
	Class:		%12
	
Operation:
	Correlation ID:			%1
	Application Correlation ID:	%2

Fields

NameDescription
OpCorrelationID
AppCorrelationID
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DSName
DSType
OldObjectDN
NewObjectDN
ObjectGUID
ObjectClass

Community Notes

May indicate high-impact changes in AD.

Event ID 5140 — A network share object was accessed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A network share object was accessed.
	
Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Network Information:	
	Source Address:		%5
	Source Port:		%6
	
Share Name:			%7

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectType
IpAddress
IpPort
ShareName
ShareLocalPath
AccessMask
AccessList

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5140
  version: 1
  level: 0
  task: 12808
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:51:58.721534+00:00'
  event_record_id: 300935
  correlation: {}
  execution:
    process_id: 4
    thread_id: 17692
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x27844'
  ObjectType: File
  IpAddress: ::1
  IpPort: '62726'
  ShareName: \\*\C$
  ShareLocalPath: \??\C:\
  AccessMask: '0x1'
  AccessList: "%%4416\r\n\t\t\t\t"
message: ''

Community Notes

Tracks who is accessing shared folders on the network. Very noisy.

Sigma Rules

References

Event ID 5141 — A directory service object was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A directory service object was deleted.
	
Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6
	
Directory Service:
	Name:	%7
	Type:	%8
	
Object:
	DN:	%9
	GUID:	%10
	Class:	%11
	
Operation:
	Tree Delete:	%12
	Correlation ID:	%1
	Application Correlation ID:	%2

Fields

NameDescription
OpCorrelationID
AppCorrelationID
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DSName
DSType
ObjectDN
ObjectGUID
ObjectClass
TreeDelete

References

Event ID 5142 — A network share object was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A network share object was added.
	
Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Share Information:	
	Share Name:		%5
	Share Path:		%6

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ShareName
ShareLocalPath

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5142
  version: 0
  level: 0
  task: 12808
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-03-17T19:30:30.324836Z'
  event_record_id: 6273
  correlation: {}
  execution:
    process_id: 4
    thread_id: 64
  channel: Security
  computer: PC04.example.corp
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-3583694148-1414552638-2922671848-1000
  SubjectUserName: IEUser
  SubjectDomainName: PC04
  SubjectLogonId: '0x128a9'
  ShareName: \\*\PRINT
  ShareLocalPath: c:\windows\system32

Community Notes

May be a prelude to data exfiltration. Includes named pipes and IPC$ (confirm if the client address is external/unexpected). May indicate share enumeration and directory walking prior to exfiltration. The RelativeTargetName field may show the original file name and path on the attacker’s machine.

References

Event ID 5143 — A network share object was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A network share object was modified.
	
Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Share Information:
	Object Type:		%5
	Share Name:		%6
	Share Path:		%7
	Old Remark:		%8
	New Remark:		%9
	Old MaxUsers:		%10
	New Maxusers:		%11
	Old ShareFlags:		%12
	New ShareFlags:		%13
	Old SD:			%14
	New SD:			%15

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectType
ShareName
ShareLocalPath
OldRemark
NewRemark
OldMaxUsers
NewMaxUsers
OldShareFlags
NewShareFlags
OldSD
NewSD

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5143
  version: 0
  level: 0
  task: 12808
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2020-07-11T17:17:32.128132Z'
  event_record_id: 1228290
  correlation: {}
  execution:
    process_id: 464
    thread_id: 472
  channel: Security
  computer: fs02.offsec.lan
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-4230534742-2542757381-3142984815-1111
  SubjectUserName: admmig
  SubjectDomainName: OFFSEC
  SubjectLogonId: '0x202dac8'
  ObjectType: Directory
  ShareName: \\*\hidden-share$
  ShareLocalPath: C:\TOOLS\hidden-share$
  OldRemark: N/A
  NewRemark: N/A
  OldMaxUsers: '0xffffffff'
  NewMaxUsers: '0xffffffff'
  OldShareFlags: '0x0'
  NewShareFlags: '0x0'
  OldSD: O:BAG:DUD:(A;;0x1200a9;;;WD)
  NewSD: O:BAG:DUD:(A;;FA;;;S-1-5-21-4230534742-2542757381-3142984815-1107)(A;;0x1301bf;;;WD)

References

Event ID 5144 — A network share object was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A network share object was deleted.
	
Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Share Information:	
	Share Name:		%5
	Share Path:		%6

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ShareName
ShareLocalPath

Event ID 5145 — A network share object was checked to see whether client can be granted desired access.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A network share object was checked to see whether client can be granted desired access.
	
Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Network Information:	
	Object Type:		%5
	Source Address:		%6
	Source Port:		%7
	
Share Information:
	Share Name:		%8
	Share Path:		%9
	Relative Target Name:	%10

Access Request Information:
	Access Mask:		%11
	Accesses:		%12
Access Check Results:
	%13

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ObjectType
IpAddress
IpPort
ShareName
ShareLocalPath
RelativeTargetName
AccessMask
AccessList
AccessReason

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5145
  version: 0
  level: 0
  task: 12811
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:51:58.765174+00:00'
  event_record_id: 300953
  correlation: {}
  execution:
    process_id: 4
    thread_id: 20724
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-1992711665-1655669231-58201500-1000
  SubjectUserName: User
  SubjectDomainName: WINDEV2310EVAL
  SubjectLogonId: '0x27844'
  ObjectType: File
  IpAddress: ::1
  IpPort: '62726'
  ShareName: \\*\C$
  ShareLocalPath: \??\C:\
  RelativeTargetName: Users\User\Downloads
  AccessMask: '0x100081'
  AccessList: "%%1541\r\n\t\t\t\t%%4416\r\n\t\t\t\t%%4423\r\n\t\t\t\t"
  AccessReason: '-'
message: ''

Sigma Rules

Showing 5 of 17 matching Sigma rules.

References

Event ID 5146 — The Windows Filtering Platform has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has blocked a packet.

Network Information:
	Direction:		%1
	Source Address:	%2
	Destination Address:	%3
	EtherType:		%4
	VlanTag:		%5
	vSwitchId:		%6
	Source vSwitch Port:		%7
	Destination vSwitch Port:	%8

Filter Information:
	Filter Run-Time ID:	%9
	Layer Name:		%10
	Layer Run-Time ID:	%11

Fields

NameDescription
Direction
SourceAddress
DestAddress
EtherType
VlanTag
vSwitch ID
SourcevSwitchPort
DestinationvSwitchPort
FilterRTID
LayerName
LayerRTID
vSwitchID

Event ID 5147 — A more restrictive Windows Filtering Platform filter has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A more restrictive Windows Filtering Platform filter has blocked a packet.

Network Information:
	Direction:		%1
	Source Address:	%2
	Destination Address:	%3
	EtherType:		%4
	VlanTag:		%5
	vSwitchId:		%6
	Source vSwitch Port:		%7
	Destination vSwitch Port:	%8

Filter Information:
	Filter Run-Time ID:	%9
	Layer Name:		%10
	Layer Run-Time ID:	%11

Fields

NameDescription
Direction
SourceAddress
DestAddress
EtherType
VlanTag
vSwitch ID
SourcevSwitchPort
DestinationvSwitchPort
FilterRTID
LayerName
LayerRTID
vSwitchID

Event ID 5148 — The Windows Filtering Platform has detected a DoS attack and entered a defensive mode.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.

Network Information:
	Type:		%1

Fields

NameDescription
Type

References

Event ID 5149 — The DoS attack has subsided and normal processing is being resumed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The DoS attack has subsided and normal processing is being resumed.

Network Information:
	Type:		%1
	Packets Discarded:			%2

Fields

NameDescription
Type
PacketsDiscarded

References

Event ID 5150 — The Windows Filtering Platform has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has blocked a packet.

Network Information:
	Direction:		%1
	Source Address:		%2
	Destination Address:	%3
	EtherType:		%4
	MediaType:		%5
	InterfaceType:		%6
	VlanTag:			%7

Filter Information:
	Filter Run-Time ID:	%8
	Layer Name:		%9
	Layer Run-Time ID:	%10

Fields

NameDescription
Direction
SourceAddress
DestAddress
EtherType
MediaType
InterfaceType
VlanTag
FilterRTID
LayerName
LayerRTID

References

Event ID 5151 — A more restrictive Windows Filtering Platform filter has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A more restrictive Windows Filtering Platform filter has blocked a packet.

Network Information:
	Direction:		%1
	Source Address:			%2
	Destination Address:	%3
	EtherType:		%4
	MediaType:		%5
	InterfaceType:		%6
	VlanTag:			%7

Filter Information:
	Filter Run-Time ID:	%8
	Layer Name:		%9
	Layer Run-Time ID:	%10

Fields

NameDescription
Direction
SourceAddress
DestAddress
EtherType
MediaType
InterfaceType
VlanTag
FilterRTID
LayerName
LayerRTID

Event ID 5152 — The Windows Filtering Platform blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has blocked a packet.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Direction:		%3
	Source Address:		%4
	Source Port:		%5
	Destination Address:	%6
	Destination Port:		%7
	Protocol:		%8

Filter Information:
	Filter Run-Time ID:	%9
	Layer Name:		%10
	Layer Run-Time ID:	%11

Fields

NameDescription
ProcessId
Application
Direction
SourceAddress
SourcePort
DestAddress
DestPort
Protocol
FilterOrigin
FilterRTID
LayerName
LayerRTID

Community Notes

Prefer 5157 when both are available as it is per-connection.

References

Event ID 5153 — A more restrictive Windows Filtering Platform filter has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A more restrictive Windows Filtering Platform filter has blocked a packet.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Direction:		%3
	Source Address:		%4
	Source Port:		%5
	Destination Address:	%6
	Destination Port:		%7
	Protocol:		%8

Filter Information:
	Filter Run-Time ID:	%9
	Layer Name:		%10
	Layer Run-Time ID:	%11

Fields

NameDescription
ProcessId
Application
Direction
SourceAddress
SourcePort
DestAddress
DestPort
Protocol
FilterOrigin
FilterRTID
LayerName
LayerRTID

Event ID 5154 — The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Source Address:		%3
	Source Port:		%4
	Protocol:		%5

Filter Information:
	Filter Run-Time ID:	%6
	Layer Name:		%7
	Layer Run-Time ID:	%8

Fields

NameDescription
ProcessId
Application
SourceAddress
SourcePort
Protocol
FilterRTID
LayerName
LayerRTID

Community Notes

Detects unexpected services binding, often precedes C2 beaconing.

References

Event ID 5155 — The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Source Address:		%3
	Source Port:		%4
	Protocol:		%5

Filter Information:
	Filter Run-Time ID:	%6
	Layer Name:		%7
	Layer Run-Time ID:	%8

Fields

NameDescription
ProcessId
Application
SourceAddress
SourcePort
Protocol
FilterRTID
LayerName
LayerRTID

Event ID 5156 — The Windows Filtering Platform has permitted a connection.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The Windows Filtering Platform has permitted a connection.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Direction:		%3
	Source Address:		%4
	Source Port:		%5
	Destination Address:	%6
	Destination Port:		%7
	Protocol:		%8

Filter Information:
	Filter Run-Time ID:	%9
	Layer Name:		%10
	Layer Run-Time ID:	%11

Fields

NameDescription
ProcessID
Application
Direction
SourceAddress
SourcePort
DestAddress
DestPort
Protocol
FilterRTID
LayerName
LayerRTID
RemoteUserID
RemoteMachineID

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5156
  version: 1
  level: 0
  task: 12810
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-02-13T18:01:47.512340Z'
  event_record_id: 227694
  correlation: {}
  execution:
    process_id: 4
    thread_id: 56
  channel: Security
  computer: PC01.example.corp
  security:
    user_id: ''
event_data:
  ProcessID: 820
  Application: \device\harddiskvolume1\windows\system32\svchost.exe
  Direction: '%%14593'
  SourceAddress: fe80::80ac:4126:fa58:1b81
  SourcePort: '546'
  DestAddress: ff02::1:2
  DestPort: '547'
  Protocol: 17
  FilterRTID: 65865
  LayerName: '%%14611'
  LayerRTID: 50
  RemoteUserID: S-1-0-0
  RemoteMachineID: S-1-0-0

Community Notes

Indicates what process (application path) on the local machine made an outbound connection to a specific destination IP and port. Helpful for reviewing connections made by a suspect process.

Sigma Rules

References

Event ID 5157 — The Windows Filtering Platform has blocked a connection.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has blocked a connection.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Direction:		%3
	Source Address:		%4
	Source Port:		%5
	Destination Address:	%6
	Destination Port:		%7
	Protocol:		%8

Filter Information:
	Filter Run-Time ID:	%9
	Layer Name:		%10
	Layer Run-Time ID:	%11

Fields

NameDescription
ProcessID
Application
Direction
SourceAddress
SourcePort
DestAddress
DestPort
Protocol
InterfaceIndex
FilterOrigin
FilterRTID
LayerName
LayerRTID
RemoteUserID
RemoteMachineID
OriginalProfile
CurrentProfile
IsLoopback
HasRemoteDynamicKeywordAddress

Sigma Rules

Event ID 5158 — The Windows Filtering Platform has permitted a bind to a local port.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The Windows Filtering Platform has permitted a bind to a local port.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Source Address:		%3
	Source Port:		%4
	Protocol:		%5

Filter Information:
	Filter Run-Time ID:	%6
	Layer Name:		%7
	Layer Run-Time ID:	%8

Fields

NameDescription
ProcessId
Application
SourceAddress
SourcePort
Protocol
FilterRTID
LayerName
LayerRTID

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5158
  version: 0
  level: 0
  task: 12810
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2019-02-13T18:04:01.722250Z'
  event_record_id: 227731
  correlation: {}
  execution:
    process_id: 4
    thread_id: 56
  channel: Security
  computer: PC01.example.corp
  security:
    user_id: ''
event_data:
  ProcessId: 1280
  Application: \device\harddiskvolume1\windows\system32\svchost.exe
  SourceAddress: 0.0.0.0
  SourcePort: '55355'
  Protocol: 17
  FilterRTID: 0
  LayerName: '%%14608'
  LayerRTID: 36

Community Notes

Unexpected binds on high ports may be a prelude to data exfiltration.

References

Event ID 5159 — The Windows Filtering Platform has blocked a bind to a local port.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform has blocked a bind to a local port.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Source Address:		%3
	Source Port:		%4
	Protocol:		%5

Filter Information:
	Filter Run-Time ID:	%6
	Layer Name:		%7
	Layer Run-Time ID:	%8

Fields

NameDescription
ProcessId
Application
SourceAddress
SourcePort
Protocol
FilterRTID
LayerName
LayerRTID

Event ID 5160 — The Windows Filtering Platform Audit Mode has allowed a connection or packet that would have been blocked.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The Windows Filtering Platform Audit Mode has allowed a connection or packet that would have been blocked.

Application Information:
	Process ID:		%1
	Application Name:	%2

Network Information:
	Direction:		%3
	Source Address:		%4
	Source Port:		%5
	Destination Address:	%6
	Destination Port:		%7
	Protocol:		%8
	Interface Index:		%9

Filter Information:
	Filter Origin:		%10
	Filter Run-Time ID:	%11
	Layer Name:		%12
	Layer Run-Time ID:	%13
	Remote User ID:		%14
	Remote Machine ID:	%15
	Original Profile:		%16
	Current Profile:		%17
	Is Loopback:		%18
	Has Remote Dynamic Keyword Address:		%19

Firewall Information:

	Policy Store:		%20
	Modifiable:		%21
	Callout Involved:		%22
	Callout ID:		%23

Fields

NameDescription
ProcessID
Application
Direction
SourceAddress
SourcePort
DestAddress
DestPort
Protocol
InterfaceIndex
FilterOrigin
FilterRTID
LayerName
LayerRTID
RemoteUserID
RemoteMachineID
OriginalProfile
CurrentProfile
IsLoopback
HasRemoteDynamicKeywordAddress
FirewallPolicyStore
Modifiable
CalloutInvolved
CalloutID

Event ID 5168 — SPN check for SMB/SMB2 fails.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Spn check for SMB/SMB2 fails.
	
Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

SPN:	
	SPN Name:		%5
	Error Code:		%6

Server Information:
	Server Names:		%7
	Configured Names:		%8
	IP Addresses:		%9

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
SpnName
ErrorCode
ServerNames
ConfiguredNames
IpAddresses

References

Event ID 5169 — A directory service object was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A directory service object was modified.
	
Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6

Directory Service:
	Name:	%7
	Type:	%8
	
Object:
	DN:	%9
	GUID:	%10
	Class:	%11
	
Attribute:
	LDAP Display Name:	%12
	Syntax (OID):	%13
	Value:	%14
	Expiration Time:	%15
	
Operation:
	Type:	%16
	Correlation ID:	%1
	Application Correlation ID:	%2

Fields

NameDescription
OpCorrelationID
AppCorrelationID
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DSName
DSType
ObjectDN
ObjectGUID
ObjectClass
AttributeLDAPDisplayName
AttributeSyntaxOID
AttributeValue
ExpirationTime
OperationType

Event ID 5170 — A directory service object was modified during a background cleanup task.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A directory service object was modified during a background cleanup task.
	
Subject:
	Security ID:		%3
	Account Name:		%4
	Account Domain:		%5
	Logon ID:		%6

Directory Service:
	Name:	%7
	Type:	%8
	
Object:
	DN:	%9
	GUID:	%10
	Class:	%11
	
Attribute:
	LDAP Display Name:	%12
	Syntax (OID):	%13
	Value:	%14
	Expiration Time:	%15
	
Operation:
	Type:	%16
	Correlation ID:	%1
	Application Correlation ID:	%2

Fields

NameDescription
OpCorrelationID
AppCorrelationID
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DSName
DSType
ObjectDN
ObjectGUID
ObjectClass
AttributeLDAPDisplayName
AttributeSyntaxOID
AttributeValue
ExpirationTime
OperationType

Event ID 5376 — Credential Manager credentials were backed up.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Credential Manager credentials were backed up.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

This event occurs when a user backs up their own Credential Manager credentials. A user (even an Administrator) cannot back up the credentials of an account other than his own.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
BackupFileName
ProcessCreationTime
ClientProcessId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5376
  version: 1
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-09-24T19:57:32.266266+00:00'
  event_record_id: 150002
  correlation:
    ActivityID: B2946CF1-CF76-0001-5C6D-94B276CFD801
  execution:
    process_id: 804
    thread_id: 5832
  channel: Security
  computer: GUAPOS-PC
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-3960598978-2723104146-531989891-1001
  SubjectUserName: FOXTWO
  SubjectDomainName: GUAPOS-PC
  SubjectLogonId: 894283
  BackupFileName: C:\Windows\TEMP\CRD46C3.tmp
  ProcessCreationTime: 1664049447.1706607
  ClientProcessId: 5400
message: "Credential Manager credentials were backed up.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-3960598978-2723104146-531989891-1001\n\tAccount
  Name:\t\tFOXTWO\n\tAccount Domain:\t\tGUAPOS-PC\n\tLogon ID:\t\t894283\n\tBackupFileName:\t\tC:\\Windows\\TEMP\\CRD46C3.tmp\n\nThis
  event occurs when a user backs up their own Credential Manager credentials. A user
  (even an Administrator) cannot back up the credentials of an account other than
  his own."

Community Notes

Backup of Credential Manager vault, shows a user exporting stored passwords and keys. Often precedes lateral movement or exfiltration.

References

Event ID 5377 — Credential Manager credentials were restored from a backup.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Credential Manager credentials were restored from a backup.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

This event occurs when a user restores his Credential Manager credentials from a backup. A user (even an Administrator) cannot restore the credentials of an account other than his own.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
BackupFileName
ProcessCreationTime
ClientProcessId

Community Notes

Credential Manager credentials were restored from a backup, may indicate import of stolen vaults from another host.

Event ID 5378 — The requested credentials delegation was disallowed by policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The requested credentials delegation was disallowed by policy.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Credential Delegation Information:
	Security Package:	%5
	User's UPN:	%6
	Target Server:	%7
	Credential Type:	%8

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Package
UserUPN
TargetServer
CredType

References

Event ID 5379 — Credential Manager credentials were read.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Credential Manager credentials were read.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4
	Read Operation:		%8

This event occurs when a user performs a read operation on stored credentials in Credential Manager.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetName
Type
CountOfCredentialsReturned
ReadOperation
ReturnCode
ProcessCreationTime
ClientProcessId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5379
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T06:25:40.049147+00:00'
  event_record_id: 2888
  correlation:
    ActivityID: F590C418-1079-0001-5BC5-90F57910DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  TargetName: WindowsLive:target=virtualapp/didlogical
  Type: 0
  CountOfCredentialsReturned: 0
  ReadOperation: '%%8100'
  ReturnCode: 3221226021
  ProcessCreationTime: '2023-11-06T06:25:38.635483Z'
  ClientProcessId: 1612
message: ''

Community Notes

Credential Manager credentials were read. Large numbers of reads may indicate automated credential theft.

Sigma Rules

References

Event ID 5380 — Vault Find Credential.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Vault Find Credential.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

This event occurs when a user finds stored vault credentials.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
SearchString
SchemaFriendlyName
Schema
CountOfCredentialsReturned
ProcessCreationTime
ClientProcessId

Event ID 5381 — Vault credentials were read.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Vault credentials were read.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

This event occurs when a user enumerates stored vault credentials.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
Flags
CountOfCredentialsReturned
ProcessCreationTime
ClientProcessId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5381
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-09-24T20:05:50.571779+00:00'
  event_record_id: 150026
  correlation: {}
  execution:
    process_id: 804
    thread_id: 5636
  channel: Security
  computer: GUAPOS-PC
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-21-3960598978-2723104146-531989891-1001
  SubjectUserName: FOXTWO
  SubjectDomainName: GUAPOS-PC
  SubjectLogonId: 894283
  Flags: 0
  CountOfCredentialsReturned: 1
  ProcessCreationTime: 1664049942.3177185
  ClientProcessId: 10620
message: "Vault credentials were read.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-3960598978-2723104146-531989891-1001\n\tAccount
  Name:\t\tFOXTWO\n\tAccount Domain:\t\tGUAPOS-PC\n\tLogon ID:\t\t894283\n\nThis event
  occurs when a user enumerates stored vault credentials."

References

Event ID 5382 — Vault credentials were read.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

Vault credentials were read.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

This event occurs when a user reads a stored vault credential.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
SchemaFriendlyName
Schema
Resource
Identity
PackageSid
Flags
ReturnCode
ProcessCreationTime
ClientProcessId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5382
  version: 0
  level: 0
  task: 13824
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T22:28:52.690626+00:00'
  event_record_id: 3184
  correlation: {}
  execution:
    process_id: 808
    thread_id: 888
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WINDEV2310EVAL$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  SchemaFriendlyName: NGC Local Accoount Logon Vault Resource Schema
  Schema: 1D4350A3-330D-4AF9-B3FF-A927A45998AC
  Resource: NGC Local Accoount Logon Vault Resource
  Identity: 010500000000000515000000F15DC676EF81AF629C157803E8030000
  PackageSid: ''
  Flags: 0
  ReturnCode: 1168
  ProcessCreationTime: '2023-11-05T22:28:52.050339Z'
  ClientProcessId: 4612
message: ''

References

Event ID 5440 — The following callout was present when the Windows Filtering Platform Base Filtering Engine started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The following callout was present when the Windows Filtering Platform Base Filtering Engine started.

Provider Information:	
	ID:		%1
	Name:		%2

Callout Information:
	ID:		%3
	Name:		%4
	Type:		%5
	Run-Time ID:	%6

Layer Information:
	ID:		%7
	Name:		%8
	Run-Time ID:	%9

Fields

NameDescription
ProviderKey
ProviderName
CalloutKey
CalloutName
CalloutType
CalloutId
LayerKey
LayerName
LayerId

References

Event ID 5441 — The following filter was present when the Windows Filtering Platform Base Filtering Engine started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The following filter was present when the Windows Filtering Platform Base Filtering Engine started.

Provider Information:	
	ID:		%1
	Name:		%2

Filter Information:
	ID:		%3
	Name:		%4
	Type:		%5
	Run-Time ID:	%6

Layer Information:
	ID:		%7
	Name:		%8
	Run-Time ID:	%9
	Weight:		%10
	
Additional Information:
	Conditions:	%11
	Filter Action:	%12
	Callout ID:	%13
	Callout Name:	%14

Fields

NameDescription
ProviderKey
ProviderName
FilterKey
FilterName
FilterType
FilterId
LayerKey
LayerName
LayerId
Weight
Conditions
Action
CalloutKey
CalloutName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5441
  version: 0
  level: 0
  task: 13572
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:16.631722+00:00'
  event_record_id: 25499
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 668
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProviderKey: DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62
  ProviderName: Microsoft Corporation
  FilterKey: B98B75DC-17C0-4E84-BD4E-2080527CA6A6
  FilterName: AppContainerBoottimeFilter
  FilterType: '%%16387'
  FilterId: 67430
  LayerKey: A3B42C97-9F04-4672-B87E-CEE9C483257F
  LayerName: ALE Receive/Accept v6 Layer
  LayerId: 46
  Weight: 18446744073709551615
  Conditions: "\n\tCondition ID:\t{632ce23b-5167-435c-86d7-e903684aa80c}\n\tMatch
    value:\tAll flags set\n\tCondition value:\t0x00400000\n"
  Action: '%%16390'
  CalloutKey: 00000000-0000-0000-0000-000000000000
  CalloutName: '-'
message: ''

Sigma Rules

References

Event ID 5442 — The following provider was present when the Windows Filtering Platform Base Filtering Engine started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The following provider was present when the Windows Filtering Platform Base Filtering Engine started.
	
Provider ID:	%1
Provider Name:	%2
Provider Type:	%3

Fields

NameDescription
ProviderKey
ProviderName
ProviderType

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5442
  version: 0
  level: 0
  task: 13572
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:16.631829+00:00'
  event_record_id: 25503
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 668
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProviderKey: 1BEBC969-61A5-4732-A177-847A0817862A
  ProviderName: Microsoft Corporation
  ProviderType: '%%16387'
message: ''

References

Event ID 5443 — The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.
	
Provider ID:	%1
Provider Name:	%2
Provider Context ID:	%3
Provider Context Name:	%4
Provider Context Type:	%5

Fields

NameDescription
ProviderKey
ProviderName
ProviderContextKey
ProviderContextName
ProviderContextType

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5443
  version: 0
  level: 0
  task: 13572
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:16.631811+00:00'
  event_record_id: 25502
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 668
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProviderKey: DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62
  ProviderName: Microsoft Corporation
  ProviderContextKey: 93132C36-6E06-4E6F-A10B-218787CD49CF
  ProviderContextName: MPSSVC
  ProviderContextType: '%%16387'
message: ''

References

Event ID 5444 — The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.
	
Provider ID:	%1
Provider Name:	%2
Sub-layer ID:	%3
Sub-layer Name:	%4
Sub-layer Type:	%5
Weight:		%6

Fields

NameDescription
ProviderKey
ProviderName
SubLayerKey
SubLayerName
SubLayerType
Weight

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5444
  version: 0
  level: 0
  task: 13572
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:16.631773+00:00'
  event_record_id: 25500
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 668
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProviderKey: 1BEBC969-61A5-4732-A177-847A0817862A
  ProviderName: Microsoft Corporation
  SubLayerKey: 9BA30013-C84E-47E5-AC6E-1E1AED72FA69
  SubLayerName: Microsoft Corporation
  SubLayerType: '%%16387'
  Weight: 40961
message: ''

References

Event ID 5446 — A Windows Filtering Platform callout has been changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A Windows Filtering Platform callout has been changed.
	
Subject:
	Security ID:		%2
	Account Name:		%3

Process Information:
	Process ID:	%1

Provider Information:
	ID:		%4
	Name:		%5

Change Information:
	Change Type:	%6

Callout Information:
	ID:		%7
	Name:		%8
	Type:		%9
	Run-Time ID:	%10

Layer Information:
	ID:		%11
	Name:		%12
	Run-Time ID:	%13

Fields

NameDescription
ProcessId
UserSid
UserName
ProviderKey
ProviderName
ChangeType
CalloutKey
CalloutName
CalloutType
CalloutId
LayerKey
LayerName
LayerId

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5446
  version: 0
  level: 0
  task: 13572
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:12:54.760281+00:00'
  event_record_id: 29300
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 664
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProcessId: 2088
  UserSid: S-1-5-19
  UserName: NT AUTHORITY\LOCAL SERVICE
  ProviderKey: 00000000-0000-0000-0000-000000000000
  ProviderName: '-'
  ChangeType: '%%16384'
  CalloutKey: 31114833-2891-4EDD-A8EC-2FF8549AA491
  CalloutName: windefend_flow_established_v6
  CalloutType: '%%16388'
  CalloutId: 289
  LayerKey: 7021D2B3-DFA4-406E-AFEB-6AFAF7E70EFD
  LayerName: ALE Flow Established v6 Layer
  LayerId: 54
message: ''

References

Event ID 5447 — A Windows Filtering Platform filter has been changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A Windows Filtering Platform filter has been changed.
	
Subject:
	Security ID:		%2
	Account Name:		%3

Process Information:
	Process ID:	%1

Provider Information:
	ID:		%4
	Name:		%5

Change Information:
	Change Type:	%6

Filter Information:
	ID:		%7
	Name:		%8
	Type:		%9
	Run-Time ID:	%10

Layer Information:
	ID:		%11
	Name:		%12
	Run-Time ID:	%13

Callout Information:
	ID:		%17
	Name:		%18

Additional Information:
	Weight:	%14	
	Conditions:	%15
	Filter Action:	%16

Fields

NameDescription
ProcessId
UserSid
UserName
ProviderKey
ProviderName
ChangeType
FilterKey
FilterName
FilterType
FilterId
LayerKey
LayerName
LayerId
Weight
Conditions
Action
CalloutKey
CalloutName

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5447
  version: 0
  level: 0
  task: 13573
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-06T01:44:15.910142+00:00'
  event_record_id: 289924
  correlation:
    ActivityID: E4DB489E-1037-0001-0C49-DBE43710DA01
  execution:
    process_id: 808
    thread_id: 12032
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  ProcessId: 2896
  UserSid: S-1-5-19
  UserName: NT AUTHORITY\LOCAL SERVICE
  ProviderKey: DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62
  ProviderName: Microsoft Corporation
  ChangeType: '%%16384'
  FilterKey: E170DBAA-294E-40F7-A2BE-E0DEE7DF9E43
  FilterName: Microsoft Teams
  FilterType: '%%16388'
  FilterId: 78819
  LayerKey: A3B42C97-9F04-4672-B87E-CEE9C483257F
  LayerName: ALE Receive/Accept v6 Layer
  LayerId: 46
  Weight: 10376504785133109248
  Conditions: "\n\tCondition ID:\t{d78e1e87-8644-4ea5-9437-d809ecefc971}\n\tMatch
    value:\tEqual to\n\tCondition value:\t\n    00000000  5c 00 64 00 65 00 76 00-69
    00 63 00 65 00 5c 00  \\.d.e.v.i.c.e.\\.\n    00000010  68 00 61 00 72 00 64 00-64
    00 69 00 73 00 6b 00  h.a.r.d.d.i.s.k.\n    00000020  76 00 6f 00 6c 00 75 00-6d
    00 65 00 34 00 5c 00  v.o.l.u.m.e.4.\\.\n    00000030  70 00 72 00 6f 00 67 00-72
    00 61 00 6d 00 20 00  p.r.o.g.r.a.m. .\n    00000040  66 00 69 00 6c 00 65 00-73
    00 5c 00 77 00 69 00  f.i.l.e.s.\\.w.i.\n    00000050  6e 00 64 00 6f 00 77 00-73
    00 61 00 70 00 70 00  n.d.o.w.s.a.p.p.\n    00000060  73 00 5c 00 6d 00 69 00-63
    00 72 00 6f 00 73 00  s.\\.m.i.c.r.o.s.\n    00000070  6f 00 66 00 74 00 74 00-65
    00 61 00 6d 00 73 00  o.f.t.t.e.a.m.s.\n    00000080  5f 00 32 00 33 00 32 00-37
    00 35 00 2e 00 37 00  _.2.3.2.7.5...7.\n    00000090  30 00 32 00 2e 00 32 00-34
    00 32 00 31 00 2e 00  0.2...2.4.2.1...\n    000000a0  32 00 34 00 30 00 36 00-5f
    00 78 00 36 00 34 00  2.4.0.6._.x.6.4.\n    000000b0  5f 00 5f 00 38 00 77 00-65
    00 6b 00 79 00 62 00  _._.8.w.e.k.y.b.\n    000000c0  33 00 64 00 38 00 62 00-62
    00 77 00 65 00 5c 00  3.d.8.b.b.w.e.\\.\n    000000d0  6d 00 73 00 74 00 65 00-61
    00 6d 00 73 00 2e 00  m.s.t.e.a.m.s...\n    000000e0  65 00 78 00 65 00 00 00
    \                         e.x.e...\n\n\n\tCondition ID:\t{3971ef2b-623e-4f9a-8cb1-6e79b806b9a7}\n\tMatch
    value:\tEqual to\n\tCondition value:\t0x11\n"
  Action: '%%16390'
  CalloutKey: 00000000-0000-0000-0000-000000000000
  CalloutName: '-'
message: ''

Sigma Rules

  • HackTool - EDRSilencer Execution - Filter Added
    Detects execution of EDRSilencer, a tool that abuses the Windows Filtering Platform (WFP) to block the outbound traffic of running EDR agents based on specific hardcoded filter names.
  • HackTool - NoFilter Execution
    Detects execution of NoFilter, a tool for abusing the Windows Filtering Platform for privilege escalation via hardcoded policy name indicators

References

Event ID 5448 — A Windows Filtering Platform provider has been changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Windows Filtering Platform provider has been changed.
	
Subject:
	Security ID:		%2
	Account Name:		%3

Process Information:
	Process ID:	%1

Change Information:
	Change Type:	%4

Provider Information:
	ID:		%5
	Name:		%6
	Type:		%7

Fields

NameDescription
ProcessId
UserSid
UserName
ChangeType
ProviderKey
ProviderName
ProviderType

References

Event ID 5449 — A Windows Filtering Platform provider context has been changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A Windows Filtering Platform provider context has been changed.
	
Subject:
	Security ID:		%2
	Account Name:		%3

Process Information:
	Process ID:	%1

Provider Information:
	Provider ID:	%4
	Provider Name:	%5

Change Information:
	Change Type:	%6

Provider Context:
	ID:	%7
	Name:	%8
	Type:	%9

Fields

NameDescription
ProcessId
UserSid
UserName
ProviderKey
ProviderName
ChangeType
ProviderContextKey
ProviderContextName
ProviderContextType

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5449
  version: 0
  level: 0
  task: 13572
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:13:39.336916+00:00'
  event_record_id: 29353
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 664
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProcessId: 1192
  UserSid: S-1-5-19
  UserName: NT AUTHORITY\LOCAL SERVICE
  ProviderKey: DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62
  ProviderName: Microsoft Corporation
  ChangeType: '%%16385'
  ProviderContextKey: E5AF5758-67DC-469F-9F77-8EAB0F229359
  ProviderContextName: MPSSVC
  ProviderContextType: '%%16388'
message: ''

Sigma Rules

  • HackTool - NoFilter Execution
    Detects execution of NoFilter, a tool for abusing the Windows Filtering Platform for privilege escalation via hardcoded policy name indicators

References

Event ID 5450 — A Windows Filtering Platform sub-layer has been changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A Windows Filtering Platform sub-layer has been changed.
	
Subject:
	Security ID:		%2
	Account Name:		%3

Process Information:
	Process ID:	%1

Provider Information:
	Provider ID:	%4
	Provider Name:	%5

Change Information:
	Change Type:	%6

Sub-layer Information:
	Sub-layer ID:	%7
	Sub-layer Name:	%8
	Sub-layer Type:	%9

Additional Information:
	Weight:	%10

Fields

NameDescription
ProcessId
UserSid
UserName
ProviderKey
ProviderName
ChangeType
SubLayerKey
SubLayerName
SubLayerType
Weight

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5450
  version: 0
  level: 0
  task: 13572
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:12:54.760352+00:00'
  event_record_id: 29301
  correlation:
    ActivityID: 7377737E-4825-0000-C974-77732548D801
  execution:
    process_id: 612
    thread_id: 664
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  ProcessId: 2088
  UserSid: S-1-5-19
  UserName: NT AUTHORITY\LOCAL SERVICE
  ProviderKey: 00000000-0000-0000-0000-000000000000
  ProviderName: '-'
  ChangeType: '%%16384'
  SubLayerKey: 3C1CD879-1B8C-4AB4-8F83-5ED129176EF3
  SubLayerName: windefend
  SubLayerType: '%%16388'
  Weight: 4096
message: ''

References

Event ID 5451 — An IPsec quick mode security association was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec quick mode security association was established.
	
Local Endpoint:
	Network Address:	%1
	Network Address mask:	%2
	Port:			%3
	Tunnel Endpoint:		%4

Remote Endpoint:
	Network Address:	%5
	Network Address Mask:	%6
	Port:			%7
	Private Address:		%8
	Tunnel Endpoint:		%9

	Protocol:		%10
	Keying Module Name:	%11

Cryptographic Information:
	Integrity Algorithm - AH:	%12
	Integrity Algorithm - ESP:	%13
	Encryption Algorithm:	%14

Security Association Information:
	Lifetime - seconds:	%15
	Lifetime - data:		%16
	Lifetime - packets:	%17
	Mode:			%18
	Role:			%19
	Quick Mode Filter ID:	%20
	Main Mode SA ID:	%21
	Quick Mode SA ID:	%22

Additional Information:
	Inbound SPI:		%23
	Outbound SPI:		%24

Fields

NameDescription
LocalAddress
LocalAddressMask
LocalPort
LocalTunnelEndpoint
RemoteAddress
RemoteAddressMask
RemotePort
PeerPrivateAddress
RemoteTunnelEndpoint
IpProtocol
KeyingModuleName
AhAuthType
EspAuthType
CipherType
LifetimeSeconds
LifetimeKilobytes
LifetimePackets
Mode
Role
TransportFilterId
MainModeSaId
QuickModeSaId
InboundSpi
OutboundSpi
TunnelId
TrafficSelectorId

References

Event ID 5452 — An IPsec quick mode security association ended.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec quick mode security association ended.
	
Local Endpoint:
	Network Address:	%1
	Port:			%2
	Tunnel Endpoint:		%3

Remote Endpoint:
	Network Address:	%4
	Port:			%5
	Tunnel Endpoint:		%6

Additional Information:
	Protocol:		%7
	Quick Mode SA ID:	%8

Fields

NameDescription
LocalAddress
LocalAddressMask
LocalPort
LocalTunnelEndpoint
RemoteAddress
RemoteAddressMask
RemotePort
RemoteTunnelEndpoint
IpProtocol
QuickModeSaId
TunnelId
TrafficSelectorId

References

Event ID 5453 — An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.

Event ID 5456 — PAStore Engine applied Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent applied Active Directory storage IPsec policy on the computer.

Policy:		%1

Fields

NameDescription
Policy

References

Event ID 5457 — PAStore Engine failed to apply Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to apply Active Directory storage IPsec policy on the computer.

DN:		%1
Error code:		%2

Fields

NameDescription
Policy
Error

References

Event ID 5458 — PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent applied locally cached copy of Active Directory storage IPsec policy on the computer.

Policy:		%1

Fields

NameDescription
Policy

Event ID 5459 — PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.

Policy:		%1
Error Code:		%2

Fields

NameDescription
Policy
Error

Event ID 5460 — PAStore Engine applied local registry storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent applied local registry storage IPsec policy on the computer.

Policy:		%1

Fields

NameDescription
Policy

Event ID 5461 — PAStore Engine failed to apply local registry storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to apply local registry storage IPsec policy on the computer.

Policy:		%1
Error Code:		%2

Fields

NameDescription
Policy
Error

Event ID 5462 — PAStore Engine failed to apply some rules of the active IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem.

Policy:		%1
Error Code:		%2

Fields

NameDescription
Policy
Error

Event ID 5463 — PAStore Engine polled for changes to the active IPsec policy and detected no changes.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent polled for changes to the active IPsec policy and detected no changes.

Event ID 5464 — PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent polled for changes to the active IPsec policy, detected changes, and applied them.

Event ID 5465 — PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent received a control for forced reloading of IPsec policy and processed the control successfully.

Event ID 5466 — PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied.

Event ID 5467 — PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used.

Event ID 5468 — PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used.

Event ID 5471 — PAStore Engine loaded local storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent loaded local storage IPsec policy on the computer.

Policy:		%1

Fields

NameDescription
Policy

Event ID 5472 — PAStore Engine failed to load local storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to load local storage IPsec policy on the computer.

Policy:		%1
Error Code:		%2

Fields

NameDescription
Policy
Error

Event ID 5473 — PAStore Engine loaded directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent loaded directory storage IPsec policy on the computer.

Policy:		%1

Fields

NameDescription
Policy

Event ID 5474 — PAStore Engine failed to load directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to load directory storage IPsec policy on the computer.

Policy:		%1
Error Code:		%2

Fields

NameDescription
Policy
Error

Event ID 5477 — PAStore Engine failed to add quick mode filter.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to add quick mode filter.

Quick Mode Filter:		%1
Error Code:		%2

Fields

NameDescription
QuickModeFilter
Error

References

Event ID 5478 — IPsec Services has started successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The IPsec Policy Agent service was started.

Event ID 5479 — IPsec Services has been shut down successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The IPsec Policy Agent service was stopped. Stopping this service can put the computer at greater risk of network attack or expose the computer to potential security risks.

Event ID 5480 — IPsec Services failed to get the complete list of network interfaces on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to get the complete list of network interfaces on the computer. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.

Event ID 5483 — IPsec Services failed to initialize RPC server.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The IPsec Policy Agent service failed to initialize its RPC server. The service could not be started.

Error Code:		%1

Fields

NameDescription
Error

References

Event ID 5484 — IPsec Services has experienced a critical failure and has been shut down.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The IPsec Policy Agent service experienced a critical failure and has shut down. The shutdown of this service can put the computer at greater risk of network attack or expose the computer to potential security risks.

Error Code:		%1

Fields

NameDescription
Error

Event ID 5485 — IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

IPsec Policy Agent failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.

Event ID 5632 — A request was made to authenticate to a wireless network.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A request was made to authenticate to a wireless network.

Subject:
	Security ID:		%2
	Account Name:		%3
	Account Domain:		%4
	Logon ID:		%5

Network Information:
	Name (SSID):		%1
	Interface GUID:		%8
	Local MAC Address:	%7
	Peer MAC Address:	%6

Additional Information:
	Reason Code:		%10 (%9)
	Error Code:		%11

Fields

NameDescription
SSID
Identity
SubjectUserName
SubjectDomainName
SubjectLogonId
PeerMac
LocalMac
IntfGuid
ReasonCode
ReasonText
ErrorCode
EAPReasonCode
EapRootCauseString
EAPErrorCode

References

Event ID 5633 — A request was made to authenticate to a wired network.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A request was made to authenticate to a wired network.

Subject:
	Security ID:		%2
	Account Name:		%3
	Account Domain:		%4
	Logon ID:		%5

Interface:
	Name:			%1

Additional Information
	Reason Code:		%7 (%6)
	Error Code:		%8

Fields

NameDescription
InterfaceName
Identity
SubjectUserName
SubjectDomainName
SubjectLogonId
ReasonCode
ReasonText
ErrorCode

References

Event ID 5712 — A Remote Procedure Call (RPC) was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Remote Procedure Call (RPC) was attempted.

Subject:
	SID:			%1
	Name:			%2
	Account Domain:		%3
	LogonId:			%4

Process Information:
	PID:			%5
	Name:			%6

Network Information:
	Remote IP Address:	%7
	Remote Port:		%8

RPC Attributes:
	Interface UUID:		%9
	Protocol Sequence:	%10
	Authentication Service:	%11
	Authentication Level:	%12

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
ProcessId
ProcessName
RemoteIpAddress
RemotePort
InterfaceUuid
ProtocolSequence
AuthenticationService
AuthenticationLevel
OpNum
Endpoint
RemoteHost

References

Event ID 5888 — An object in the COM+ Catalog was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

An object in the COM+ Catalog was modified.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	COM+ Catalog Collection:	%5
	Object Name:			%6
	Object Properties Modified:	%7

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectUserDomainName
SubjectLogonId
ObjectCollectionName
ObjectIdentifyingProperties
ModifiedObjectProperties

References

Event ID 5889 — An object was deleted from the COM+ Catalog.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An object was deleted from the COM+ Catalog.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	COM+ Catalog Collection:	%5
	Object Name:			%6
	Object Details:			%7
This event occurs when an object is deleted from the COM+ catalog.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectUserDomainName
SubjectLogonId
ObjectCollectionName
ObjectIdentifyingProperties
ObjectProperties

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5889
  version: 0
  level: 0
  task: 12290
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T22:30:46.980255+00:00'
  event_record_id: 3332
  correlation:
    ActivityID: 59A0D65F-1037-0001-A7D6-A0593710DA01
  execution:
    process_id: 808
    thread_id: 888
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: SYSTEM
  SubjectUserDomainName: NT AUTHORITY
  SubjectLogonId: 999
  ObjectCollectionName: Applications
  ObjectIdentifyingProperties: "\r\n\t\tID = {A14C837E-C9BC-4E79-B228-2A6CB72524A5}\r\n\t\tAppPartitionID
    = {41E90F3E-56C1-4633-81C3-6E8BAC8BDD70}"
  ObjectProperties: "\r\n\t\tName = VMware Snapshot Provider\r\n\t\tApplicationProxyServerName
    = \r\n\t\tProcessType = 2\r\n\t\tCommandLine = \r\n\t\tServiceName = vmvss\r\n\t\tRunAsUserType
    = 1\r\n\t\tIdentity = LocalSystem\r\n\t\tDescription = VMware Snapshot Provider\r\n\t\tIsSystem
    = N\r\n\t\tAuthentication = 6\r\n\t\tShutdownAfter = 3\r\n\t\tRunForever = N\r\n\t\tPassword
    = ********\r\n\t\tActivation = Local\r\n\t\tChangeable = Y\r\n\t\tDeleteable =
    Y\r\n\t\tCreatedBy = \r\n\t\tAccessChecksLevel = 1\r\n\t\tApplicationAccessChecksEnabled
    = 0\r\n\t\tcCOL_SecurityDescriptor = <Opaque>\r\n\t\tImpersonationLevel = 2\r\n\t\tAuthenticationCapability
    = 2\r\n\t\tCRMEnabled = 0\r\n\t\t3GigSupportEnabled = 0\r\n\t\tQueuingEnabled
    = 0\r\n\t\tQueueListenerEnabled = N\r\n\t\tEventsEnabled = 1\r\n\t\tProcessFlags
    = 0\r\n\t\tThreadMax = 0\r\n\t\tApplicationProxy = 0\r\n\t\tCRMLogFile = \r\n\t\tDumpEnabled
    = 0\r\n\t\tDumpOnException = 0\r\n\t\tDumpOnFailfast = 0\r\n\t\tMaxDumpCount =
    5\r\n\t\tDumpPath = %systemroot%\\system32\\com\\dmp\r\n\t\tIsEnabled = 1\r\n\t\tAppPartitionID
    = {41E90F3E-56C1-4633-81C3-6E8BAC8BDD70}\r\n\t\tConcurrentApps = 1\r\n\t\tRecycleLifetimeLimit
    = 0\r\n\t\tRecycleCallLimit = 0\r\n\t\tRecycleActivationLimit = 0\r\n\t\tRecycleMemoryLimit
    = 0\r\n\t\tRecycleExpirationTimeout = 15\r\n\t\tQCListenerMaxThreads = 0\r\n\t\tQCAuthenticateMsgs
    = 0\r\n\t\tApplicationDirectory = \r\n\t\tSRPTrustLevel = 262144\r\n\t\tSRPEnabled
    = 0\r\n\t\tSoapActivated = 0\r\n\t\tSoapVRoot = \r\n\t\tSoapMailTo = \r\n\t\tSoapBaseUrl
    = \r\n\t\tReplicable = 1"
message: ''

References

Event ID 5890 — An object was added to the COM+ Catalog.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

An object was added to the COM+ Catalog.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Object:
	COM+ Catalog Collection:	%5
	Object Name:			%6
	Object Details:			%7

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectUserDomainName
SubjectLogonId
ObjectCollectionName
ObjectIdentifyingProperties
ObjectProperties

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 5890
  version: 0
  level: 0
  task: 12290
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2023-11-05T22:30:50.680307+00:00'
  event_record_id: 3348
  correlation:
    ActivityID: 59A0D65F-1037-0001-A7D6-A0593710DA01
  execution:
    process_id: 808
    thread_id: 896
  channel: Security
  computer: WinDev2310Eval
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: SYSTEM
  SubjectUserDomainName: NT AUTHORITY
  SubjectLogonId: 999
  ObjectCollectionName: UsersInRole
  ObjectIdentifyingProperties: "\r\n\t\tApplId = {B0C2D0B3-B19E-4769-B00B-A0D5996BAD73}\r\n\t\tName
    = Administrators\r\n\t\tUser = SYSTEM"
  ObjectProperties: "\r\n\t\t<null>"
message: ''

References

Event ID 6144 — Security policy in the group policy objects has been applied successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Security policy in the group policy objects has been applied successfully. 

Return Code:	%1

GPO List:
%2

Fields

NameDescription
ErrorCode
GPOList

References

Event ID 6145 — One or more errors occured while processing security policy in the group policy objects.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

One or more errors occured while processing security policy in the group policy objects.

Error Code:	%1
GPO List:
%2

Fields

NameDescription
ErrorCode
GPOList

Event ID 6272 — Network Policy Server granted access to a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server granted access to a user.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Client Machine:
	Security ID:			%5
	Account Name:			%6
	Fully Qualified Account Name:	%7
	OS-Version:			%8
	Called Station Identifier:		%9
	Calling Station Identifier:		%10

NAS:
	NAS IPv4 Address:		%11
	NAS IPv6 Address:		%12
	NAS Identifier:			%13
	NAS Port-Type:			%14
	NAS Port:			%15

RADIUS Client:
	Client Friendly Name:		%16
	Client IP Address:			%17

Authentication Details:
	Proxy Policy Name:		%18
	Network Policy Name:		%19
	Authentication Provider:		%20
	Authentication Server:		%21
	Authentication Type:		%22
	EAP Type:			%23
	Account Session Identifier:		%24

Quarantine Information:
	Result:				%25
	Session Identifier:			%26

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName
SubjectMachineSID
SubjectMachineName
FullyQualifiedSubjectMachineName
CalledStationID
CallingStationID
NASIPv4Address
NASIPv6Address
NASIdentifier
NASPortType
NASPort
ClientName
ClientIPAddress
ProxyPolicyName
NetworkPolicyName
AuthenticationProvider
AuthenticationServer
AuthenticationType
EAPType
AccountSessionIdentifier
LoggingResult

References

Event ID 6273 — Network Policy Server denied access to a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server denied access to a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Client Machine:
	Security ID:			%5
	Account Name:			%6
	Fully Qualified Account Name:	%7
	OS-Version:			%8
	Called Station Identifier:		%9
	Calling Station Identifier:		%10

NAS:
	NAS IPv4 Address:		%11
	NAS IPv6 Address:		%12
	NAS Identifier:			%13
	NAS Port-Type:			%14
	NAS Port:			%15

RADIUS Client:
	Client Friendly Name:		%16
	Client IP Address:			%17

Authentication Details:
	Proxy Policy Name:		%18
	Network Policy Name:		%19
	Authentication Provider:		%20
	Authentication Server:		%21
	Authentication Type:		%22
	EAP Type:			%23
	Account Session Identifier:		%24
	Reason Code:			%25
	Reason:				%26

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName
SubjectMachineSID
SubjectMachineName
FullyQualifiedSubjectMachineName
CalledStationID
CallingStationID
NASIPv4Address
NASIPv6Address
NASIdentifier
NASPortType
NASPort
ClientName
ClientIPAddress
ProxyPolicyName
NetworkPolicyName
AuthenticationProvider
AuthenticationServer
AuthenticationType
EAPType
AccountSessionIdentifier
ReasonCode
Reason
LoggingResult

Community Notes

Large numbers of Reason 16 or 23 from the same IP or MAC indicates bruting of WiFi, VPN, 802.1x portals. Repeat denials for privileged accounts should be investigated.

References

Event ID 6274 — Network Policy Server discarded the request for a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server discarded the request for a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Client Machine:
	Security ID:			%5
	Account Name:			%6
	Fully Qualified Account Name:	%7
	OS-Version:			%8
	Called Station Identifier:		%9
	Calling Station Identifier:		%10

NAS:
	NAS IPv4 Address:		%11
	NAS IPv6 Address:		%12
	NAS Identifier:			%13
	NAS Port-Type:			%14
	NAS Port:			%15

RADIUS Client:
	Client Friendly Name:		%16
	Client IP Address:			%17

Authentication Details:
	Connection Request Policy Name:	%18
	Network Policy Name:		%19
	Authentication Provider:		%20
	Authentication Server:		%21
	Authentication Type:		%22
	EAP Type:			%23
	Account Session Identifier:		%24
	Reason Code:			%25
	Reason:				%26

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName
SubjectMachineSID
SubjectMachineName
FullyQualifiedSubjectMachineName
CalledStationID
CallingStationID
NASIPv4Address
NASIPv6Address
NASIdentifier
NASPortType
NASPort
ClientName
ClientIPAddress
ProxyPolicyName
NetworkPolicyName
AuthenticationProvider
AuthenticationServer
AuthenticationType
EAPType
AccountSessionIdentifier
ReasonCode
Reason

Event ID 6275 — Network Policy Server discarded the accounting request for a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server discarded the accounting request for a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Client Machine:
	Security ID:			%5
	Account Name:			%6
	Fully Qualified Account Name:	%7
	OS-Version:			%8
	Called Station Identifier:		%9
	Calling Station Identifier:		%10

NAS:
	NAS IPv4 Address:		%11
	NAS IPv6 Address:		%12
	NAS Identifier:			%13
	NAS Port-Type:			%14
	NAS Port:			%15

RADIUS Client:
	Client Friendly Name:		%16
	Client IP Address:			%17

Authentication Details:
	Connection Request Policy Name:	%18
	Network Policy Name:		%19
	Authentication Provider:		%20
	Authentication Server:		%21
	Authentication Type:		%22
	EAP Type:			%23
	Account Session Identifier:		%24
	Reason Code:			%25
	Reason:				%26

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName
SubjectMachineSID
SubjectMachineName
FullyQualifiedSubjectMachineName
CalledStationID
CallingStationID
NASIPv4Address
NASIPv6Address
NASIdentifier
NASPortType
NASPort
ClientName
ClientIPAddress
ProxyPolicyName
NetworkPolicyName
AuthenticationProvider
AuthenticationServer
AuthenticationType
EAPType
AccountSessionIdentifier
ReasonCode
Reason

Event ID 6276 — Network Policy Server quarantined a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server quarantined a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Client Machine:
	Security ID:			%5
	Account Name:			%6
	Fully Qualified Account Name:	%7
	OS-Version:			%8
	Called Station Identifier:		%9
	Calling Station Identifier:		%10

NAS:
	NAS IPv4 Address:		%11
	NAS IPv6 Address:		%12
	NAS Identifier:			%13
	NAS Port-Type:			%14
	NAS Port:			%15

RADIUS Client:
	Client Friendly Name:		%16
	Client IP Address:			%17

Authentication Details:
	Connection Request Policy Name:	%18
	Network Policy Name:		%19
	Authentication Provider:		%20
	Authentication Server:		%21
	Authentication Type:		%22
	EAP Type:			%23
	Account Session Identifier:		%24

Quarantine Information:
	Result:				%25
	Extended-Result:			%26
	Session Identifier:			%27
	Help URL:			%28
	System Health Validator Result(s):	%29

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName
SubjectMachineSID
SubjectMachineName
FullyQualifiedSubjectMachineName
MachineInventory
CalledStationID
CallingStationID
NASIPv4Address
NASIPv6Address
NASIdentifier
NASPortType
NASPort
ClientName
ClientIPAddress
ProxyPolicyName
NetworkPolicyName
AuthenticationProvider
AuthenticationServer
AuthenticationType
EAPType
AccountSessionIdentifier
QuarantineState
ExtendedQuarantineState
QuarantineSessionID
QuarantineHelpURL
QuarantineSystemHealthResult

References

Event ID 6277 — Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.

Contact the Network Policy Server administrator for more information.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Client Machine:
	Security ID:			%5
	Account Name:			%6
	Fully Qualified Account Name:	%7
	OS-Version:			%8
	Called Station Identifier:		%9
	Calling Station Identifier:		%10

NAS:
	NAS IPv4 Address:		%11
	NAS IPv6 Address:		%12
	NAS Identifier:			%13
	NAS Port-Type:			%14
	NAS Port:			%15

RADIUS Client:
	Client Friendly Name:		%16
	Client IP Address:			%17

Authentication Details:
	Connection Request Policy Name:	%18
	Network Policy Name:		%19
	Authentication Provider:		%20
	Authentication Server:		%21
	Authentication Type:		%22
	EAP Type:			%23
	Account Session Identifier:		%24

Quarantine Information:
	Result:				%25
	Extended-Result:			%26
	Session Identifier:			%27
	Help URL:			%28
	System Health Validator Result(s):	%29
	Quarantine Grace Time:		%30

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName
SubjectMachineSID
SubjectMachineName
FullyQualifiedSubjectMachineName
MachineInventory
CalledStationID
CallingStationID
NASIPv4Address
NASIPv6Address
NASIdentifier
NASPortType
NASPort
ClientName
ClientIPAddress
ProxyPolicyName
NetworkPolicyName
AuthenticationProvider
AuthenticationServer
AuthenticationType
EAPType
AccountSessionIdentifier
QuarantineState
ExtendedQuarantineState
QuarantineSessionID
QuarantineHelpURL
QuarantineSystemHealthResult
QuarantineGraceTime

References

Event ID 6278 — Network Policy Server granted full access to a user because the host met the defined health policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server granted full access to a user because the host met the defined health policy.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Client Machine:
	Security ID:			%5
	Account Name:			%6
	Fully Qualified Account Name:	%7
	OS-Version:			%8
	Called Station Identifier:		%9
	Calling Station Identifier:		%10

NAS:
	NAS IPv4 Address:		%11
	NAS IPv6 Address:		%12
	NAS Identifier:			%13
	NAS Port-Type:			%14
	NAS Port:			%15

RADIUS Client:
	Client Friendly Name:		%16
	Client IP Address:			%17

Authentication Details:
	Connection Request Policy Name:	%18
	Network Policy Name:		%19
	Authentication Provider:		%20
	Authentication Server:		%21
	Authentication Type:		%22
	EAP Type:			%23
	Account Session Identifier:		%24

Quarantine Information:
	Result:				%25
	Extended-Result:			%26
	Session Identifier:			%27
	Help URL:			%28
	System Health Validator Result(s):	%29

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName
SubjectMachineSID
SubjectMachineName
FullyQualifiedSubjectMachineName
MachineInventory
CalledStationID
CallingStationID
NASIPv4Address
NASIPv6Address
NASIdentifier
NASPortType
NASPort
ClientName
ClientIPAddress
ProxyPolicyName
NetworkPolicyName
AuthenticationProvider
AuthenticationServer
AuthenticationType
EAPType
AccountSessionIdentifier
QuarantineState
ExtendedQuarantineState
QuarantineSessionID
QuarantineHelpURL
QuarantineSystemHealthResult

Event ID 6279 — Network Policy Server locked the user account due to repeated failed authentication attempts.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server locked the user account due to repeated failed authentication attempts.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName

References

Event ID 6280 — Network Policy Server unlocked the user account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Network Policy Server unlocked the user account.

User:
	Security ID:			%1
	Account Name:			%2
	Account Domain:			%3
	Fully Qualified Account Name:	%4

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
FullyQualifiedSubjectUserName

Event ID 6281 — Code Integrity determined that the page hashes of an image file are not valid.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.

File Name:	%1

Fields

NameDescription
param1

Sigma Rules

  • Failed Code Integrity Checks
    Detects code integrity failures such as missing page hashes or corrupted drivers due unauthorized modification. This could be a sign of tampered binaries.

Event ID 6400 — BranchCache: Received an incorrectly formatted response while discovering availability of content.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

BranchCache: Received an incorrectly formatted response while discovering availability of content. 

IP address of the client that sent this response:			%1

Fields

NameDescription
ClientIPAddress

References

Event ID 6401 — BranchCache: Received invalid data from a peer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

BranchCache: Received invalid data from a peer. Data discarded. 

IP address of the client that sent this data:			%1

Fields

NameDescription
ClientIPAddress

Event ID 6402 — BranchCache: The message to the hosted cache offering it data is incorrectly formatted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

BranchCache: The message to the hosted cache offering it data is incorrectly formatted. 

IP address of the client that sent this message: 			%1

Fields

NameDescription
ClientIPAddress

Event ID 6403 — BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data. 

Domain name of the hosted cache is:			%1

Fields

NameDescription
HostedCacheName

References

Event ID 6404 — BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate. 

Domain name of the hosted cache:			%1
	
Error Code:			%2

Fields

NameDescription
HostedCacheName
ErrorCode

References

Event ID 6405 — BranchCache: %2 instance(s) of event id %1 occurred.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

BranchCache: %2 instance(s) of event id %1 occurred.

Fields

NameDescription
EventId
Count

References

Event ID 6406 — %1 registered to Windows Firewall to control filtering for the following: %2.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

%1 registered to Windows Firewall to control filtering for the following: 
%2.

Fields

NameDescription
ProductName
Categories

References

Event ID 6407 — Firewall category unregistered: %1

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

%1

Fields

NameDescription
Message

References

Event ID 6408 — Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.

Fields

NameDescription
ProductName
Categories

Event ID 6409 — BranchCache: A service connection point object could not be parsed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

BranchCache: A service connection point object could not be parsed. 

SCP object GUID: %1

Fields

NameDescription
GUID

Event ID 6410 — Code integrity determined that a file does not meet the security requirements to load into a process.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Code integrity determined that a file does not meet the security requirements to load into a process. This could be due to the use of shared sections or other issues.

File Name:	%1

Fields

NameDescription
param1

Event ID 6416 — A new external device was recognized by the system.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Samples
1

Message

A new external device was recognized by the system.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Class ID:		%5

Vendor IDs:	%6

Compatible IDs:	%7

Location Information:	%8

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DeviceId
DeviceDescription
ClassId
ClassName
VendorIds
CompatibleIds
LocationInformation

Example Event

system:
  provider: Microsoft-Windows-Security-Auditing
  guid: 54849625-5478-4994-A5BA-3E3B0328C30D
  event_source_name: ''
  event_id: 6416
  version: 1
  level: 0
  task: 13316
  opcode: 0
  keywords: 9232379236109516800
  time_created: '2022-04-04T13:11:35.388890+00:00'
  event_record_id: 28470
  correlation: {}
  execution:
    process_id: 4
    thread_id: 340
  channel: Security
  computer: WIN-TKC15D7KHUR
  security:
    user_id: ''
event_data:
  SubjectUserSid: S-1-5-18
  SubjectUserName: WIN-TKC15D7KHUR$
  SubjectDomainName: WORKGROUP
  SubjectLogonId: '0x3e7'
  DeviceId: SWD\PRINTENUM\{3AEC7D2D-F29E-48EB-A851-2E9DF0B72EDC}
  DeviceDescription: Microsoft Print to PDF
  ClassId: 1ED2BBF9-11F0-4084-B21F-AD83A8E6DCDC
  ClassName: PrintQueue
  VendorIds: "\r\n\t\tPRINTENUM\\{084f01fa-e634-4d77-83ee-074817c03581}\r\n\t\tPRINTENUM\\LocalPrintQueue\r\n\t\t{084f01fa-e634-4d77-83ee-074817c03581}\r\n\t\t\r\n\t\t"
  CompatibleIds: "\r\n\t\tGenPrintQueue\r\n\t\tSWD\\GenericRaw\r\n\t\tSWD\\Generic\r\n\t\t\r\n\t\t"
  LocationInformation: '-'
message: ''

Sigma Rules

References

Event ID 6417 — The FIPS mode crypto selftests succeeded.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The FIPS mode crypto selftests succeeded.

	Process ID:		%1
	Process Name:		%2

Fields

NameDescription
ProcessId
ProcessName

Event ID 6418 — The FIPS mode crypto selftests failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The FIPS mode crypto selftests failed.

	Process ID:		%1
	Process Name:		%2
	Failed test code:		%3

Fields

NameDescription
ProcessId
ProcessName
FatalCode

Event ID 6419 — A request was made to disable a device.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A request was made to disable a device.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Device ID:	%5

Device Name:	%6

Class ID:		%7

Class Name:	%8

Hardware IDs:	%9

Compatible IDs:	%10

Location Information:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DeviceId
DeviceDescription
ClassId
ClassName
HardwareIds
CompatibleIds
LocationInformation

Event ID 6420 — A device was disabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A device was disabled.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Device ID:	%5

Device Name:	%6

Class ID:		%7

Class Name:	%8

Hardware IDs:	%9

Compatible IDs:	%10

Location Information:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DeviceId
DeviceDescription
ClassId
ClassName
HardwareIds
CompatibleIds
LocationInformation

Event ID 6421 — A request was made to enable a device.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A request was made to enable a device.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Device ID:	%5

Device Name:	%6

Class ID:		%7

Class Name:	%8

Hardware IDs:	%9

Compatible IDs:	%10

Location Information:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DeviceId
DeviceDescription
ClassId
ClassName
HardwareIds
CompatibleIds
LocationInformation

Event ID 6422 — A device was enabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A device was enabled.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Device ID:	%5

Device Name:	%6

Class ID:		%7

Class Name:	%8

Hardware IDs:	%9

Compatible IDs:	%10

Location Information:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DeviceId
DeviceDescription
ClassId
ClassName
HardwareIds
CompatibleIds
LocationInformation

Community Notes

May indicate removable storage or network adapters to stage tools or exfiltrate data.

Event ID 6423 — The installation of this device is forbidden by system policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The installation of this device is forbidden by system policy.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Device ID:	%5

Device Name:	%6

Class ID:		%7

Class Name:	%8

Hardware IDs:	%9

Compatible IDs:	%10

Location Information:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DeviceId
DeviceDescription
ClassId
ClassName
HardwareIds
CompatibleIds
LocationInformation

Sigma Rules

Event ID 6424 — The installation of this device was allowed, after having previously been forbidden by policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The installation of this device was allowed, after having previously been forbidden by policy.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Device ID:	%5

Device Name:	%6

Class ID:		%7

Class Name:	%8

Hardware IDs:	%9

Compatible IDs:	%10

Location Information:	%11

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
DeviceId
DeviceDescription
ClassId
ClassName
HardwareIds
CompatibleIds
LocationInformation

Event ID 6425 — A network client used a legacy RPC method to modify authentication information on a trusted domain object.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A network client used a legacy RPC method to modify authentication information on a trusted domain object. The authentication information was encrypted with a legacy encryption algorithm. Consider upgrading the client operating system or application to use the latest and more secure version of this method.

Trusted Domain:
	Domain Name:		%5
	Domain ID:		%6

Modified By:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Client Network Address:		%7
RPC Method Name:		%8

For more information please see https://go.microsoft.com/fwlink/?linkid=2161080.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TrustedDomainName
TrustedDomainId
ClientNetworkAddress
LegacyRPCMethodName

Event ID 6426 — The volatile system access rights assigned to an account were modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

The volatile system access rights assigned to an account were modified.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Account Modified:
	Security ID:		%5

Original Access Rights (%6):
%7

Access Rights Granted (%8):
%9

Access Rights Removed (%10):
%11

Final Access Rights (%12):
%13


For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetSid
OriginalAccessRightsMask
OriginalAccessRights
GrantedAccessRightsMask
GrantedAccessRights
RemovedAccessRightsMask
RemovedAccessRights
FinalAccessRightsMask
FinalAccessRights

Event ID 6427 — System access right details for a successful logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

System access right details for a successful logon.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

New Logon:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7
	Logon ID:		%8

Logon Type:			%9

Allow right:			%10 (%11)

Event in sequence:		%12 of %13

Policy assignments:	%14

Local assignments:	%15

Additional details about this logon attempt may be found in the correlated 4624 event.

For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
LogonType
SystemAccessRightRequiredForLogon
SystemAccessRightRequiredForLogonUlong
EventIndex
EventCountTotal
SystemAccessRightSidList
LocalSystemAccessRightSidList

Event ID 6428 — System access right details for a failed logon that was explicitly denied.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

System access right details for a failed logon that was explicitly denied.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Account For Which Logon Failed:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7

Logon Type:			%8

Deny right:			%9 (%10)

Event in sequence:		%11 of %12

Policy assignments:	%13

Local assignments:	%14

Additional details about this logon attempt may be found in the correlated 4625 event.

For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetUserSid
TargetUserName
TargetDomainName
LogonType
DenySystemAccessRight
DenySystemAccessRightUlong
EventIndex
EventCountTotal
DenySystemAccessRightsSidList
DenyLocalSystemAccessRightsSidList

Event ID 6429 — System access right details for a failed logon that was implicitly denied.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

System access right details for a failed logon that was implicitly denied.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3
	Logon ID:		%4

Account For Which Logon Failed:
	Security ID:		%5
	Account Name:		%6
	Account Domain:		%7

Logon Type:			%8

Allow right:			%9 (%10)

Additional details about this logon attempt may be found in the correlated 4625 event.

For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields

NameDescription
SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetUserSid
TargetUserName
TargetDomainName
LogonType
AllowSystemAccessRight
AllowSystemAccessRightUlong

Event ID 6430 — A Windows Firewall policy was imported.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

A Windows Firewall policy was imported.

Subject:
	Security ID:		%1
	Account Name:		%2
	Account Domain:		%3

Import Information:
	Import File Name:	%4
	Policy Details:	%5

Fields

NameDescription
UserSid
UserName
DomainName
ImportFileName
PolicyDetails

Event ID 8191 — Highest System-Defined Audit Message Value.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Message

Highest System-Defined Audit Message Value.