Microsoft-Windows-Security-Auditing

426 events across 1 channel

Event IDTitleChannel
412AD FS authentication failure.Security
501AD FS proxy authentication request.Security
675Pre-authentication failed (legacy Windows 2003 Kerberos event; superseded by …Security
4608Windows is starting up.Security
4609Windows is shutting down.Security
4610An authentication package has been loaded by the Local Security Authority.Security
4611A trusted logon process has been registered with the Local Security Authority.Security
4612Internal resources allocated for the queuing of audit messages have been …Security
4614A notification package has been loaded by the Security Account Manager.Security
4615Invalid use of LPC port.Security
4616The system time was changed.Security
4618A monitored security event pattern has occurred.Security
4621Administrator recovered system from CrashOnAuditFail.Security
4622A security package has been loaded by the Local Security Authority.Security
4624An account was successfully logged on.Security
4625An account failed to log on.Security
4626User / Device claims information.Security
4627Group membership information.Security
4634An account was logged off.Security
4646notificationSecurity
4647User initiated logoff.Security
4648A logon was attempted using explicit credentials.Security
4649A replay attack was detected.Security
4650An IPsec main mode security association was established.Security
4651An IPsec main mode security association was established.Security
4652An IPsec main mode negotiation failed.Security
4653An IPsec main mode negotiation failed.Security
4654An IPsec quick mode negotiation failed.Security
4655An IPsec main mode security association ended.Security
4656A handle to an object was requested.Security
4657A registry value was modified.Security
4658The handle to an object was closed.Security
4659A handle to an object was requested with intent to delete.Security
4660An object was deleted.Security
4661A handle to an object was requested.Security
4662An operation was performed on an object.Security
4663An attempt was made to access an object.Security
4664An attempt was made to create a hard link.Security
4665An attempt was made to create an application client context.Security
4666An application attempted an operation.Security
4667An application client context was deleted.Security
4668An application was initialized.Security
4670Permissions on an object were changed.Security
4671An application attempted to access a blocked ordinal through the TBS.Security
4672Special privileges assigned to new logon.Security
4673A privileged service was called.Security
4674An operation was attempted on a privileged object.Security
4675SIDs were filtered.Security
4688A new process has been created.Security
4689A process has exited.Security
4690An attempt was made to duplicate a handle to an object.Security
4691Indirect access to an object was requested.Security
4692Backup of data protection master key was attempted.Security
4693Recovery of data protection master key was attempted.Security
4694Protection of auditable protected data was attempted.Security
4695Unprotection of auditable protected data was attempted.Security
4696A primary token was assigned to process.Security
4697A service was installed in the system.Security
4698A scheduled task was created.Security
4699A scheduled task was deleted.Security
4700A scheduled task was enabled.Security
4701A scheduled task was disabled.Security
4702A scheduled task was updated.Security
4703A user right was adjusted.Security
4704A user right was assigned.Security
4705A user right was removed.Security
4706A new trust was created to a domain.Security
4707A trust to a domain was removed.Security
4709The IPsec Policy Agent service was started.Security
4710The IPsec Policy Agent service was disabled.Security
4711param1Security
4712IPsec Policy Agent encountered a potentially serious failure.Security
4713Kerberos policy was changed.Security
4714Data Recovery Agent group policy for Encrypting File System (EFS) has changed.Security
4715The audit policy (SACL) on an object was changed.Security
4716Trusted domain information was modified.Security
4717System security access was granted to an account.Security
4718System security access was removed from an account.Security
4719System audit policy was changed.Security
4720A user account was created.Security
4722A user account was enabled.Security
4723An attempt was made to change an account's password.Security
4724An attempt was made to reset an account's password.Security
4725A user account was disabled.Security
4726A user account was deleted.Security
4727A security-enabled global group was created.Security
4728A member was added to a security-enabled global group.Security
4729A member was removed from a security-enabled global group.Security
4730A security-enabled global group was deleted.Security
4731A security-enabled local group was created.Security
4732A member was added to a security-enabled local group.Security
4733A member was removed from a security-enabled local group.Security
4734A security-enabled local group was deleted.Security
4735A security-enabled local group was changed.Security
4737A security-enabled global group was changed.Security
4738A user account was changed.Security
4739Domain Policy was changed.Security
4740A user account was locked out.Security
4741A computer account was created.Security
4742A computer account was changed.Security
4743A computer account was deleted.Security
4744A security-disabled local group was created.Security
4745A security-disabled local group was changed.Security
4746A member was added to a security-disabled local group.Security
4747A member was removed from a security-disabled local group.Security
4748A security-disabled local group was deleted.Security
4749A security-disabled global group was created.Security
4750A security-disabled global group was changed.Security
4751A member was added to a security-disabled global group.Security
4752A member was removed from a security-disabled global group.Security
4753A security-disabled global group was deleted.Security
4754A security-enabled universal group was created.Security
4755A security-enabled universal group was changed.Security
4756A member was added to a security-enabled universal group.Security
4757A member was removed from a security-enabled universal group.Security
4758A security-enabled universal group was deleted.Security
4759A security-disabled universal group was created.Security
4760A security-disabled universal group was changed.Security
4761A member was added to a security-disabled universal group.Security
4762A member was removed from a security-disabled universal group.Security
4763A security-disabled universal group was deleted.Security
4764A group’s type was changed.Security
4765SID History was added to an account.Security
4766An attempt to add SID History to an account failed.Security
4767A user account was unlocked.Security
4768A Kerberos authentication ticket (TGT) was requested.Security
4769A Kerberos service ticket was requested.Security
4770A Kerberos service ticket was renewed.Security
4771Kerberos pre-authentication failed.Security
4772A Kerberos authentication ticket request failed.Security
4773A Kerberos service ticket request failed.Security
4774An account was mapped for logon.Security
4775An account could not be mapped for logon.Security
4776The domain controller attempted to validate the credentials for an account.Security
4777The domain controller failed to validate the credentials for an account.Security
4778A session was reconnected to a Window Station.Security
4779A session was disconnected from a Window Station.Security
4780The ACL was set on accounts which are members of administrators groups.Security
4781The name of an account was changed.Security
4782The password hash an account was accessed.Security
4783A basic application group was created.Security
4784A basic application group was changed.Security
4785A member was added to a basic application group.Security
4786A member was removed from a basic application group.Security
4787A non-member was added to a basic application group.Security
4788A non-member was removed from a basic application group.Security
4789A basic application group was deleted.Security
4790An LDAP query group was created.Security
4791A basic application group was changed.Security
4792An LDAP query group was deleted.Security
4793The Password Policy Checking API was called.Security
4794An attempt was made to set the Directory Services Restore Mode administrator …Security
4797An attempt was made to query the existence of a blank password for an account.Security
4798A user's local group membership was enumerated.Security
4799A security-enabled local group membership was enumerated.Security
4800The workstation was locked.Security
4801The workstation was unlocked.Security
4802The screen saver was invoked.Security
4803The screen saver was dismissed.Security
4816RPC detected an integrity violation while decrypting an incoming message.Security
4817Auditing settings on object were changed.Security
4818Proposed Central Access Policy does not grant the same access permissions as the …Security
4819Central Access Policies on the machine have been changed.Security
4820A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not …Security
4821A Kerberos service ticket was denied because the user, device, or both does not …Security
4822NTLM authentication failed because the account was a member of the Protected …Security
4823NTLM authentication failed because access control restrictions are required.Security
4824Kerberos preauthentication by using DES or RC4 failed because the account was a …Security
4825A user was denied the access to Remote Desktop.Security
4826Boot Configuration Data loaded.Security
4830SID History was removed from an account.Security
4864A namespace collision was detected.Security
4865A trusted forest information entry was added.Security
4866A trusted forest information entry was removed.Security
4867A trusted forest information entry was modified.Security
4868The certificate manager denied a pending certificate request.Security
4869Certificate Services received a resubmitted certificate request.Security
4870Certificate Services revoked a certificate.Security
4871Certificate Services received a request to publish the certificate revocation …Security
4872Certificate Services published the certificate revocation list (CRL).Security
4873A certificate request extension changed.Security
4874One or more certificate request attributes changed.Security
4875Certificate Services received a request to shut down.Security
4876Certificate Services backup started.Security
4877Certificate Services backup completed.Security
4878Certificate Services restore started.Security
4879Certificate Services restore completed.Security
4880Certificate Services started.Security
4881Certificate Services stopped.Security
4882The security permissions for Certificate Services changed.Security
4883Certificate Services retrieved an archived key.Security
4884Certificate Services imported a certificate into its database.Security
4885The audit filter for Certificate Services changed.Security
4886Certificate Services received a certificate request.Security
4887Certificate Services approved a certificate request and issued a certificate.Security
4888Certificate Services denied a certificate request.Security
4889Certificate Services set the status of a certificate request to pending.Security
4890The certificate manager settings for Certificate Services changed.Security
4891A configuration entry changed in Certificate Services.Security
4892A property of Certificate Services changed.Security
4893Certificate Services archived a key.Security
4894Certificate Services imported and archived a key.Security
4895Certificate Services published the CA certificate to Active Directory Domain …Security
4896One or more rows have been deleted from the certificate database.Security
4897Role separation enabled: RoleSeparationEnabled.Security
4898Certificate Services loaded a template.Security
4899A Certificate Services template was updated.Security
4900Certificate Services template security was updated.Security
4902The Per-user audit policy table was created.Security
4904An attempt was made to register a security event source.Security
4905An attempt was made to unregister a security event source.Security
4906The CrashOnAuditFail value has changed.Security
4907Auditing settings on object were changed.Security
4908Special Groups Logon table modified.Security
4909The local policy settings for the TBS were changed.Security
4910The group policy settings for the TBS were changed.Security
4911Resource attributes of the object were changed.Security
4912Per User Audit Policy was changed.Security
4913Central Access Policy on the object was changed.Security
4928An Active Directory replica source naming context was established.Security
4929An Active Directory replica source naming context was removed.Security
4930An Active Directory replica source naming context was modified.Security
4931An Active Directory replica destination naming context was modified.Security
4932Synchronization of a replica of an Active Directory naming context has begun.Security
4933Synchronization of a replica of an Active Directory naming context has ended.Security
4934Attributes of an Active Directory object were replicated.Security
4935Replication failure begins.Security
4936Replication failure ends.Security
4937A lingering object was removed from a replica.Security
4944The following policy was active when the Windows Firewall started.Security
4945A rule was listed when the Windows Firewall started.Security
4946A change has been made to Windows Firewall exception list. A rule was added.Security
4947A change has been made to Windows Firewall exception list. A rule was modified.Security
4948A change has been made to Windows Firewall exception list. A rule was deleted.Security
4949Windows Firewall settings were restored to the default values.Security
4950A Windows Firewall setting has changed.Security
4951A rule has been ignored because its major version number was not recognized by …Security
4952Parts of a rule have been ignored because its minor version number was not …Security
4953A rule has been ignored by Windows Firewall because it could not parse the rule.Security
4954Windows Firewall Group Policy settings has changed.Security
4956Windows Firewall has changed the active profile.Security
4957Windows Firewall did not apply the following rule.Security
4958Windows Firewall did not apply the following rule because the rule referred to …Security
4960IPsec dropped an inbound packet that failed an integrity check.Security
4961IPsec dropped an inbound packet that failed a replay check.Security
4962IPsec dropped an inbound packet that failed a replay check.Security
4963IPsec dropped an inbound clear text packet that should have been secured.Security
4964Special groups have been assigned to a new logon.Security
4965IPsec received a packet from a remote computer with an incorrect Security …Security
4976During Main Mode negotiation, IPsec received an invalid negotiation packet.Security
4977During Quick Mode negotiation, IPsec received an invalid negotiation packet.Security
4978During Extended Mode negotiation, IPsec received an invalid negotiation packet.Security
4979IPsec Main Mode and Extended Mode security associations were established.Security
4980IPsec Main Mode and Extended Mode security associations were established.Security
4981IPsec Main Mode and Extended Mode security associations were established.Security
4982IPsec Main Mode and Extended Mode security associations were established.Security
4983An IPsec Extended Mode negotiation failed.Security
4984An IPsec Extended Mode negotiation failed.Security
4985The state of a transaction has changed.Security
5024The Windows Firewall Service has started successfully.Security
5025The Windows Firewall Service has been stopped.Security
5027The Windows Firewall Service was unable to retrieve the security policy from the …Security
5028The Windows Firewall Service was unable to parse the new security policy.Security
5029The Windows Firewall Service failed to initialize the driver.Security
5030The Windows Firewall Service failed to start.Security
5031The Windows Firewall Service blocked an application from accepting incoming …Security
5032Windows Firewall was unable to notify the user that it blocked an application …Security
5033The Windows Firewall Driver has started successfully.Security
5034The Windows Firewall Driver has been stopped.Security
5035The Windows Firewall Driver failed to start.Security
5037The Windows Firewall Driver detected critical runtime error.Security
5038Code integrity determined that the image hash of a file is not valid.Security
5039A registry key was virtualized.Security
5040A change has been made to IPsec settings. An Authentication Set was added.Security
5041A change has been made to IPsec settings. An Authentication Set was modified.Security
5042A change has been made to IPsec settings. An Authentication Set was deleted.Security
5043A change has been made to IPsec settings. A Connection Security Rule was added.Security
5044A change has been made to IPsec settings. A Connection Security Rule was …Security
5045A change has been made to IPsec settings. A Connection Security Rule was …Security
5046A change has been made to IPsec settings. A Crypto Set was added.Security
5047A change has been made to IPsec settings. A Crypto Set was modified.Security
5048A change has been made to IPsec settings. A Crypto Set was deleted.Security
5049An IPsec Security Association was deleted.Security
5050An attempt to programmatically disable the Windows Firewall using a call to …Security
5051A file was virtualized.Security
5056A cryptographic self test was performed.Security
5057A cryptographic primitive operation failed.Security
5058Key file operation.Security
5059Key migration operation.Security
5060Verification operation failed.Security
5061Cryptographic operation.Security
5062A kernel-mode cryptographic self test was performed.Security
5063A cryptographic provider operation was attempted.Security
5064A cryptographic context operation was attempted.Security
5065A cryptographic context modification was attempted.Security
5066A cryptographic function operation was attempted.Security
5067A cryptographic function modification was attempted.Security
5068A cryptographic function provider operation was attempted.Security
5069A cryptographic function property operation was attempted.Security
5070A cryptographic function property modification was attempted.Security
5071Key access denied by Microsoft key distribution service.Security
5120OCSP Responder Service Started.Security
5121OCSP Responder Service Stopped.Security
5122A Configuration entry changed in the OCSP Responder Service.Security
5123A configuration entry changed in the OCSP Responder Service.Security
5124A security setting was updated on OCSP Responder Service.Security
5125A request was submitted to OCSP Responder Service.Security
5126Signing Certificate was automatically updated by the OCSP Responder Service.Security
5127The OCSP Revocation Provider successfully updated the revocation information.Security
5136A directory service object was modified.Security
5137A directory service object was created.Security
5138A directory service object was undeleted.Security
5139A directory service object was moved.Security
5140A network share object was accessed.Security
5141A directory service object was deleted.Security
5142A network share object was added.Security
5143A network share object was modified.Security
5144A network share object was deleted.Security
5145A network share object was checked to see whether client can be granted desired …Security
5146The Windows Filtering Platform has blocked a packet.Security
5147A more restrictive Windows Filtering Platform filter has blocked a packet.Security
5148The Windows Filtering Platform has detected a DoS attack and entered a defensive …Security
5149The DoS attack has subsided and normal processing is being resumed.Security
5150The Windows Filtering Platform has blocked a packet.Security
5151A more restrictive Windows Filtering Platform filter has blocked a packet.Security
5152The Windows Filtering Platform blocked a packet.Security
5153A more restrictive Windows Filtering Platform filter has blocked a packet.Security
5154The Windows Filtering Platform has permitted an application or service to listen …Security
5155The Windows Filtering Platform has blocked an application or service from …Security
5156The Windows Filtering Platform has permitted a connection.Security
5157The Windows Filtering Platform has blocked a connection.Security
5158The Windows Filtering Platform has permitted a bind to a local port.Security
5159The Windows Filtering Platform has blocked a bind to a local port.Security
5160The Windows Filtering Platform Audit Mode has allowed a connection or packet …Security
5168SPN check for SMB/SMB2 fails.Security
5169A directory service object was modified.Security
5170A directory service object was modified during a background cleanup task.Security
5376Credential Manager credentials were backed up.Security
5377Credential Manager credentials were restored from a backup.Security
5378The requested credentials delegation was disallowed by policy.Security
5379Credential Manager credentials were read.Security
5380Vault Find Credential.Security
5381Vault credentials were read.Security
5382Vault credentials were read.Security
5440The following callout was present when the Windows Filtering Platform Base …Security
5441The following filter was present when the Windows Filtering Platform Base …Security
5442The following provider was present when the Windows Filtering Platform Base …Security
5443The following provider context was present when the Windows Filtering Platform …Security
5444The following sub-layer was present when the Windows Filtering Platform Base …Security
5446A Windows Filtering Platform callout has been changed.Security
5447A Windows Filtering Platform filter has been changed.Security
5448A Windows Filtering Platform provider has been changed.Security
5449A Windows Filtering Platform provider context has been changed.Security
5450A Windows Filtering Platform sub-layer has been changed.Security
5451An IPsec quick mode security association was established.Security
5452An IPsec quick mode security association ended.Security
5453An IPsec negotiation with a remote computer failed because the IKE and AuthIP …Security
5456PAStore Engine applied Active Directory storage IPsec policy on the computer.Security
5457PAStore Engine failed to apply Active Directory storage IPsec policy on the …Security
5458PAStore Engine applied locally cached copy of Active Directory storage IPsec …Security
5459PAStore Engine failed to apply locally cached copy of Active Directory storage …Security
5460PAStore Engine applied local registry storage IPsec policy on the computer.Security
5461PAStore Engine failed to apply local registry storage IPsec policy on the …Security
5462PAStore Engine failed to apply some rules of the active IPsec policy on the …Security
5463PAStore Engine polled for changes to the active IPsec policy and detected no …Security
5464PAStore Engine polled for changes to the active IPsec policy, detected changes, …Security
5465PAStore Engine received a control for forced reloading of IPsec policy and …Security
5466PAStore Engine polled for changes to the Active Directory IPsec policy, …Security
5467PAStore Engine polled for changes to the Active Directory IPsec policy, …Security
5468PAStore Engine polled for changes to the Active Directory IPsec policy, …Security
5471PAStore Engine loaded local storage IPsec policy on the computer.Security
5472PAStore Engine failed to load local storage IPsec policy on the computer.Security
5473PAStore Engine loaded directory storage IPsec policy on the computer.Security
5474PAStore Engine failed to load directory storage IPsec policy on the computer.Security
5477PAStore Engine failed to add quick mode filter.Security
5478IPsec Services has started successfully.Security
5479IPsec Services has been shut down successfully.Security
5480IPsec Services failed to get the complete list of network interfaces on the …Security
5483IPsec Services failed to initialize RPC server.Security
5484IPsec Services has experienced a critical failure and has been shut down.Security
5485IPsec Services failed to process some IPsec filters on a plug-and-play event for …Security
5632A request was made to authenticate to a wireless network.Security
5633A request was made to authenticate to a wired network.Security
5712A Remote Procedure Call (RPC) was attempted.Security
5888An object in the COM+ Catalog was modified.Security
5889An object was deleted from the COM+ Catalog.Security
5890An object was added to the COM+ Catalog.Security
6144Security policy in the group policy objects has been applied successfully.Security
6145One or more errors occured while processing security policy in the group policy …Security
6272Network Policy Server granted access to a user.Security
6273Network Policy Server denied access to a user.Security
6274Network Policy Server discarded the request for a user.Security
6275Network Policy Server discarded the accounting request for a user.Security
6276Network Policy Server quarantined a user.Security
6277Network Policy Server granted access to a user but put it on probation because …Security
6278Network Policy Server granted full access to a user because the host met the …Security
6279Network Policy Server locked the user account due to repeated failed …Security
6280Network Policy Server unlocked the user account.Security
6281Code Integrity determined that the page hashes of an image file are not valid.Security
6400BranchCache: Received an incorrectly formatted response while discovering …Security
6401BranchCache: Received invalid data from a peer.Security
6402BranchCache: The message to the hosted cache offering it data is incorrectly …Security
6403BranchCache: The hosted cache sent an incorrectly formatted response to the …Security
6404BranchCache: Hosted cache could not be authenticated using the provisioned SSL …Security
6405BranchCache: Count instance(s) of event id EventId occurred.Security
6406ProductName registered to Windows Firewall to control filtering for the …Security
6407Firewall category unregistered: MessageSecurity
6408Registered product ProductName failed and Windows Firewall is now controlling …Security
6409BranchCache: A service connection point object could not be parsed.Security
6410Code integrity determined that a file does not meet the security requirements to …Security
6416A new external device was recognized by the system.Security
6417The FIPS mode crypto selftests succeeded.Security
6418The FIPS mode crypto selftests failed.Security
6419A request was made to disable a device.Security
6420A device was disabled.Security
6421A request was made to enable a device.Security
6422A device was enabled.Security
6423The installation of this device is forbidden by system policy.Security
6424The installation of this device was allowed, after having previously been …Security
6425A network client used a legacy RPC method to modify authentication information …Security
6426The volatile system access rights assigned to an account were modified.Security
6427System access right details for a successful logon.Security
6428System access right details for a failed logon that was explicitly denied.Security
6429System access right details for a failed logon that was implicitly denied.Security
6430A Windows Firewall policy was imported.Security
8191Highest System-Defined Audit Message Value.Security

Event ID 412 — AD FS authentication failure.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

AD FS auditing event emitted on the federation server when an authentication attempt fails. Logged under the Security provider via AD FS audit policy; referenced by Sentinel ADFS rules.

Detection Patterns #

Event ID 501 — AD FS proxy authentication request.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

AD FS auditing event emitted when the federation proxy forwards an authentication request. Logged under the Security provider via AD FS audit policy; referenced by Sentinel ADFS rules.

Detection Patterns #

Event ID 675 — Pre-authentication failed (legacy Windows 2003 Kerberos event; superseded by 4771).

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

Legacy Kerberos pre-authentication failure event from Windows 2003. Superseded by EventID 4771 in Vista+.

Event ID 4608 — Windows is starting up.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security State Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Windows is starting up.

Message #

Windows is starting up.

This event is logged when LSASS.EXE starts and the auditing subsystem is initialized.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4608,
    "version": 0,
    "level": 0,
    "task": 12288,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:27.349587+00:00",
    "event_record_id": 2754,
    "correlation": {},
    "execution": {
      "process_id": 808,
      "thread_id": 812
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 4609 — Windows is shutting down.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security State Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Windows is shutting down.

Message #

Windows is shutting down.
All logon sessions will be terminated by this shutdown.

References #

Event ID 4610 — An authentication package has been loaded by the Local Security Authority.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security System Extension
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An authentication package has been loaded by the Local Security Authority.

Message #

An authentication package has been loaded by the Local Security Authority.
This authentication package will be used to authenticate logon attempts.

Authentication Package Name: %1

Fields #

NameDescription
AuthenticationPackageName UnicodeStringAuthentication Package Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4610,
    "version": 0,
    "level": 0,
    "task": 12289,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:13.483248+00:00",
    "event_record_id": 25342,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 616
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "AuthenticationPackageName": "C:\\Windows\\system32\\msv1_0.DLL : MICROSOFT_AUTHENTICATION_PACKAGE_V1_0"
  },
  "message": ""
}

References #

Event ID 4611 — A trusted logon process has been registered with the Local Security Authority.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security System Extension
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A trusted logon process has been registered with the Local Security Authority.

Message #

A trusted logon process has been registered with the Local Security Authority.
This logon process will be trusted to submit logon requests.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Logon Process Name: %5

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
LogonProcessName UnicodeString[Subject] Logon Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4611,
    "version": 0,
    "level": 0,
    "task": 12289,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:50:33.878854+00:00",
    "event_record_id": 31791,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 3232
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-TKC15D7KHUR$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "LogonProcessName": "UserManager"
  },
  "message": ""
}

Community Notes #

May be seen when a process injects into LSASS.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 4612 — Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.

Message #

Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.

Number of audit messages discarded: %1

This event is generated when audit queues are filled and events must be discarded.  This most commonly occurs when security events are being generated faster than they are being written to disk, or when the auditing system loses connectivity to the event log, such as when the event log service is stopped.

Fields #

NameDescription
AuditsDiscarded UInt32Number of audit messages discarded

References #

Event ID 4614 — A notification package has been loaded by the Security Account Manager.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security System Extension
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A notification package has been loaded by the Security Account Manager.

Message #

A notification package has been loaded by the Security Account Manager.
This package will be notified of any account or password changes.

Notification Package Name: %1

Fields #

NameDescription
NotificationPackageName UnicodeStringNotification Package Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4614,
    "version": 0,
    "level": 0,
    "task": 12289,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:13.532261+00:00",
    "event_record_id": 25349,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 616
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "NotificationPackageName": "scecli"
  },
  "message": ""
}

References #

Event ID 4615 — Invalid use of LPC port.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Invalid use of LPC port.

Message #

Invalid use of LPC port.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process Information:
	PID: %7
	Name: %8

Invalid Use: %5

LPC Server Port Name: %6

Windows Local Security Authority (LSA) communicates with the Windows kernel using Local Procedure Call (LPC) ports. If you see this event, an application has inadvertently or intentionally accessed this port which is reserved exclusively for LSA's use. The application (process) should be investigated to ensure that it is not attempting to tamper with this communications channel.

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Invalid_Use UnicodeString[Process Information] Invalid Use.
LPC_Server_Port_Name UnicodeString[Process Information] LPC Server Port Name.
PID Pointer[Process Information] PID.
Name UnicodeString[Process Information] Name.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
InvalidCallName UnicodeStringInvalid Use
ServerPortName UnicodeStringLPC Server Port Name
ProcessId Pointer[Process Information] PID
ProcessName UnicodeString[Process Information] Name

References #

Event ID 4616 — The system time was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security State Change
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

The system time was changed.

Message #

The system time was changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process Information:
	Process ID: %9
	Name: %10

Previous Time: %6 %5
New Time: %8 %7

This event is generated when the system time is changed. It is normal for the Windows Time Service, which runs with System privilege, to change the system time on a regular basis. Other system time changes may be indicative of attempts to tamper with the computer.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PreviousTime FILETIMEPrevious Time
NewTime FILETIMENew Time
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4616,
    "version": 1,
    "level": 0,
    "task": 12288,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T22:32:22.236565+00:00",
    "event_record_id": 3458,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 52
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PreviousTime": "2023-11-05T22:32:20.942615Z",
    "NewTime": "2023-11-05T22:32:22.232000Z",
    "ProcessId": "0xcec",
    "ProcessName": "C:\\Program Files\\VMware\\VMware Tools\\vmtoolsd.exe"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 4618 — A monitored security event pattern has occurred.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A monitored security event pattern has occurred.

Message #

A monitored security event pattern has occurred.

Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6

Alert Information:
	Computer: %2
	Event ID: %1
	Number of Events: %7
	Duration: %8

This event is generated when Windows is configured to generate alerts in accordance with the Common Criteria Security Audit Analysis requirements (FAU_SAA) and an auditable event pattern occurs.

Fields #

NameDescription
EventId UInt32[Alert Information] Event ID
ComputerName UnicodeString[Alert Information] Computer
TargetUserSid SID[Subject] Security ID
TargetUserName UnicodeString[Subject] Account Name
TargetUserDomain UnicodeString[Subject] Account Domain
TargetLogonId HexInt64[Subject] Logon ID
EventCount UInt32[Alert Information] Number of Events
Duration UnicodeString[Alert Information] Duration

References #

Event ID 4621 — Administrator recovered system from CrashOnAuditFail.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security State Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded.

Message #

Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some auditable activity might not have been recorded.

Value of CrashOnAuditFail: %1

This event is logged after a system reboots following CrashOnAuditFail.

Fields #

NameDescription
CrashOnAuditFailValue UnicodeStringValue of CrashOnAuditFail

References #

Event ID 4622 — A security package has been loaded by the Local Security Authority.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security System Extension
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security package has been loaded by the Local Security Authority.

Message #

A security package has been loaded by the Local Security Authority.

Security Package Name: %1

Fields #

NameDescription
SecurityPackageName UnicodeStringSecurity Package Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4622,
    "version": 0,
    "level": 0,
    "task": 12289,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:13.482782+00:00",
    "event_record_id": 25341,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 616
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SecurityPackageName": "C:\\Windows\\system32\\schannel.DLL : Microsoft Unified Security Protocol Provider"
  },
  "message": ""
}

References #

Event ID 4624 — An account was successfully logged on.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Logon
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An account was successfully logged on.

Message #

An account was successfully logged on.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Logon Type: %9

New Logon:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8
	Logon GUID: %13

Process Information:
	Process ID: %17
	Process Name: %18

Network Information:
	Workstation Name: %12
	Source Network Address: %19
	Source Port: %20

Detailed Authentication Information:
	Logon Process: %10
	Authentication Package: %11
	Transited Services: %14
	Package Name (NTLM only): %15
	Key Length: %16

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.
	- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID. Indicates the account on the local system which requested the logon.
SubjectUserName UnicodeString[Subject] Account Name. Indicates the account on the local system which requested the logon.
SubjectDomainName UnicodeString[Subject] Account Domain. Indicates the account on the local system which requested the logon.
SubjectLogonId HexInt64[Subject] Logon ID. Indicates the account on the local system which requested the logon.
TargetUserSid SID[New Logon] Security ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetUserName UnicodeString[New Logon] Account Name. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetDomainName UnicodeString[New Logon] Account Domain. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetLogonId HexInt64[New Logon] Logon ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
LogonType UInt32[Logon Information] Logon Type. Indicates the kind of logon that occurred. Logon type reference
LogonProcessName UnicodeString[Detailed Authentication Information] Logon Process. Provides detailed information about this specific logon request.
AuthenticationPackageName UnicodeString[Detailed Authentication Information] Authentication Package. Provides detailed information about this specific logon request.
WorkstationName UnicodeString[Network Information] Workstation Name. Indicates where a remote logon request originated.
LogonGuid GUID[New Logon] Logon GUID. Is a unique identifier that can be used to correlate this event with a KDC event.
TransmittedServices UnicodeString[Detailed Authentication Information] Transited Services. Indicate which intermediate services have participated in this logon request.
LmPackageName UnicodeString[Detailed Authentication Information] Package Name (NTLM only). Indicates which sub-protocol was used among the NTLM protocols.
KeyLength UInt32[Detailed Authentication Information] Key Length. Indicates the length of the generated session key. This will be 0 if no session key was requested.
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.
IpAddress UnicodeString[Network Information] Source Network Address. Indicates where a remote logon request originated.
IpPort UnicodeString[Network Information] Source Port. Indicates where a remote logon request originated.
ImpersonationLevel UnicodeString[Logon Information] Impersonation Level. Indicates the extent to which a process in the logon session can impersonate.
Known values
%%1831
Anonymous
%%1832
Identification
%%1833
Impersonation
%%1840
Delegation
RestrictedAdminMode UnicodeString[Logon Information] Restricted Admin Mode.
Known values
%%1842
Yes
%%1843
No
RemoteCredentialGuard UnicodeString[Logon Information] Remote Credential Guard.
Known values
%%1842
Yes
%%1843
No
TargetOutboundUserName UnicodeString[New Logon] Network Account Name. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetOutboundDomainName UnicodeString[New Logon] Network Account Domain. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
VirtualAccount UnicodeString[Logon Information] Virtual Account.
Known values
%%1842
Yes
%%1843
No
TargetLinkedLogonId HexInt64[New Logon] Linked Logon ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
ElevatedToken UnicodeString[Logon Information] Elevated Token.
Known values
%%1842
Yes
%%1843
No

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4624,
    "version": 3,
    "level": 0,
    "task": 12544,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:52.440978+00:00",
    "event_record_id": 2948,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "TargetUserSid": "S-1-5-18",
    "TargetUserName": "SYSTEM",
    "TargetDomainName": "NT AUTHORITY",
    "TargetLogonId": "0x3e7",
    "LogonType": 5,
    "LogonProcessName": "Advapi  ",
    "AuthenticationPackageName": "Negotiate",
    "WorkstationName": "-",
    "LogonGuid": "00000000-0000-0000-0000-000000000000",
    "TransmittedServices": "-",
    "LmPackageName": "-",
    "KeyLength": 0,
    "ProcessId": "0x30c",
    "ProcessName": "C:\\Windows\\System32\\services.exe",
    "IpAddress": "-",
    "IpPort": "-",
    "ImpersonationLevel": "%%1833",
    "RestrictedAdminMode": "-",
    "RemoteCredentialGuard": "-",
    "TargetOutboundUserName": "-",
    "TargetOutboundDomainName": "-",
    "VirtualAccount": "%%1843",
    "TargetLinkedLogonId": "0x0",
    "ElevatedToken": "%%1842"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

See the Logon Type Reference for a full breakdown of LogonType values and detection guidance.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 9 more (12 total)

Elastic # view in reference

  • Potential Pass-the-Hash (PtH) Attempt source medium: Adversaries may pass the hash using stolen password hashes to move laterally within an environment, bypassing normal system access controls. Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password.
  • Potential Account Takeover - Mixed Logon Types source medium: Identifies a user account (often a service account) that normally logs in with high volume using one logon type suddenly showing successful logons using a different logon type with low count. This pattern may indicate account takeover or use of stolen credentials from a new context (e.g. interactive or network logon where only batch/service was expected).
  • Process Creation via Secondary Logon source medium: Identifies process creation with alternate credentials. Adversaries may create a new process with a different token to escalate privileges and bypass access controls.
Show 1 more (4 total)
  • Potential Account Takeover - Logon from New Source IP source medium: Identifies a user account that normally logs in with high volume from one source IP suddenly logging in from a different source IP. This pattern (one IP with many successful logons, another IP with very few) may indicate account takeover or use of stolen credentials from a new location.

Splunk # view in reference

  • Unusual Number of Remote Endpoint Authentication Events source: The following analytic identifies an unusual number of remote authentication attempts from a single source by leveraging Windows Event ID 4624, which logs successful account logons. It uses statistical analysis, specifically the 3-sigma rule, to detect deviations from normal behavior. This activity is significant for a SOC as it may indicate lateral movement, malware staging, or reconnaissance. If confirmed malicious, this behavior could allow an attacker to move laterally within the network, escalate privileges, or gather information for further attacks.
  • Windows AD Replication Request Initiated by User Account source: The following analytic detects a user account initiating an Active Directory replication request, indicative of a DCSync attack. It leverages EventCode 4662 from the Windows Security Event Log, focusing on specific object types and replication permissions. This activity is significant because it can allow an attacker with sufficient privileges to request password hashes for any or all users within the domain. If confirmed malicious, this could lead to unauthorized access, privilege escalation, and potential compromise of the entire domain.↳ also matches:Event ID 4662: An operation was performed on an object.
  • Windows AD Replication Request Initiated from Unsanctioned Location source: The following analytic identifies unauthorized Active Directory replication requests initiated from non-domain controller locations. It leverages EventCode 4662 to detect when a computer account with replication permissions creates a handle to domainDNS, filtering out known domain controller IP addresses. This activity is significant as it may indicate a DCSync attack, where an attacker with privileged access can request password hashes for any or all users within the domain. If confirmed malicious, this could lead to unauthorized access to sensitive information and potential full domain compromise.↳ also matches:Event ID 4662: An operation was performed on an object.
Show 4 more (7 total)
  • Windows AD Short Lived Domain Controller SPN Attribute source: The following analytic detects the temporary addition of a global catalog SPN or a DRS RPC SPN to an Active Directory computer object, indicative of a potential DCShadow attack. This detection leverages EventCode 5136 from the `wineventlog_security` data source, focusing on specific SPN attribute changes. This activity is significant as DCShadow attacks allow attackers with privileged access to register rogue Domain Controllers, enabling unauthorized changes to the AD infrastructure. If confirmed malicious, this could lead to unauthorized replication of changes, including credentials and keys, compromising the entire domain's security.↳ also matches:Event ID 5136: A directory service object was modified.
  • Windows Kerberos Local Successful Logon source: The following analytic identifies a local successful authentication event on a Windows endpoint using the Kerberos package. It detects EventCode 4624 with LogonType 3 and source address 127.0.0.1, indicating a login to the built-in local Administrator account. This activity is significant as it may suggest a Kerberos relay attack, a method attackers use to escalate privileges. If confirmed malicious, this could allow an attacker to gain unauthorized access to sensitive systems, execute arbitrary code, or create new accounts in Active Directory, leading to potential system compromise.
  • Windows Rapid Authentication On Multiple Hosts source: The following analytic detects a source computer authenticating to 30 or more remote endpoints within a 5-minute timespan using Event ID 4624. This behavior is identified by analyzing Windows Event Logs for LogonType 3 events and counting unique target computers. Such activity is significant as it may indicate lateral movement or network share enumeration by an adversary. If confirmed malicious, this could lead to unauthorized access to multiple systems, potentially compromising sensitive data and escalating privileges within the network.
  • Windows RDP Login Session Was Established source: The following analytic detects instances where a successful Remote Desktop Protocol (RDP) login session was established, as indicated by Windows Security Event ID 4624 with Logon Type 10. This event confirms that a user has not only provided valid credentials but has also initiated a full interactive RDP session. It is a key indicator of successful remote access to a Windows system. When correlated with Event ID 1149, which logs RDP authentication success, this analytic helps distinguish between mere credential acceptance and actual session establishment—critical for effective monitoring and threat detection.

Kusto Query Language # view in reference

  • Multiple RDP connections from Single System source low: 'Identifies when an RDP connection is made to multiple systems and above the normal connection count for the previous 7 days. Connections from the same system with the same account within the same day. RDP connections are indicated by the EventID 4624 with LogonType = 10'
  • Rare RDP Connections source medium: 'Identifies when an RDP connection is new or rare related to any logon type by a given account today compared with the previous 14 days. RDP connections are indicated by the EventID 4624 with LogonType = 10'

References #

Event ID 4625 — An account failed to log on.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Logon
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An account failed to log on.

Message #

An account failed to log on.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Logon Type: %11

Account For Which Logon Failed:
	Security ID: %5
	Account Name: %6
	Account Domain: %7

Failure Information:
	Failure Reason: %9
	Status: %8
	Sub Status: %10

Process Information:
	Caller Process ID: %18
	Caller Process Name: %19

Network Information:
	Workstation Name: %14
	Source Network Address: %20
	Source Port: %21

Detailed Authentication Information:
	Logon Process: %12
	Authentication Package: %13
	Transited Services: %15
	Package Name (NTLM only): %16
	Key Length: %17

This event is generated when a logon request fails. It is generated on the computer where access was attempted.

The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).

The Process Information fields indicate which account and process on the system requested the logon.

The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The authentication information fields provide detailed information about this specific logon request.
	- Transited services indicate which intermediate services have participated in this logon request.
	- Package name indicates which sub-protocol was used among the NTLM protocols.
	- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

Fields #

NameDescription
Security_ID[Subject] Security ID. Indicates the account on the local system which requested the logon.
Account_Name[Subject] Account Name. Indicates the account on the local system which requested the logon.
Account_Domain[Subject] Account Domain. Indicates the account on the local system which requested the logon.
Logon_ID[Subject] Logon ID. Indicates the account on the local system which requested the logon.
Security_ID[Account For Which Logon Failed] Security ID.
Account_Name[Account For Which Logon Failed] Account Name.
Account_Domain[Account For Which Logon Failed] Account Domain.
Status HexInt32[Failure Information] Status. NTSTATUS reference
Failure_Reason[Failure Information] Failure Reason.
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
Sub_Status[Failure Information] Sub Status. NTSTATUS reference
Logon_Type[Subject] Logon Type. Indicates the account on the local system which requested the logon. Logon type reference
Logon_Process[Detailed Authentication Information] Logon Process. Provides detailed information about this specific logon request.
Authentication_Package[Detailed Authentication Information] Authentication Package. Provides detailed information about this specific logon request.
Workstation_Name[Network Information] Workstation Name. Indicates where a remote logon request originated.
Transited_Services[Detailed Authentication Information] Transited Services. Indicate which intermediate services have participated in this logon request.
Package_Name_NTLM_only[Detailed Authentication Information] Package Name (NTLM only). Indicates which sub-protocol was used among the NTLM protocols.
Key_Length[Detailed Authentication Information] Key Length. Indicates the length of the generated session key. This will be 0 if no session key was requested.
Caller_Process_ID[Process Information] Caller Process ID. Indicates which account and process on the system requested the logon.
Caller_Process_Name[Process Information] Caller Process Name. Indicates which account and process on the system requested the logon.
Source_Network_Address[Network Information] Source Network Address. Indicates where a remote logon request originated.
Source_Port[Network Information] Source Port. Indicates where a remote logon request originated.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4625,
    "version": 0,
    "level": 0,
    "task": 12544,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2016-09-19T16:50:06.477878Z",
    "event_record_id": 2455,
    "correlation": {
      "#attributes": {
        "ActivityID": "B864D168-0B7B-0000-89D1-64B87B0BD201"
      }
    },
    "execution": {
      "process_id": 752,
      "thread_id": 4068
    },
    "channel": "Security",
    "computer": "DESKTOP-M5SN04R",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-0-0",
    "SubjectUserName": "-",
    "SubjectDomainName": "-",
    "SubjectLogonId": "0x0",
    "TargetUserSid": "S-1-0-0",
    "TargetUserName": "JcDfcZTc",
    "TargetDomainName": ".",
    "Status": "0xc000006d",
    "FailureReason": "%%2313",
    "SubStatus": "0xc0000064",
    "LogonType": 3,
    "LogonProcessName": "NtLmSsp ",
    "AuthenticationPackageName": "NTLM",
    "WorkstationName": "6hgtmVlrrFuWtO65",
    "TransmittedServices": "-",
    "LmPackageName": "-",
    "KeyLength": 0,
    "ProcessId": "0x0",
    "ProcessName": "-",
    "IpAddress": "192.168.198.149",
    "IpPort": "50249"
  }
}

Detection Patterns #

Community Notes #

The Status field indicates the top-level failure reason; SubStatus provides additional detail. When Status is 0xC000006D (generic logon failure), check SubStatus for the specific cause.

Kerberos result codes (Status, when authentication uses Kerberos):

CodeDescription
0x6KDC_ERR_C_PRINCIPAL_UNKNOWN — invalid/non-existent user account
0x7KDC_ERR_S_PRINCIPAL_UNKNOWN — requested server not found
0xCKDC_ERR_POLICY — policy restriction prohibited logon
0x12KDC_ERR_CLIENT_REVOKED — account locked, disabled, or expired
0x17KDC_ERR_KEY_EXPIRED — expired password
0x18KDC_ERR_PREAUTH_FAILED — invalid password
0x25KRB_AP_ERR_SKEW — clock skew too great between client and server

NTSTATUS codes (Status and SubStatus):

CodeNameDescription
0xC000006DSTATUS_LOGON_FAILUREGeneric logon failure — check SubStatus for detail
0xC0000064STATUS_NO_SUCH_USERNon-existent account username
0xC000006ASTATUS_WRONG_PASSWORDIncorrect password (username correct)
0xC000006ESTATUS_ACCOUNT_RESTRICTIONAccount restriction prevented logon
0xC000006CSTATUS_PASSWORD_RESTRICTIONPassword does not meet policy requirements
0xC000006FSTATUS_INVALID_LOGON_HOURSAccount not allowed to log on at this time
0xC0000070STATUS_INVALID_WORKSTATIONAccount not allowed to log on from this computer
0xC0000071STATUS_PASSWORD_EXPIREDExpired password
0xC0000072STATUS_ACCOUNT_DISABLEDDisabled account
0xC000005ESTATUS_NO_LOGON_SERVERSNo logon servers available
0xC0000133STATUS_TIME_DIFFERENCE_AT_DCClock skew between client and DC too great
0xC000015BSTATUS_LOGON_TYPE_NOT_GRANTEDLogon type not granted to this account
0xC000018DSTATUS_TRUSTED_RELATIONSHIP_FAILURETrust relationship between domain and trusted domain failed
0xC0000192STATUS_NETLOGON_NOT_STARTEDNetlogon service not started
0xC0000193STATUS_ACCOUNT_EXPIREDExpired account
0xC0000224STATUS_PASSWORD_MUST_CHANGEPassword must change at next logon
0xC0000234STATUS_ACCOUNT_LOCKED_OUTAccount locked out
0xC0000388STATUS_DOWNGRADE_DETECTEDKerberos/NTLM downgrade detected
0xC0000413STATUS_AUTHENTICATION_FIREWALL_FAILEDBlocked by authentication policy/silo

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Failed Logon From Public IP source medium: Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.

Elastic # view in reference

  • Privileged Accounts Brute Force source medium: Identifies multiple consecutive logon failures targeting more than one Admin account from the same source address and within a short time interval. Adversaries will often brute force login attempts across multiple users with a common or known password, in an attempt to gain access to accounts.
  • Multiple Logon Failure from the same Source Address source medium: Identifies multiple consecutive logon failures from the same source address and within a short time interval. Adversaries will often brute force login attempts across multiple users with a common or known password, in an attempt to gain access to accounts.

Splunk # view in reference

  • Detect Password Spray Attempts source: This analytic employs the 3-sigma approach to detect an unusual volume of failed authentication attempts from a single source. A password spray attack is a type of brute force attack where an attacker tries a few common passwords across many different accounts to avoid detection and account lockouts. By utilizing the Authentication Data Model, this detection is effective for all CIM-mapped authentication events, providing comprehensive coverage and enhancing security against these attacks.
  • Windows Multiple Users Failed To Authenticate From Process source: The following analytic detects a source process failing to authenticate with 30 unique users, indicating a potential Password Spraying attack. It leverages Windows Event 4625 with Logon Type 2, collected from domain controllers, member servers, and workstations. This activity is significant as it may represent an adversary attempting to gain initial access or elevate privileges within an Active Directory environment. If confirmed malicious, this could lead to unauthorized access, privilege escalation, or further compromise of the network, posing a severe security risk.
  • Windows Multiple Users Remotely Failed To Authenticate From Host source: The following analytic identifies a source host failing to authenticate against a remote host with 30 unique users. It leverages Windows Event 4625 with Logon Type 3, indicating remote authentication attempts. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges in an Active Directory environment. If confirmed malicious, this activity could lead to unauthorized access, privilege escalation, and potential compromise of sensitive information. This detection is crucial for real-time security monitoring and threat hunting.
Show 2 more (5 total)
  • Windows Unusual Count Of Users Failed To Authenticate From Process source: The following analytic identifies a source process failing to authenticate multiple users, potentially indicating a Password Spraying attack. It leverages Windows Event 4625, which logs failed logon attempts, and uses statistical analysis to detect anomalies. This activity is significant as it may represent an adversary attempting to gain initial access or elevate privileges within an Active Directory environment. If confirmed malicious, the attacker could compromise multiple accounts, leading to unauthorized access, data exfiltration, or further lateral movement within the network.
  • Windows Unusual Count Of Users Remotely Failed To Auth From Host source: The following analytic identifies a source host failing to authenticate against a remote host with multiple users, potentially indicating a Password Spraying attack. It leverages Windows Event 4625 (failed logon attempts) and Logon Type 3 (remote authentication) to detect this behavior. This activity is significant as it may represent an adversary attempting to gain initial access or elevate privileges within an Active Directory environment. If confirmed malicious, this could lead to unauthorized access, privilege escalation, and further compromise of the network.

Kusto Query Language # view in reference

References #

Event ID 4626 — User / Device claims information.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → User / Device Claims
Collection Priority
Recommended (Palantir)
Opcode
Info

Description

User / Device claims information.

Message #

User / Device claims information.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Logon Type: %9

New Logon:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Event in sequence: %10 of %11

User Claims: %12

Device Claims: %13

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

This event is generated when the Audit User/Device claims subcategory is configured and the user?s logon token contains user/device claims information. The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
TargetUserSid SID[New Logon] Security ID
TargetUserName UnicodeString[New Logon] Account Name
TargetDomainName UnicodeString[New Logon] Account Domain
TargetLogonId HexInt64[New Logon] Logon ID
LogonType UInt32Logon Type Logon type reference
EventIdx UInt32Event in sequence
EventCountTotal UInt32of
UserClaims UnicodeStringUser Claims
DeviceClaims UnicodeStringDevice Claims

References #

Event ID 4627 — Group membership information.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Group Membership
Collection Priority
Recommended (ASD, others)
Opcode
Info

Description

Group membership information.

Message #

Group membership information.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Logon Type: %9

New Logon:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Event in sequence: %10 of %11

Group Membership: %12

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

This event is generated when the Audit Group Membership subcategory is configured.  The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID. Indicates the account on the local system which requested the logon.
SubjectUserName UnicodeString[Subject] Account Name. Indicates the account on the local system which requested the logon.
SubjectDomainName UnicodeString[Subject] Account Domain. Indicates the account on the local system which requested the logon.
SubjectLogonId HexInt64[Subject] Logon ID. Indicates the account on the local system which requested the logon.
TargetUserSid SID[New Logon] Security ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetUserName UnicodeString[New Logon] Account Name. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetDomainName UnicodeString[New Logon] Account Domain. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
TargetLogonId HexInt64[New Logon] Logon ID. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
LogonType UInt32[Subject] Logon Type. Indicates the account on the local system which requested the logon. Logon type reference
EventIdx UInt32[New Logon] Event in sequence. Indicates the account for whom the new logon was created, i.e. the account that was logged on.
EventCountTotal UInt32of
GroupMembership UnicodeString[New Logon] Group Membership. Indicates the account for whom the new logon was created, i.e. the account that was logged on.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4627,
    "version": 0,
    "level": 0,
    "task": 12554,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T02:00:32.200180+00:00",
    "event_record_id": 310791,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 16720
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "TargetUserSid": "S-1-5-18",
    "TargetUserName": "SYSTEM",
    "TargetDomainName": "NT AUTHORITY",
    "TargetLogonId": "0x3e7",
    "LogonType": 5,
    "EventIdx": 1,
    "EventCountTotal": 1,
    "GroupMembership": "\r\n\t\t%{S-1-5-32-544}\r\n\t\t%{S-1-1-0}\r\n\t\t%{S-1-5-11}\r\n\t\t%{S-1-16-16384}"
  },
  "message": ""
}

Community Notes #

Shows the full AD group list for every successful logon (useful to detect changes in privileges).

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Domain Admin Impersonation Indicator source: The following analytic identifies potential Kerberos ticket forging attacks, specifically the Diamond Ticket attack. This is detected when a user logs into a host and the GroupMembership field in event 4627 indicates a privileged group (e.g., Domain Admins), but the user does not actually belong to that group in the directory service. The detection leverages Windows Security Event Log 4627, which logs account logon events. The analytic cross-references the GroupMembership field from the event against a pre-populated lookup of actual group memberships. Its crucial to note that the accuracy and effectiveness of this detection heavily rely on the users diligence in populating and regularly updating this lookup table. Any discrepancies between the events GroupMembership and the lookup indicate potential ticket forging. Kerberos ticket forging, especially the Diamond Ticket attack, allows attackers to impersonate any user and potentially gain unauthorized access to resources. By forging a ticket that indicates membership in a privileged group, an attacker can bypass security controls and gain elevated privileges. Detecting such discrepancies in group memberships during logon events can be a strong indicator of this attack in progress, making it crucial for security teams to monitor and investigate. If validated as a true positive, this indicates that an attacker has successfully forged a Kerberos ticket and may have gained unauthorized access to critical resources, potentially with elevated privileges.

References #

Event ID 4634 — An account was logged off.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Logoff
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An account was logged off.

Message #

An account was logged off.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Logon Type: %5

This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.

Fields #

NameDescription
TargetUserSid SID[Subject] Security ID.
TargetUserName UnicodeString[Subject] Account Name.
TargetDomainName UnicodeString[Subject] Account Domain.
TargetLogonId HexInt64[Subject] Logon ID.
LogonType UInt32[Subject] Logon Type. Logon type reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4634,
    "version": 0,
    "level": 0,
    "task": 12545,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-10-25T22:56:14.242850+00:00",
    "event_record_id": 2692,
    "correlation": {},
    "execution": {
      "process_id": 824,
      "thread_id": 880
    },
    "channel": "Security",
    "computer": "WinDevEval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserSid": "S-1-5-111-3847866527-469524349-687026318-516638107-1125189541-4560",
    "TargetUserName": "sshd_4560",
    "TargetDomainName": "VIRTUAL USERS",
    "TargetLogonId": "0x41a49",
    "LogonType": 5
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4646 — notification

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Message #

%1

Fields #

NameDescription
notification UnicodeString

References #

Event ID 4647 — User initiated logoff.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Logoff
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

User initiated logoff.

Message #

User initiated logoff:

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

This event is generated when a logoff is initiated. No further user-initiated activity can occur. This event can be interpreted as a logoff event.

Fields #

NameDescription
TargetUserSid SID[Subject] Security ID.
TargetUserName UnicodeString[Subject] Account Name.
TargetDomainName UnicodeString[Subject] Account Domain.
TargetLogonId HexInt64[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4647,
    "version": 0,
    "level": 0,
    "task": 12545,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T22:31:33.526113+00:00",
    "event_record_id": 3363,
    "correlation": {
      "ActivityID": "59A0D65F-1037-0001-A7D6-A0593710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 8392
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "TargetUserName": "User",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetLogonId": "0x580c6"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4648 — A logon was attempted using explicit credentials.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Logon
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A logon was attempted using explicit credentials.

Message #

A logon was attempted using explicit credentials.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Logon GUID: %5

Account Whose Credentials Were Used:
	Account Name: %6
	Account Domain: %7
	Logon GUID: %8

Target Server:
	Target Server Name: %9
	Additional Information: %10

Process Information:
	Process ID: %11
	Process Name: %12

Network Information:
	Network Address: %13
	Port: %14

This event is generated when a process attempts to log on an account by explicitly specifying that account?s credentials.  This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
LogonGuid GUID[Subject] Logon GUID.
TargetUserName UnicodeString[Account Whose Credentials Were Used] Account Name.
TargetDomainName UnicodeString[Account Whose Credentials Were Used] Account Domain.
TargetLogonGuid GUID[Account Whose Credentials Were Used] Logon GUID.
TargetServerName UnicodeString[Target Server] Target Server Name.
TargetInfo UnicodeString[Target Server] Additional Information.
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.
IpAddress UnicodeString[Network Information] Network Address.
IpPort UnicodeString[Network Information] Port.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4648,
    "version": 0,
    "level": 0,
    "task": 12544,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:29.161457+00:00",
    "event_record_id": 2767,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "LogonGuid": "00000000-0000-0000-0000-000000000000",
    "TargetUserName": "DWM-1",
    "TargetDomainName": "Window Manager",
    "TargetLogonGuid": "00000000-0000-0000-0000-000000000000",
    "TargetServerName": "localhost",
    "TargetInfo": "localhost",
    "ProcessId": "0x2e0",
    "ProcessName": "C:\\Windows\\System32\\winlogon.exe",
    "IpAddress": "-",
    "IpPort": "-"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Logon with explicit credentials (RunAs, SchTasks, Pass-the-Hash, WinRM, SMB). May appear when an NTLM relayed session is used to create a service/task. Useful with 4624 (successful logon)/4634 (logoff completed) for reconstructing interactive or service logons.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Splunk # view in reference

  • Windows Multiple Users Fail To Authenticate Wth ExplicitCredentials source: The following analytic identifies a source user failing to authenticate with 30 unique users using explicit credentials on a host. It leverages Windows Event 4648, which is generated when a process attempts an account logon by explicitly specifying account credentials. This detection is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges within an Active Directory environment. If confirmed malicious, this activity could lead to unauthorized access, privilege escalation, and potential compromise of sensitive information.
  • Windows Unusual Count Of Users Fail To Auth Wth ExplicitCredentials source: The following analytic identifies a source user failing to authenticate with multiple users using explicit credentials on a host. It leverages Windows Event Code 4648 and calculates the standard deviation for each host, using the 3-sigma rule to detect anomalies. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this activity could lead to unauthorized access, privilege escalation, or further compromise of the Active Directory environment.

References #

Event ID 4649 — A replay attack was detected.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A replay attack was detected.

Message #

A replay attack was detected.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Credentials Which Were Replayed:
	Account Name: %5
	Account Domain: %6

Process Information:
	Process ID: %12
	Process Name: %13

Network Information:
	Workstation Name: %10

Detailed Authentication Information:
	Request Type: %7
	Logon Process: %8
	Authentication Package: %9
	Transited Services: %11

This event indicates that a Kerberos replay attack was detected- a request was received twice with identical information. This condition could be caused by network misconfiguration.

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Account_Name UnicodeString[Credentials Which Were Replayed] Account Name.
Account_Domain UnicodeString[Credentials Which Were Replayed] Account Domain.
Request_Type UnicodeString[Detailed Authentication Information] Request Type.
Logon_Process UnicodeString[Detailed Authentication Information] Logon Process.
Authentication_Package UnicodeString[Detailed Authentication Information] Authentication Package.
Workstation_Name UnicodeString[Network Information] Workstation Name.
Transited_Services UnicodeString[Detailed Authentication Information] Transited Services.
Process_ID Pointer[Process Information] Process ID.
Process_Name UnicodeString[Process Information] Process Name.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
TargetUserName UnicodeString[Credentials Which Were Replayed] Account Name
TargetDomainName UnicodeString[Credentials Which Were Replayed] Account Domain
RequestType UnicodeString[Detailed Authentication Information] Request Type
LogonProcessName UnicodeString[Detailed Authentication Information] Logon Process
AuthenticationPackage UnicodeString[Detailed Authentication Information] Authentication Package
WorkstationName UnicodeString[Network Information] Workstation Name
TransmittedServices UnicodeString[Detailed Authentication Information] Transited Services
ProcessId Pointer[Process Information] Process ID
ProcessName UnicodeString[Process Information] Process Name

Community Notes #

Alerts when a copied ticket is reused.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Replay Attack Detected source high: Detects possible Kerberos Replay Attack on the domain controllers when "KRB_AP_ERR_REPEAT" Kerberos response is sent to the client

References #

Event ID 4650 — An IPsec main mode security association was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec main mode security association was established. Extended mode was not enabled. Certificate authentication was not used.

Message #

An IPsec main mode security association was established. Extended mode was not enabled.  Certificate authentication was not used.

Local Endpoint:
	Principal Name: %1
	Network Address: %3
	Keying Module Port: %4

Remote Endpoint:
	Principal Name: %2
	Network Address: %5
	Keying Module Port: %6

Security Association Information:
	Lifetime (minutes): %12
	Quick Mode Limit: %13
	Main Mode SA ID: %17

Cryptographic Information:
	Cipher Algorithm: %9
	Integrity Algorithm: %10
	Diffie-Hellman Group: %11

Additional Information:
	Keying Module Name: %7
	Authentication Method: %8
	Role: %14
	Impersonation State: %15
	Main Mode Filter ID: %16

Fields #

NameDescription
Principal_Name UnicodeString[Local Endpoint] Principal Name.
Principal_Name UnicodeString[Remote Endpoint] Principal Name.
Network_Address UnicodeString[Local Endpoint] Network Address.
Keying_Module_Port UInt32[Local Endpoint] Keying Module Port.
Network_Address UnicodeString[Remote Endpoint] Network Address.
Keying_Module_Port UInt32[Remote Endpoint] Keying Module Port.
Keying_Module_Name UnicodeString[Additional Information] Keying Module Name.
Authentication_Method UnicodeString[Additional Information] Authentication Method.
Cipher_Algorithm UnicodeString[Cryptographic Information] Cipher Algorithm.
Integrity_Algorithm UnicodeString[Cryptographic Information] Integrity Algorithm.
DiffieHellman_Group UnicodeString[Cryptographic Information] Diffie-Hellman Group.
Lifetime_minutes UInt32[Security Association Information] Lifetime (minutes).
Quick_Mode_Limit UInt32[Security Association Information] Quick Mode Limit.
Role UnicodeString[Additional Information] Role.
Impersonation_State UnicodeString[Additional Information] Impersonation State.
Main_Mode_Filter_ID UInt64[Additional Information] Main Mode Filter ID.
Main_Mode_SA_ID UInt64[Security Association Information] Main Mode SA ID.
LocalMMPrincipalName UnicodeString[Local Endpoint] Principal Name
RemoteMMPrincipalName UnicodeString[Remote Endpoint] Principal Name
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalKeyModPort UInt32[Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
KeyModName UnicodeString[Additional Information] Keying Module Name
MMAuthMethod UnicodeString[Additional Information] Authentication Method
MMCipherAlg UnicodeString[Cryptographic Information] Cipher Algorithm
MMIntegrityAlg UnicodeString[Cryptographic Information] Integrity Algorithm
DHGroup UnicodeString[Cryptographic Information] Diffie-Hellman Group
MMLifetime UInt32[Security Association Information] Lifetime (minutes)
QMLimit UInt32[Security Association Information] Quick Mode Limit
MMImpersonationState UnicodeString[Additional Information] Impersonation State
MMFilterID UInt64[Additional Information] Main Mode Filter ID
MMSAID UInt64[Security Association Information] Main Mode SA ID

References #

Event ID 4651 — An IPsec main mode security association was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec main mode security association was established. Extended mode was not enabled. A certificate was used for authentication.

Message #

An IPsec main mode security association was established. Extended mode was not enabled.  A certificate was used for authentication.

Local Endpoint:
	Principal Name: %1
	Network Address: %9
	Keying Module Port: %10

Local Certificate:
	SHA Thumbprint: %2
	Issuing CA: %3
	Root CA: %4

Remote Endpoint:
	Principal Name: %5
	Network Address: %11
	Keying Module Port: %12

Remote Certificate:
	SHA thumbprint: %6
	Issuing CA: %7
	Root CA: %8

Cryptographic Information:
	Cipher Algorithm: %15
	Integrity Algorithm: %16
	Diffie-Hellman Group: %17

Security Association Information:
	Lifetime (minutes): %18
	Quick Mode Limit: %19
	Main Mode SA ID: %23

Additional Information:
	Keying Module Name: %13
	Authentication Method: %14
	Role: %20
	Impersonation State: %21
	Main Mode Filter ID: %22

Fields #

NameDescription
Principal_Name UnicodeString[Local Endpoint] Principal Name.
SHA_Thumbprint UnicodeString[Local Certificate] SHA Thumbprint.
Issuing_CA UnicodeString[Local Certificate] Issuing CA.
Root_CA UnicodeString[Local Certificate] Root CA.
Principal_Name UnicodeString[Remote Endpoint] Principal Name.
SHA_thumbprint UnicodeString[Remote Certificate] SHA thumbprint.
Issuing_CA UnicodeString[Remote Certificate] Issuing CA.
Root_CA UnicodeString[Remote Certificate] Root CA.
Network_Address UnicodeString[Local Endpoint] Network Address.
Keying_Module_Port UInt32[Local Endpoint] Keying Module Port.
Network_Address UnicodeString[Remote Endpoint] Network Address.
Keying_Module_Port UInt32[Remote Endpoint] Keying Module Port.
Keying_Module_Name UnicodeString[Additional Information] Keying Module Name.
Authentication_Method UnicodeString[Additional Information] Authentication Method.
Cipher_Algorithm UnicodeString[Cryptographic Information] Cipher Algorithm.
Integrity_Algorithm UnicodeString[Cryptographic Information] Integrity Algorithm.
DiffieHellman_Group UnicodeString[Cryptographic Information] Diffie-Hellman Group.
Lifetime_minutes UInt32[Security Association Information] Lifetime (minutes).
Quick_Mode_Limit UInt32[Security Association Information] Quick Mode Limit.
Role UnicodeString[Additional Information] Role.
Impersonation_State UnicodeString[Additional Information] Impersonation State.
Main_Mode_Filter_ID UInt64[Additional Information] Main Mode Filter ID.
Main_Mode_SA_ID UInt64[Security Association Information] Main Mode SA ID.
LocalMMPrincipalName UnicodeString[Local Endpoint] Principal Name
LocalMMCertHash UnicodeString[Local Certificate] SHA Thumbprint
LocalMMIssuingCA UnicodeString[Local Certificate] Issuing CA
LocalMMRootCA UnicodeString[Local Certificate] Root CA
RemoteMMPrincipalName UnicodeString[Remote Endpoint] Principal Name
RemoteMMCertHash UnicodeString[Remote Certificate] SHA thumbprint
RemoteMMIssuingCA UnicodeString[Remote Certificate] Issuing CA
RemoteMMRootCA UnicodeString[Remote Certificate] Root CA
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalKeyModPort UInt32[Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
KeyModName UnicodeString[Additional Information] Keying Module Name
MMAuthMethod UnicodeString[Additional Information] Authentication Method
MMCipherAlg UnicodeString[Cryptographic Information] Cipher Algorithm
MMIntegrityAlg UnicodeString[Cryptographic Information] Integrity Algorithm
DHGroup UnicodeString[Cryptographic Information] Diffie-Hellman Group
MMLifetime UInt32[Security Association Information] Lifetime (minutes)
QMLimit UInt32[Security Association Information] Quick Mode Limit
MMImpersonationState UnicodeString[Additional Information] Impersonation State
MMFilterID UInt64[Additional Information] Main Mode Filter ID
MMSAID UInt64[Security Association Information] Main Mode SA ID

References #

Event ID 4652 — An IPsec main mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec main mode negotiation failed.

Message #

An IPsec main mode negotiation failed.


Local Endpoint:
	Principal Name: %1
	Network Address: %9
	Keying Module Port: %10

Local Certificate:
	SHA Thumbprint: %2
	Issuing CA: %3
	Root CA: %4

Remote Endpoint:
	Principal Name: %5
	Network Address: %11
	Keying Module Port: %12

Remote Certificate:
	SHA thumbprint: %6
	Issuing CA: %7
	Root CA: %8

Additional Information:
	Keying Module Name: %13
	Authentication Method: %16
	Role: %18
	Impersonation State: %19
	Main Mode Filter ID: %20

Failure Information:
	Failure Point: %14
	Failure Reason: %15
	State: %17
	Initiator Cookie: %21
	Responder Cookie: %22

Fields #

NameDescription
Principal_Name UnicodeString[Local Endpoint] Principal Name.
SHA_Thumbprint UnicodeString[Local Certificate] SHA Thumbprint.
Issuing_CA UnicodeString[Local Certificate] Issuing CA.
Root_CA UnicodeString[Local Certificate] Root CA.
Principal_Name UnicodeString[Remote Endpoint] Principal Name.
SHA_thumbprint UnicodeString[Remote Certificate] SHA thumbprint.
Issuing_CA UnicodeString[Remote Certificate] Issuing CA.
Root_CA UnicodeString[Remote Certificate] Root CA.
Network_Address UnicodeString[Local Endpoint] Network Address.
Keying_Module_Port UInt32[Local Endpoint] Keying Module Port.
Network_Address UnicodeString[Remote Endpoint] Network Address.
Keying_Module_Port UInt32[Remote Endpoint] Keying Module Port.
Keying_Module_Name UnicodeString[Additional Information] Keying Module Name.
Failure_Point UnicodeString[Failure Information] Failure Point.
Failure_Reason UnicodeString[Failure Information] Failure Reason.
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
Authentication_Method UnicodeString[Additional Information] Authentication Method.
State UnicodeString[Failure Information] State.
Role UnicodeString[Additional Information] Role.
Impersonation_State UnicodeString[Additional Information] Impersonation State.
Main_Mode_Filter_ID UInt64[Additional Information] Main Mode Filter ID.
LocalMMPrincipalName UnicodeString[Local Endpoint] Principal Name
LocalMMCertHash UnicodeString[Local Certificate] SHA Thumbprint
LocalMMIssuingCA UnicodeString[Local Certificate] Issuing CA
LocalMMRootCA UnicodeString[Local Certificate] Root CA
RemoteMMPrincipalName UnicodeString[Remote Endpoint] Principal Name
RemoteMMCertHash UnicodeString[Remote Certificate] SHA thumbprint
RemoteMMIssuingCA UnicodeString[Remote Certificate] Issuing CA
RemoteMMRootCA UnicodeString[Remote Certificate] Root CA
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalKeyModPort UInt32[Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
KeyModName UnicodeString[Additional Information] Keying Module Name
FailurePoint UnicodeString[Failure Information] Failure Point
FailureReason UnicodeString[Failure Information] Failure Reason
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
MMAuthMethod UnicodeString[Additional Information] Authentication Method
MMImpersonationState UnicodeString[Additional Information] Impersonation State
MMFilterID UInt64[Additional Information] Main Mode Filter ID
InitiatorCookie UnicodeString[Failure Information] Initiator Cookie
ResponderCookie UnicodeString[Failure Information] Responder Cookie

References #

Event ID 4653 — An IPsec main mode negotiation failed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec main mode negotiation failed.

Message #

An IPsec main mode negotiation failed.

Local Endpoint:
	Local Principal Name: %1
	Network Address: %3
	Keying Module Port: %4

Remote Endpoint:
	Principal Name: %2
	Network Address: %5
	Keying Module Port: %6

Additional Information:
	Keying Module Name: %7
	Authentication Method: %10
	Role: %12
	Impersonation State: %13
	Main Mode Filter ID: %14

Failure Information:
	Failure Point: %8
	Failure Reason: %9
	State: %11
	Initiator Cookie: %15
	Responder Cookie: %16

Fields #

NameDescription
LocalMMPrincipalName UnicodeString[Local Endpoint] Local Principal Name
RemoteMMPrincipalName UnicodeString[Remote Endpoint] Principal Name
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalKeyModPort UInt32[Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
KeyModName UnicodeString[Additional Information] Keying Module Name
FailurePoint UnicodeString[Failure Information] Failure Point
FailureReason UnicodeString[Failure Information] Failure Reason
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
MMAuthMethod UnicodeString[Additional Information] Authentication Method
State UnicodeString[Failure Information] State.
Role UnicodeString[Additional Information] Role.
MMImpersonationState UnicodeString[Additional Information] Impersonation State
MMFilterID UInt64[Additional Information] Main Mode Filter ID
InitiatorCookie UnicodeString[Failure Information] Initiator Cookie
ResponderCookie UnicodeString[Failure Information] Responder Cookie
Local_Principal_Name UnicodeString[Local Endpoint] Local Principal Name.
Principal_Name UnicodeString[Remote Endpoint] Principal Name.
Network_Address UnicodeString[Local Endpoint] Network Address.
Keying_Module_Port UInt32[Local Endpoint] Keying Module Port.
Keying_Module_Name UnicodeString[Additional Information] Keying Module Name.
Failure_Point UnicodeString[Failure Information] Failure Point.
Failure_Reason UnicodeString[Failure Information] Failure Reason.
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
Authentication_Method UnicodeString[Additional Information] Authentication Method.
Impersonation_State UnicodeString[Additional Information] Impersonation State.
Main_Mode_Filter_ID UInt64[Additional Information] Main Mode Filter ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4653,
    "version": 0,
    "level": 0,
    "task": 12547,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2026-03-13T23:09:45.572614+00:00",
    "event_record_id": 16633999,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 13940
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "LocalMMPrincipalName": "-",
    "RemoteMMPrincipalName": "-",
    "LocalAddress": "10.2.10.11",
    "LocalKeyModPort": 500,
    "RemoteAddress": "10.2.20.41",
    "RemoteKeyModPort": 500,
    "KeyModName": "%%8223",
    "FailurePoint": "%%8199",
    "FailureReason": "New policy invalidated SAs formed with old policy\r\n",
    "MMAuthMethod": "%%8194",
    "State": "%%8202",
    "Role": "%%8205",
    "MMImpersonationState": "%%8217",
    "MMFilterID": 72917,
    "InitiatorCookie": "abd97649c27753ac",
    "ResponderCookie": "0000000000000000"
  },
  "message": ""
}

References #

Event ID 4654 — An IPsec quick mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec quick mode negotiation failed.

Message #

An IPsec quick mode negotiation failed.

Local Endpoint:
	Network Address: %1
	Network Address mask: %2
	Port: %3
	Tunnel Endpoint: %4

Remote Endpoint:
	Network Address: %5
	Address Mask: %6
	Port: %7
	Tunnel Endpoint: %8
	Private Address: %10

Additional Information:
	Protocol: %9
	Keying Module Name: %11
	Mode: %14
	Role: %16
	Quick Mode Filter ID: %18
	Main Mode SA ID: %19

Failure Information:
	State: %15
	Message ID: %17
	Failure Point: %12
	Failure Reason: %13

Fields #

NameDescription
Network_Address[Local Endpoint] Network Address.
Network_Address_mask[Local Endpoint] Network Address mask.
Port[Local Endpoint] Port.
Tunnel_Endpoint[Local Endpoint] Tunnel Endpoint.
Network_Address[Remote Endpoint] Network Address.
Address_Mask[Remote Endpoint] Address Mask.
Port[Remote Endpoint] Port.
Tunnel_Endpoint[Remote Endpoint] Tunnel Endpoint.
Protocol UInt32[Additional Information] Protocol.
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
Private_Address[Remote Endpoint] Private Address.
Keying_Module_Name[Additional Information] Keying Module Name.
Failure_Point[Failure Information] Failure Point.
Failure_Reason[Failure Information] Failure Reason.
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
Mode UnicodeString[Additional Information] Mode.
State UnicodeString[Failure Information] State.
Role UnicodeString[Additional Information] Role.
Message_ID[Failure Information] Message ID.
Quick_Mode_Filter_ID[Additional Information] Quick Mode Filter ID.
Main_Mode_SA_ID[Additional Information] Main Mode SA ID.
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalAddressMask UnicodeString[Local Endpoint] Network Address mask
LocalPort UInt32[Local Endpoint] Port
LocalTunnelEndpoint UnicodeString[Local Endpoint] Tunnel Endpoint
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteAddressMask UnicodeString[Remote Endpoint] Address Mask
RemotePort UInt32[Remote Endpoint] Port
RemoteTunnelEndpoint UnicodeString[Remote Endpoint] Tunnel Endpoint
RemotePrivateAddress UnicodeString[Remote Endpoint] Private Address
KeyModName UnicodeString[Additional Information] Keying Module Name
FailurePoint UnicodeString[Failure Information] Failure Point
FailureReason UnicodeString[Failure Information] Failure Reason
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
MessageID UInt32[Failure Information] Message ID
QMFilterID UInt64[Additional Information] Quick Mode Filter ID
MMSAID UInt64[Additional Information] Main Mode SA ID
TunnelId UInt64[Additional Information] Virtual Interface Tunnel ID
TrafficSelectorId UInt64[Additional Information] Traffic Selector ID

References #

Event ID 4655 — An IPsec main mode security association ended.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec main mode security association ended.

Message #

An IPsec main mode security association ended.

Local Network Address: %1
Remote Network Address: %2
Keying Module Name: %3
Main Mode SA ID: %4

Fields #

NameDescription
Local_Network_Address UnicodeString
Remote_Network_Address UnicodeString
Keying_Module_Name UnicodeString
Main_Mode_SA_ID UInt64
LocalAddress UnicodeStringLocal Network Address
RemoteAddress UnicodeStringRemote Network Address
KeyModName UnicodeStringKeying Module Name
MMSAID UInt64Main Mode SA ID

References #

Event ID 4656 — A handle to an object was requested.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File System
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A handle to an object was requested.

Message #

A handle to an object was requested.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %14
	Process Name: %15

Access Request Information:
	Transaction ID: %9
	Accesses: %10
	Access Mask: %11
	Privileges Used for Access Check: %12
	Restricted SID Count: %13

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Handle_ID[Object] Handle ID.
Transaction_ID[Access Request Information] Transaction ID.
Accesses[Access Request Information] Accesses.
Access_Mask[Access Request Information] Access Reasons. Access mask reference
PrivilegesUsedForAccessCheckPrivilege constants reference
Restricted_SID_Count[Access Request Information] Privileges Used for Access Check.
Process_ID[Access Request Information] Restricted SID Count.
Process_Name[Process Information] Process ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4656,
    "version": 1,
    "level": 0,
    "task": 12802,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-03-08T22:11:34.340479Z",
    "event_record_id": 314461,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 160
    },
    "channel": "Security",
    "computer": "MSEDGEWIN10",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-3461203602-4096304019-2269080069-1000",
    "SubjectUserName": "IEUser",
    "SubjectDomainName": "MSEDGEWIN10",
    "SubjectLogonId": "0x33392",
    "ObjectServer": "Security",
    "ObjectType": "Process",
    "ObjectName": "\\Device\\HarddiskVolume1\\Windows\\System32\\lsass.exe",
    "HandleId": "0x558",
    "TransactionId": "00000000-0000-0000-0000-000000000000",
    "AccessList": "%%1537\r\n\t\t\t\t%%1538\r\n\t\t\t\t%%1539\r\n\t\t\t\t%%1540\r\n\t\t\t\t%%1541\r\n\t\t\t\t%%4480\r\n\t\t\t\t%%4481\r\n\t\t\t\t%%4482\r\n\t\t\t\t%%4483\r\n\t\t\t\t%%4484\r\n\t\t\t\t%%4485\r\n\t\t\t\t%%4486\r\n\t\t\t\t%%4487\r\n\t\t\t\t%%4488\r\n\t\t\t\t%%4489\r\n\t\t\t\t%%4490\r\n\t\t\t\t%%4491\r\n\t\t\t\t%%4492\r\n\t\t\t\t%%4493\r\n\t\t\t\t",
    "AccessReason": "-",
    "AccessMask": "0x1f3fff",
    "PrivilegeList": "-",
    "RestrictedSidCount": 0,
    "ProcessId": "0x1688",
    "ProcessName": "C:\\Windows\\System32\\cscript.exe",
    "ResourceAttributes": "-"
  }
}

Detection Patterns #

Registry Keys Access

10 rules

Sigma

@BarryShooshooga, Nasreddine Bencherchali (Nextron Systems)
Roberto Rodriguez @Cyb3rWard0g
Show 4 more (7 total)
Roberto Rodriguez, Teymur Kheirkhabarov, Dimitrios Slamaris, Mark Russinovich, Aleksey Potapov, oscd.community (update)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
Roberto Rodriguez @Cyb3rWard0g

Community Notes #

Combined with 4663, may reveal bulk reads of sensitive shares before data exfil.

The AccessMask shown assumes File access rights (the most common context). The actual meaning of bits 0x01–0x80 depends on the ObjectType GUID at runtime. Common alternatives:

BitFileRegistryProcessService
0x01ReadData / ListDirectoryKEY_QUERY_VALUEPROCESS_TERMINATESERVICE_QUERY_CONFIG
0x02WriteData / AddFileKEY_SET_VALUEPROCESS_CREATE_THREADSERVICE_CHANGE_CONFIG
0x04AppendData / AddSubDirKEY_CREATE_SUB_KEYPROCESS_SET_SESSIONIDSERVICE_QUERY_STATUS
0x08ReadEAKEY_ENUMERATE_SUB_KEYSPROCESS_VM_OPERATIONSERVICE_ENUMERATE_DEPENDENTS
0x10WriteEAKEY_NOTIFYPROCESS_VM_READSERVICE_START
0x20Execute / TraverseKEY_CREATE_LINKPROCESS_VM_WRITESERVICE_STOP

Standard rights are shared across all types: DELETE (0x10000), READ_CONTROL (0x20000), WRITE_DAC (0x40000), WRITE_OWNER (0x80000).

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Elastic # view in reference

  • LSASS Memory Dump Handle Access source medium: Identifies handle requests for the Local Security Authority Subsystem Service (LSASS) object access with specific access masks that many tools with a capability to dump memory to disk use (0x1fffff, 0x1010, 0x120089). This rule is tool agnostic as it has been validated against a host of various LSASS dump tools such as SharpDump, Procdump, Mimikatz, Comsvcs etc. It detects this behavior at a low level and does not depend on a specific tool or dump file name.

References #

Event ID 4657 — A registry value was modified.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Registry
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

A registry value was modified.

Message #

A registry value was modified.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Name: %5
	Object Value Name: %6
	Handle ID: %7
	Operation Type: %8

Process Information:
	Process ID: %13
	Process Name: %14

Change Information:
	Old Value Type: %9
	Old Value: %10
	New Value Type: %11
	New Value: %12

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectName UnicodeString[Object] Object Name.
ObjectValueName UnicodeString[Object] Object Value Name.
HandleId Pointer[Object] Handle ID.
OperationType UnicodeString[Object] Operation Type.
Known values
%%1904
New registry value created
%%1905
Existing registry value modified
%%1906
Registry value deleted
%%14674
Value Added
%%14675
Value Deleted
%%14680
Value Added With Expiration Time
%%14681
Value Deleted With Expiration Time
%%14688
Value Auto Deleted With Expiration Time
OldValueType UnicodeString[Change Information] Old Value Type.
Known values
%%1872
REG_NONE
%%1873
REG_SZ
%%1874
REG_EXPAND_SZ
%%1875
REG_BINARY
%%1876
REG_DWORD
%%1877
REG_DWORD_BIG_ENDIAN
%%1878
REG_LINK
%%1879
REG_MULTI_SZ (New lines are replaced with *. A * is replaced with **)
%%1880
REG_RESOURCE_LIST
%%1881
REG_FULL_RESOURCE_DESCRIPTOR
%%1882
REG_RESOURCE_REQUIREMENTS_LIST
%%1883
REG_QWORD
OldValue UnicodeString[Change Information] Old Value.
NewValueType UnicodeString[Change Information] New Value Type.
Known values
%%1872
REG_NONE
%%1873
REG_SZ
%%1874
REG_EXPAND_SZ
%%1875
REG_BINARY
%%1876
REG_DWORD
%%1877
REG_DWORD_BIG_ENDIAN
%%1878
REG_LINK
%%1879
REG_MULTI_SZ (New lines are replaced with *. A * is replaced with **)
%%1880
REG_RESOURCE_LIST
%%1881
REG_FULL_RESOURCE_DESCRIPTOR
%%1882
REG_RESOURCE_REQUIREMENTS_LIST
%%1883
REG_QWORD
NewValue UnicodeString[Change Information] New Value.
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4657,
    "version": 0,
    "level": 0,
    "task": 12801,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:45:45.086232+00:00",
    "event_record_id": 292511,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 12116
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ObjectName": "\\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\SystemCertificates\\ROOT\\Certificates\\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E",
    "ObjectValueName": "Blob",
    "HandleId": "0x1994",
    "OperationType": "%%1905",
    "OldValueType": "%%1875",
    "OldValue": "%%1800",
    "NewValueType": "%%1875",
    "NewValue": "%%1800",
    "ProcessId": "0x328",
    "ProcessName": "C:\\Windows\\System32\\lsass.exe"
  },
  "message": ""
}

Detection Patterns #

Defense Evasion: Modify Registry

1 rule

Sigma

Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)

Community Notes #

Requires AuditRegistry/SetValue SACL.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Kusto Query Language # view in reference

  • Scheduled Task Hide source high: 'This query detects attempts by malware to hide the scheduled task by deleting the SD (Security Descriptor) value. Removal of SD value results in the scheduled task disappearing from schtasks /query and Task Scheduler. The query requires auditing to be turned on for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree registry hive as well as audit policy for registry auditing to be turned on. Reference: https://www.microsoft.com/security/blog/2022/04/12/tarrask-malware-uses-scheduled-tasks-for-defense-evasion/ Reference: https://4sysops.com/archives/audit-changes-in-the-windows-registry/'

References #

Event ID 4658 — The handle to an object was closed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File System
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The handle to an object was closed.

Message #

The handle to an object was closed.

Subject :
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Handle ID: %6

Process Information:
	Process ID: %7
	Process Name: %8

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Handle_ID[Object] Handle ID.
Process_ID[Process Information] Process ID.
Process_Name[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4658,
    "version": 0,
    "level": 0,
    "task": 12804,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2017-06-12T23:39:43.512986Z",
    "event_record_id": 8076,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 252
    },
    "channel": "Security",
    "computer": "2012r2srv.maincorp.local",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-2634088540-571122920-1382659128-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "MAINCORP",
    "SubjectLogonId": "0x432c8",
    "ObjectServer": "Security Account Manager",
    "HandleId": "0xc9774b43b0",
    "ProcessId": "0x1f0",
    "ProcessName": "C:\\Windows\\System32\\lsass.exe"
  }
}

Detection Patterns #

References #

Event ID 4659 — A handle to an object was requested with intent to delete.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A handle to an object was requested with intent to delete.

Message #

A handle to an object was requested with intent to delete.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %13

Access Request Information:
	Transaction ID: %9
	Accesses: %10
	Access Mask: %11
	Privileges Used for Access Check: %12

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectServer UnicodeString[Object] Object Server
ObjectType UnicodeString[Object] Object Type
ObjectName UnicodeString[Object] Object Name
HandleId Pointer[Object] Handle ID
TransactionId GUID[Access Request Information] Transaction ID
AccessList UnicodeString[Access Request Information] Accesses
AccessMask HexInt32[Access Request Information] Access Mask Access mask reference
PrivilegeList UnicodeString[Access Request Information] Privileges Used for Access Check Privilege constants reference
ProcessId Pointer[Process Information] Process ID

References #

Event ID 4660 — An object was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File System
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An object was deleted.

Message #

An object was deleted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Handle ID: %6

Process Information:
	Process ID: %7
	Process Name: %8
	Transaction ID: %9

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Handle_ID[Object] Handle ID.
Process_ID[Process Information] Process ID.
Process_Name[Process Information] Process Name.
Transaction_ID[Process Information] Transaction ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4660,
    "version": 0,
    "level": 0,
    "task": 12804,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-01-24T17:03:25.009874Z",
    "event_record_id": 1934527,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 4488
    },
    "channel": "Security",
    "computer": "fs03vuln.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x14f509e2",
    "ObjectServer": "Security Account Manager",
    "HandleId": "0xe9a9292e70",
    "ProcessId": "0x1e0",
    "ProcessName": "C:\\Windows\\System32\\lsass.exe",
    "TransactionId": "00000000-0000-0000-0000-000000000000"
  }
}

Detection Patterns #

Community Notes #

Could be a filesystem, kernel, or registry object. Does not track names, but is generated only during real deletes (pair with 4663).

References #

Event ID 4661 — A handle to an object was requested.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → SAM
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A handle to an object was requested.

Message #

A handle to an object was requested.

Subject :
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %15
	Process Name: %16

Access Request Information:
	Transaction ID: %9
	Accesses: %10
	Access Mask: %11
	Privileges Used for Access Check: %12
	Properties: %13
	Restricted SID Count: %14

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Handle_ID[Object] Handle ID.
Transaction_ID[Access Request Information] Transaction ID.
Accesses[Access Request Information] Accesses.
Access_Mask[Access Request Information] Access Reasons.
Bitmask flags
0x00000001
ReadPasswordParameters
0x00000002
WritePasswordParameters
0x00000004
ReadOtherParameters
0x00000008
WriteOtherParameters
0x00000010
CreateUser
0x00000020
CreateGlobalGroup
0x00000040
CreateLocalGroup
0x00000080
GetLocalGroupMembership
0x00000100
ListAccounts
0x00000200
LookupIDs
0x00000400
AdministerServer
0x00010000
DELETE
0x00020000
READ_CONTROL
0x00040000
WRITE_DAC
0x00080000
WRITE_OWNER
PrivilegesUsedForAccessCheckPrivilege constants reference
Properties UnicodeString[Access Request Information] Privileges Used for Access Check.
Restricted_SID_Count[Access Request Information] Properties.
Process_ID[Access Request Information] Restricted SID Count.
Process_Name[Process Information] Process ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4661,
    "version": 0,
    "level": 0,
    "task": 12803,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-18T23:23:52.522462Z",
    "event_record_id": 565602,
    "correlation": {},
    "execution": {
      "process_id": 452,
      "thread_id": 460
    },
    "channel": "Security",
    "computer": "WIN-77LTAPHIQ1R.example.corp",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1587066498-1489273250-1035260531-1106",
    "SubjectUserName": "user01",
    "SubjectDomainName": "EXAMPLE",
    "SubjectLogonId": "0x15e1a7",
    "ObjectServer": "Security Account Manager",
    "ObjectType": "SAM_DOMAIN",
    "ObjectName": "DC=example,DC=corp",
    "HandleId": "0x14c7b1f20",
    "TransactionId": "00000000-0000-0000-0000-000000000000",
    "AccessList": "%%1538\r\n\t\t\t\t%%5394\r\n\t\t\t\t%%5396\r\n\t\t\t\t%%5399\r\n\t\t\t\t",
    "AccessMask": "0x2d",
    "PrivilegeList": "”\u0002-",
    "Properties": "---\r\n\t{19195a5a-6da0-11d0-afd3-00c04fd930c9}\r\n%%1538\r\n%%5394\r\n%%5396\r\n%%5399\r\n\t\t{c7407360-20bf-11d0-a768-00aa006e0529}\r\n\t\t\t{bf9679a4-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679a5-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679a6-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679bb-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679c2-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679c3-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a09-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a0b-0de6-11d0-a285-00aa003049e2}\r\n\t\t{b8119fd0-04f6-4762-ab7a-4986c76b3f9a}\r\n\t\t\t{bf967a34-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a33-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679c5-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967a61-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf967977-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf96795e-0de6-11d0-a285-00aa003049e2}\r\n\t\t\t{bf9679ea-0de6-11d0-a285-00aa003049e2}\r\n\t\t{ab721a52-1e2f-11d0-9819-00aa0040529b}\r\n",
    "RestrictedSidCount": 0,
    "ProcessId": "0x1c4",
    "ProcessName": "C:\\Windows\\System32\\lsass.exe"
  }
}

Community Notes #

May indicate BloodHound-style LDAP reads.

This event covers SAM object handle requests. The default bitmask shown uses SAM_DOMAIN rights (the most commonly audited SAM object type). Bits 0x01–0x0400 vary by SAM object subtype:

BitSAM_SERVERSAM_DOMAINSAM_GROUPSAM_ALIASSAM_USER
0x01ConnectToServerReadPasswordParametersReadInformationAddMemberReadGeneralInformation
0x02ShutdownServerWritePasswordParametersWriteAccountRemoveMemberReadPreferences
0x04InitializeServerReadOtherParametersAddMemberListMembersWritePreferences
0x08CreateDomainWriteOtherParametersRemoveMemberReadInformationReadLogon
0x10EnumerateDomainsCreateUserListMembersWriteAccountReadAccount
0x20LookupDomainCreateGlobalGroupWriteAccount

Standard rights are shared: DELETE (0x10000), READ_CONTROL (0x20000), WRITE_DAC (0x40000), WRITE_OWNER (0x80000).

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 4662 — An operation was performed on an object.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Access
Collection Priority
Recommended (mdecrevoisier, others)
Opcode
Info

Description

An operation was performed on an object.

Message #

An operation was performed on an object.

Subject :
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %9

Operation:
	Operation Type: %8
	Accesses: %10
	Access Mask: %11
	Properties: %12

Additional Information:
	Parameter 1: %13
	Parameter 2: %14

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Object_Server[Object] Object Server.
Object_Type[Object] Object Type.
Object_Name[Object] Object Name.
Operation_Type[Operation] Operation Type.
Known values
%%1904
New registry value created
%%1905
Existing registry value modified
%%1906
Registry value deleted
%%14674
Value Added
%%14675
Value Deleted
%%14680
Value Added With Expiration Time
%%14681
Value Deleted With Expiration Time
%%14688
Value Auto Deleted With Expiration Time
Handle_ID[Object] Handle ID.
Accesses[Operation] Accesses.
Access_Mask[Operation] Access Mask.
Bitmask flags
0x00000001
DS_CREATE_CHILD
0x00000002
DS_DELETE_CHILD
0x00000004
DS_LIST_CONTENTS
0x00000008
DS_WRITE_SELF
0x00000010
DS_READ_PROP
0x00000020
DS_WRITE_PROP
0x00000040
DS_DELETE_TREE
0x00000080
DS_LIST_OBJECT
0x00000100
DS_CONTROL_ACCESS
0x00010000
DELETE
0x00020000
READ_CONTROL
0x00040000
WRITE_DAC
0x00080000
WRITE_OWNER
Properties UnicodeString[Operation] Properties.
Parameter_1[Additional Information] Parameter 1.
Parameter_2[Additional Information] Parameter 2.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4662,
    "version": 0,
    "level": 0,
    "task": 14080,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-25T10:05:30.695604Z",
    "event_record_id": 198238041,
    "correlation": {},
    "execution": {
      "process_id": 444,
      "thread_id": 4200
    },
    "channel": "Security",
    "computer": "DC1.insecurebank.local",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "DC1$",
    "SubjectDomainName": "insecurebank",
    "SubjectLogonId": "0xb3ac2",
    "ObjectServer": "DS",
    "ObjectType": "%{19195a5b-6da0-11d0-afd3-00c04fd930c9}",
    "ObjectName": "%{c6faf700-bfe4-452a-a766-424f84c29583}",
    "OperationType": "Object Access",
    "HandleId": "0x0",
    "AccessList": "%%7688\r\n\t\t\t\t",
    "AccessMask": "0x100",
    "Properties": "%%7688\r\n\t\t{1131f6aa-9c07-11d1-f79f-00c04fc2dcd2}\r\n\t{19195a5b-6da0-11d0-afd3-00c04fd930c9}\r\n",
    "AdditionalInfo": "-",
    "AdditionalInfo2": ""
  }
}

Detection Patterns #

Community Notes #

Operation on AD object, may indicate enum of domain trusts, OUs, SPNs, ACLs. Also logged when an attacker uses mimikatz or similar to extract the DPAPI Domain Backup Key.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 3 more (6 total)

Elastic # view in reference

  • FirstTime Seen Account Performing DCSync source high: This rule identifies when a User Account starts the Active Directory Replication Process for the first time. Attackers can use the DCSync technique to get credential information of individual accounts or the entire domain, thus compromising the entire domain.
  • Potential Credential Access via DCSync source medium: This rule identifies when a User Account starts the Active Directory Replication Process. Attackers can use the DCSync technique to get credential information of individual accounts or the entire domain, thus compromising the entire domain.
  • Access to a Sensitive LDAP Attribute source medium: Identify access to sensitive Active Directory object attributes that contains credentials and decryption keys such as unixUserPassword, ms-PKI-AccountCredentials and msPKI-CredentialRoamingTokens.
Show 1 more (4 total)
  • Suspicious Access to LDAP Attributes source low: Identify read access to a high number of Active Directory object attributes. The knowledge of objects properties can help adversaries find vulnerabilities, elevate privileges or collect sensitive information.

Splunk # view in reference

  • Windows AD Abnormal Object Access Activity source: The following analytic identifies a statistically significant increase in access to Active Directory objects, which may indicate attacker enumeration. It leverages Windows Security Event Code 4662 to monitor and analyze access patterns, comparing them against historical averages to detect anomalies. This activity is significant for a SOC because abnormal access to AD objects can be an early indicator of reconnaissance efforts by an attacker. If confirmed malicious, this behavior could lead to unauthorized access, privilege escalation, or further compromise of the Active Directory environment.
  • Windows AD Privileged Object Access Activity source: The following analytic detects access attempts to privileged Active Directory objects, such as Domain Admins or Enterprise Admins. It leverages Windows Security Event Code 4662 to identify when these sensitive objects are accessed. This activity is significant because such objects should rarely be accessed by normal users or processes, and unauthorized access attempts may indicate attacker enumeration or lateral movement within the domain. If confirmed malicious, this activity could allow attackers to escalate privileges, persist in the environment, or gain control over critical domain resources.
  • Windows AD Replication Request Initiated by User Account source: The following analytic detects a user account initiating an Active Directory replication request, indicative of a DCSync attack. It leverages EventCode 4662 from the Windows Security Event Log, focusing on specific object types and replication permissions. This activity is significant because it can allow an attacker with sufficient privileges to request password hashes for any or all users within the domain. If confirmed malicious, this could lead to unauthorized access, privilege escalation, and potential compromise of the entire domain.↳ also matches:Event ID 4624: An account was successfully logged on.
Show 1 more (4 total)
  • Windows AD Replication Request Initiated from Unsanctioned Location source: The following analytic identifies unauthorized Active Directory replication requests initiated from non-domain controller locations. It leverages EventCode 4662 to detect when a computer account with replication permissions creates a handle to domainDNS, filtering out known domain controller IP addresses. This activity is significant as it may indicate a DCSync attack, where an attacker with privileged access can request password hashes for any or all users within the domain. If confirmed malicious, this could lead to unauthorized access to sensitive information and potential full domain compromise.↳ also matches:Event ID 4624: An account was successfully logged on.

Kusto Query Language # view in reference

  • ADFS DKM Master Key Export source medium: 'Identifies an export of the ADFS DKM Master Key from Active Directory. References: https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/, https://cloud.google.com/blog/topics/threat-intelligence/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor To understand further the details behind this detection, please review the details in the original PR and subequent PR update to this: https://github.com/Azure/Azure-Sentinel/pull/1562#issue-551542469 https://github.com/Azure/Azure-Sentinel/pull/1512#issue-543053339 '

References #

Event ID 4663 — An attempt was made to access an object.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File System
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An attempt was made to access an object.

Message #

An attempt was made to access an object.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %11
	Process Name: %12

Access Request Information:
	Accesses: %9
	Access Mask: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectServer UnicodeString[Object] Object Server.
ObjectType UnicodeString[Object] Object Type.
ObjectName UnicodeString[Object] Object Name.
HandleId Pointer[Object] Handle ID.
AccessList UnicodeString[Access Request Information] Accesses.
AccessMask HexInt32[Access Request Information] Access Mask. Access mask reference
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.
ResourceAttributes UnicodeString[Object] Resource Attributes.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4663,
    "version": 1,
    "level": 0,
    "task": 12802,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:55:26.055947+00:00",
    "event_record_id": 304894,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 15220
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ObjectServer": "Security",
    "ObjectType": "Process",
    "ObjectName": "\\Device\\HarddiskVolume4\\Windows\\System32\\lsass.exe",
    "HandleId": "0x1978",
    "AccessList": "%%4484\r\n\t\t\t\t",
    "AccessMask": "0x10",
    "ProcessId": "0x4a28",
    "ProcessName": "C:\\Program Files\\Malwarebytes\\Anti-Malware\\MBAMService.exe",
    "ResourceAttributes": "-"
  },
  "message": ""
}

Detection Patterns #

Registry Keys Access

10 rules

Sigma

@BarryShooshooga, Nasreddine Bencherchali (Nextron Systems)
Roberto Rodriguez @Cyb3rWard0g
Show 4 more (7 total)
Roberto Rodriguez, Teymur Kheirkhabarov, Dimitrios Slamaris, Mark Russinovich, Aleksey Potapov, oscd.community (update)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
Roberto Rodriguez @Cyb3rWard0g

Defense Evasion: Modify Registry

1 rule

Sigma

Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)

Community Notes #

An attempt was made to access an object. May catch mass permission changes or tampering. Also catches renaming, and may be noisy (pair with 4660).

The AccessMask shown assumes File access rights (the most common context). The actual meaning of bits 0x01–0x80 depends on the ObjectType at runtime. Common alternatives:

BitFileRegistryProcessService
0x01ReadData / ListDirectoryKEY_QUERY_VALUEPROCESS_TERMINATESERVICE_QUERY_CONFIG
0x02WriteData / AddFileKEY_SET_VALUEPROCESS_CREATE_THREADSERVICE_CHANGE_CONFIG
0x04AppendData / AddSubDirKEY_CREATE_SUB_KEYPROCESS_SET_SESSIONIDSERVICE_QUERY_STATUS
0x08ReadEAKEY_ENUMERATE_SUB_KEYSPROCESS_VM_OPERATIONSERVICE_ENUMERATE_DEPENDENTS
0x10WriteEAKEY_NOTIFYPROCESS_VM_READSERVICE_START
0x20Execute / TraverseKEY_CREATE_LINKPROCESS_VM_WRITESERVICE_STOP

Standard rights are shared across all types: DELETE (0x10000), READ_CONTROL (0x20000), WRITE_DAC (0x40000), WRITE_OWNER (0x80000).


Binary Defense post Windows Defender ACL Blocking: A Silent Technique With Serious Impact — attackers can modify DACLs on the Windows Defender directory to block the antimalware service from reading its own binaries, silently disabling protection without triggering tamper alerts. Look for WRITE_DAC (0x40000) access to Defender paths paired with 4670 ACL changes.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • ISO Image Mounted source medium: Detects the mount of an ISO image on an endpoint
  • Service Registry Key Read Access Request source low: Detects "read access" requests on the services registry key. Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Adversaries may use flaws in the permissions for Registry keys related to services to redirect from the originally specified executable to one that they control, in order to launch their own code when a service starts.
  • File Access Of Signal Desktop Sensitive Data source medium: Detects access to Signal Desktop's sensitive data files: db.sqlite and config.json. The db.sqlite file in Signal Desktop stores all locally saved messages in an encrypted SQLite database, while the config.json contains the decryption key needed to access that data. Since the key is stored in plain text, a threat actor who gains access to both files can decrypt and read sensitive messages without needing the users credentials. Currently the rule only covers the default Signal installation path in AppData\Roaming. Signal Portable installations may use different paths based on user configuration. Additional paths can be added to the selection as needed.
Show 1 more (4 total)

Splunk # view in reference

  • ConnectWise ScreenConnect Path Traversal Windows SACL source: The following analytic detects attempts to exploit the ConnectWise ScreenConnect CVE-2024-1708 vulnerability using Windows SACL EventCode 4663. It identifies path traversal attacks by monitoring file system events related to the ScreenConnect service. This activity is significant as it allows unauthorized access to sensitive files and directories, potentially leading to data exfiltration or arbitrary code execution. If confirmed malicious, attackers could gain unauthorized access to critical data or execute harmful code, compromising the integrity and security of the affected system. Immediate remediation by updating to version 23.9.8 or above is recommended.
  • Non Chrome Process Accessing Chrome Default Dir source: The following analytic detects a non-Chrome process accessing files in the Chrome user default folder. It leverages Windows Security Event logs, specifically event code 4663, to identify unauthorized access attempts. This activity is significant because the Chrome default folder contains sensitive user data such as login credentials, browsing history, and cookies. If confirmed malicious, this behavior could indicate an attempt to exfiltrate sensitive information, often associated with RATs, trojans, and advanced persistent threats like FIN7. Such access could lead to data theft and further compromise of the affected system.
  • Non Firefox Process Access Firefox Profile Dir source: The following analytic detects non-Firefox processes accessing the Firefox profile directory, which contains sensitive user data such as login credentials, browsing history, and cookies. It leverages Windows Security Event logs, specifically event code 4663, to monitor access attempts. This activity is significant because it may indicate attempts by malware, such as RATs or trojans, to harvest user information. If confirmed malicious, this behavior could lead to data exfiltration, unauthorized access to user accounts, and further compromise of the affected system.
Show 14 more (17 total)
  • SAM Database File Access Attempt source: The following analytic detects attempts to access the SAM, SYSTEM, or SECURITY database files within the `windows\system32\config` directory using Windows Security EventCode 4663. This detection leverages Windows Security Event logs to identify unauthorized access attempts. Monitoring this activity is crucial as it indicates potential credential access attempts, possibly exploiting vulnerabilities like CVE-2021-36934. If confirmed malicious, an attacker could extract user passwords, leading to unauthorized access, privilege escalation, and further compromise of the system.
  • Windows Credential Access From Browser Password Store source: The following analytic identifies a possible non-common browser process accessing its browser user data profile. This tactic/technique has been observed in various Trojan Stealers, such as SnakeKeylogger, which attempt to gather sensitive browser information and credentials as part of their exfiltration strategy. Detecting this anomaly can serve as a valuable pivot for identifying processes that access lists of browser user data profiles unexpectedly. This detection uses a lookup file `browser_app_list` that maintains a list of well known browser applications and the browser paths that are allowed to access the browser user data profiles.
  • Windows Credentials from Password Stores Chrome Extension Access source: The following analytic detects non-Chrome processes attempting to access the Chrome extensions file. It leverages Windows Security Event logs, specifically event code 4663, to identify this behavior. This activity is significant because adversaries may exploit this file to extract sensitive information from the Chrome browser, posing a security risk. If confirmed malicious, this could lead to unauthorized access to stored credentials and other sensitive data, potentially compromising the security of the affected system and broader network.
  • Windows Credentials from Password Stores Chrome LocalState Access source: The following analytic detects non-Chrome processes accessing the Chrome "Local State" file, which contains critical settings and information. It leverages Windows Security Event logs, specifically event code 4663, to identify this behavior. This activity is significant because threat actors can exploit this file to extract the encrypted master key used for decrypting saved passwords in Chrome. If confirmed malicious, this could lead to unauthorized access to sensitive information, posing a severe security risk. Monitoring this anomaly helps identify potential threats and safeguard browser-stored data.
  • Windows Credentials from Password Stores Chrome Login Data Access source: The following analytic identifies non-Chrome processes accessing the Chrome user data file "login data." This file is an SQLite database containing sensitive information, including saved passwords. The detection leverages Windows Security Event logs, specifically event code 4663, to monitor access attempts. This activity is significant as it may indicate attempts by threat actors to extract and decrypt stored passwords, posing a risk to user credentials. If confirmed malicious, attackers could gain unauthorized access to sensitive accounts and escalate their privileges within the environment.
  • Windows Hosts File Access source: This Analytic detects the execution of a process attempting to access the hosts file. The hosts file is a critical file for network configuration and DNS resolution. If an attacker gains access to it, they can redirect traffic to malicious websites, serve fake content or block legitimate security websites.
  • Windows Increase in Group or Object Modification Activity source: This analytic detects an increase in modifications to AD groups or objects. Frequent changes to AD groups or objects can indicate potential security risks, such as unauthorized access attempts, impairing defences or establishing persistence. By monitoring AD logs for unusual modification patterns, this detection helps identify suspicious behavior that could compromise the integrity and security of the AD environment.↳ also matches:Event ID 4670: Permissions on an object were changed., Event ID 4727: A security-enabled global group was created., Event ID 4731: A security-enabled local group was created., Event ID 4734: A security-enabled local group was deleted., Event ID 4735: A security-enabled local group was changed., Event ID 4764: A group’s type was changed.
  • Windows Non Discord App Access Discord LevelDB source: The following analytic detects non-Discord applications accessing the Discord LevelDB database. It leverages Windows Security Event logs, specifically event code 4663, to identify file access attempts to the LevelDB directory by processes other than Discord. This activity is significant as it may indicate attempts to steal Discord credentials or access sensitive user data. If confirmed malicious, this could lead to unauthorized access to user profiles, messages, and other critical information, potentially compromising the security and privacy of the affected users.
  • Windows Product Key Registry Query source: This Analytic detects the execution of a process attempting to access the registry for product key recovery purposes. This behavior could be significant as it might indicate potential malware activity or attempts to bypass security measures or data exfiltration.
  • Windows Query Registry Browser List Application source: The following analytic detects a suspicious process accessing the registry entries for default internet browsers. It leverages Windows Security Event logs, specifically event code 4663, to identify access attempts to these registry paths. This activity is significant because adversaries can exploit this registry key to gather information about installed browsers and their settings, potentially leading to the theft of sensitive data such as login credentials and browsing history. If confirmed malicious, this behavior could enable attackers to exfiltrate sensitive information and compromise user accounts.
  • Windows Query Registry UnInstall Program List source: The following analytic detects an access request on the uninstall registry key. It leverages Windows Security Event logs, specifically event code 4663. This activity is significant because adversaries or malware can exploit this key to gather information about installed applications, aiding in further attacks. If confirmed malicious, this behavior could allow attackers to map out installed software, potentially identifying vulnerabilities or software to exploit, leading to further system compromise.
  • Windows Unsecured Outlook Credentials Access In Registry source: The following analytic detects unauthorized access to Outlook credentials stored in the Windows registry. It leverages Windows Security Event logs, specifically EventCode 4663, to identify access attempts to registry paths associated with Outlook profiles. This activity is significant as it may indicate attempts to steal sensitive email credentials, which could lead to unauthorized access to email accounts. If confirmed malicious, this could allow attackers to exfiltrate sensitive information, impersonate users, or execute further unauthorized actions within Outlook, posing a significant security risk.
  • Windows Unusual FileZilla XML Config Access source: The following analytic identifies processes accessing FileZilla XML config files such as recentservers.xml and sitemanager.xml. It leverages Windows Security Event logs, specifically monitoring EventCode 4663, which tracks object access events. This activity is significant because it can indicate unauthorized access or manipulation of sensitive configuration files used by FileZilla, a popular FTP client. If confirmed malicious, this could lead to data exfiltration, credential theft, or further compromise of the system.
  • Windows Unusual Intelliform Storage Registry Access source: The following analytic identifies processes accessing Intelliform Storage Registry keys used by Internet Explorer. It leverages Windows Security Event logs, specifically monitoring EventCode 4663, which tracks object access events. This activity is significant because it can indicate unauthorized access or manipulation of sensitive registry keys used for storing form data in Internet Explorer. If confirmed malicious, this could lead to data exfiltration, credential theft, or further compromise of the system.

References #

Event ID 4664 — An attempt was made to create a hard link.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File System
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt was made to create a hard link.

Message #

An attempt was made to create a hard link.

Subject:
	Account Name: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Link Information:
	File Name: %5
	Link Name: %6
	Transaction ID: %7

Fields #

NameDescription
SubjectUserSid SID[Subject] Account Name.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
FileName UnicodeString[Link Information] File Name.
LinkName UnicodeString[Link Information] Link Name.
TransactionId GUID[Link Information] Transaction ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4664,
    "version": 0,
    "level": 0,
    "task": 12800,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:40:05.111192+00:00",
    "event_record_id": 275147,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 8800
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "FileName": "C:\\Program Files\\WindowsApps\\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x64__8wekyb3d8bbwe\\zh-TW\\Microsoft.UI.Xaml.Phone.dll.mui",
    "LinkName": "C:\\Program Files\\WindowsApps\\Microsoft.WindowsAppRuntime.1.2_2000.802.31.0_x86__8wekyb3d8bbwe\\zh-TW\\Microsoft.UI.Xaml.Phone.dll.mui",
    "TransactionId": "00000000-0000-0000-0000-000000000000"
  },
  "message": ""
}

References #

Event ID 4665 — An attempt was made to create an application client context.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Application Generated
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An attempt was made to create an application client context.

Message #

An attempt was made to create an application client context.

Subject:
	Client Name: %3
	Client Domain: %4
	Client Context ID: %5

Application Information:
	Application Name: %1
	Application Instance ID: %2

Status: %6

Fields #

NameDescription
Application_Name UnicodeString[Application Information] Application Name.
Application_Instance_ID UInt64[Application Information] Application Instance ID.
Client_Name UnicodeString[Subject] Client Name.
Client_Domain UnicodeString[Subject] Client Domain.
Client_Context_ID UInt64[Subject] Client Context ID.
Status UInt32[Application Information] Status. NTSTATUS reference
AppName UnicodeString[Application Information] Application Name
AppInstance UInt64[Application Information] Application Instance ID
ClientName UnicodeString[Subject] Client Name
ClientDomain UnicodeString[Subject] Client Domain
ClientLogonId UInt64[Subject] Client Context ID

References #

Event ID 4666 — An application attempted an operation.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Application Generated
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An application attempted an operation.

Message #

An application attempted an operation:

Subject:
	Client Name: %5
	Client Domain: %6
	Client Context ID: %7

Object:
	Object Name: %3
	Scope Names: %4

Application Information:
	Application Name: %1
	Application Instance ID: %2

Access Request Information:
	Role: %8
	Groups: %9
	Operation Name: %10 (%11)

Fields #

NameDescription
Application_Name[Application Information] Application Name.
Application_Instance_ID[Application Information] Application Instance ID.
Object_Name[Object] Object Name.
Scope_Names[Object] Scope Names.
Client_Name[Subject] Client Name.
Client_Domain[Subject] Client Domain.
Client_Context_ID[Subject] Client Context ID.
Role UnicodeString[Access Request Information] Role.
Groups[Access Request Information] Groups.
Operation_Name[Access Request Information] Operation Name.
AppName UnicodeString[Application Information] Application Name
AppInstance UInt64[Application Information] Application Instance ID
ObjectName UnicodeString[Object] Object Name
ScopeName UnicodeString[Object] Scope Names
ClientName UnicodeString[Subject] Client Name
ClientDomain UnicodeString[Subject] Client Domain
ClientLogonId UInt64[Subject] Client Context ID
Group UnicodeString[Access Request Information] Groups
OperationName UnicodeString[Access Request Information] Operation Name
OperationId UInt32[Access Request Information] (

References #

Event ID 4667 — An application client context was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Application Generated
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An application client context was deleted.

Message #

An application client context was deleted.

Subject:
	Client Name: %3
	Client Domain: %4
	Client Context ID: %5

Application Information:
	Application Name: %1
	Application Instance ID: %2

Fields #

NameDescription
Application_Name UnicodeString[Application Information] Application Name.
Application_Instance_ID UInt64[Application Information] Application Instance ID.
Client_Name UnicodeString[Subject] Client Name.
Client_Domain UnicodeString[Subject] Client Domain.
Client_Context_ID UInt64[Subject] Client Context ID.
AppName UnicodeString[Application Information] Application Name
AppInstance UInt64[Application Information] Application Instance ID
ClientName UnicodeString[Subject] Client Name
ClientDomain UnicodeString[Subject] Client Domain
ClientLogonId UInt64[Subject] Client Context ID

References #

Event ID 4668 — An application was initialized.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Application Generated
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An application was initialized.

Message #

An application was initialized.

Subject:
	Client Name: %3
	Client Domain: %4
	Client ID: %5

Application Information:
	Application Name: %1
	Application Instance ID: %2

Additional Information:
	Policy Store URL: %6

Fields #

NameDescription
Application_Name UnicodeString[Application Information] Application Name.
Application_Instance_ID UInt64[Application Information] Application Instance ID.
Client_Name UnicodeString[Subject] Client Name.
Client_Domain UnicodeString[Subject] Client Domain.
Client_ID UInt64[Subject] Client ID.
Policy_Store_URL UnicodeString[Additional Information] Policy Store URL.
AppName UnicodeString[Application Information] Application Name
AppInstance UInt64[Application Information] Application Instance ID
ClientName UnicodeString[Subject] Client Name
ClientDomain UnicodeString[Subject] Client Domain
ClientLogonId UInt64[Subject] Client ID
StoreUrl UnicodeString[Additional Information] Policy Store URL

References #

Event ID 4670 — Permissions on an object were changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Permissions on an object were changed.

Message #

Permissions on an object were changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process:
	Process ID: %11
	Process Name: %12

Permissions Change:
	Original Security Descriptor: %9
	New Security Descriptor: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectServer UnicodeString[Object] Object Server.
ObjectType UnicodeString[Object] Object Type.
ObjectName UnicodeString[Object] Object Name.
HandleId Pointer[Object] Handle ID.
OldSd UnicodeString[Permissions Change] Original Security Descriptor.
NewSd UnicodeString[Permissions Change] New Security Descriptor.
ProcessId Pointer[Process] Process ID.
ProcessName UnicodeString[Process] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4670,
    "version": 0,
    "level": 0,
    "task": 13570,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T02:03:41.603666+00:00",
    "event_record_id": 314599,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 21268
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ObjectServer": "Security",
    "ObjectType": "Token",
    "ObjectName": "-",
    "HandleId": "0xddc",
    "OldSd": "D:(A;;GA;;;SY)(A;;GA;;;NS)",
    "NewSd": "D:(A;;GA;;;SY)(A;;RC;;;OW)(A;;GA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)",
    "ProcessId": "0x30c",
    "ProcessName": "C:\\Windows\\System32\\services.exe"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Permissions on an object were changed, may detect ACL edits on files, registry, or tokens that grant elevated rights.


Binary Defense post Windows Defender ACL Blocking: A Silent Technique With Serious Impact — attackers can modify DACLs on the Windows Defender directory to block the antimalware service from reading its own binaries, silently disabling protection without triggering tamper alerts. Look for ACL changes targeting Defender paths (e.g. C:\ProgramData\Microsoft\Windows Defender\) paired with 4663 WRITE_DAC access.

References #

Event ID 4671 — An application attempted to access a blocked ordinal through the TBS.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An application attempted to access a blocked ordinal through the TBS.

Message #

An application attempted to access a blocked ordinal through the TBS.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Ordinal: %5

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Ordinal UInt32[Subject] Ordinal.
CallerUserSid SID[Subject] Security ID
CallerUserName UnicodeString[Subject] Account Name
CallerDomainName UnicodeString[Subject] Account Domain
CallerLogonId HexInt64[Subject] Logon ID

References #

Event ID 4672 — Special privileges assigned to new logon.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Special Logon
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

Special privileges assigned to new logon.

Message #

Special privileges assigned to new logon.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Privileges: %5

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Subject] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4672,
    "version": 0,
    "level": 0,
    "task": 12548,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:52.440990+00:00",
    "event_record_id": 2949,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "SYSTEM",
    "SubjectDomainName": "NT AUTHORITY",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "SeAssignPrimaryTokenPrivilege\r\n\t\t\tSeTcbPrivilege\r\n\t\t\tSeSecurityPrivilege\r\n\t\t\tSeTakeOwnershipPrivilege\r\n\t\t\tSeLoadDriverPrivilege\r\n\t\t\tSeBackupPrivilege\r\n\t\t\tSeRestorePrivilege\r\n\t\t\tSeDebugPrivilege\r\n\t\t\tSeAuditPrivilege\r\n\t\t\tSeSystemEnvironmentPrivilege\r\n\t\t\tSeImpersonatePrivilege\r\n\t\t\tSeDelegateSessionUserImpersonatePrivilege"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Detects Administrator or SYSTEM-equivalent sessions at logon time.

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Special Privileged Logon On Multiple Hosts source: The following analytic detects a user authenticating with special privileges on 30 or more remote endpoints within a 5-minute window. It leverages Event ID 4672 from Windows Security logs to identify this behavior. This activity is significant as it may indicate lateral movement or remote code execution by an adversary. If confirmed malicious, the attacker could gain extensive control over the network, potentially leading to privilege escalation, data exfiltration, or further compromise of the environment. Security teams should adjust detection thresholds based on their specific environment.

References #

Event ID 4673 — A privileged service was called.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Privilege Use → Sensitive Privilege Use
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A privileged service was called.

Message #

A privileged service was called.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Service:
	Server: %5
	Service Name: %6

Process:
	Process ID: %8
	Process Name: %9

Service Request Information:
	Privileges: %7

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectServer UnicodeString[Service] Server.
Service UnicodeString[Service] Service Name.
PrivilegeList UnicodeString[Service Request Information] Privileges. Privilege constants reference
ProcessId Pointer[Process] Process ID.
ProcessName UnicodeString[Process] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4673,
    "version": 0,
    "level": 0,
    "task": 13056,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2023-11-06T02:04:44.872475+00:00",
    "event_record_id": 315408,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 9496
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x27844",
    "ObjectServer": "Security",
    "Service": "-",
    "PrivilegeList": "SeProfileSingleProcessPrivilege",
    "ProcessId": "0x33f0",
    "ProcessName": "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe"
  },
  "message": ""
}

Community Notes #

Logs use of SeDebugPrivilege (often precedes scraping memory), SeTcbPrivilege.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess' source high: The 'LsaRegisterLogonProcess' function verifies that the application making the function call is a logon process by checking that it has the SeTcbPrivilege privilege set. Possible Rubeus tries to get a handle to LSA.
  • Potential Privileged System Service Operation - SeLoadDriverPrivilege source medium: Detects the usage of the 'SeLoadDriverPrivilege' privilege. This privilege is required to load or unload a device driver. With this privilege, the user can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. If you exclude privileged users/admins and processes, which are allowed to do so, you are maybe left with bad programs trying to load malicious kernel drivers. This will detect Ghost-In-The-Logs (https://github.com/bats3c/Ghost-In-The-Logs) and the usage of Sysinternals and various other tools. So you have to work with a whitelist to find the bad stuff.

References #

Event ID 4674 — An operation was attempted on a privileged object.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Privilege Use → Sensitive Privilege Use
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An operation was attempted on a privileged object.

Message #

An operation was attempted on a privileged object.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Object Handle: %8

Process Information:
	Process ID: %11
	Process Name: %12

Requested Operation:
	Desired Access: %9
	Privileges: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectServer UnicodeString[Object] Object Server.
ObjectType UnicodeString[Object] Object Type.
ObjectName UnicodeString[Object] Object Name.
HandleId Pointer[Object] Object Handle.
AccessMask UnicodeString[Requested Operation] Desired Access. Access mask reference
PrivilegeList UnicodeString[Requested Operation] Privileges. Privilege constants reference
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4674,
    "version": 0,
    "level": 0,
    "task": 13056,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:39:25.936087+00:00",
    "event_record_id": 273230,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 17676
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x277c6",
    "ObjectServer": "Security",
    "ObjectType": "-",
    "ObjectName": "-",
    "HandleId": "0xfffffffffffffffc",
    "AccessMask": "1024",
    "PrivilegeList": "SeIncreaseBasePriorityPrivilege",
    "ProcessId": "0x39dc",
    "ProcessName": "C:\\Program Files\\WindowsApps\\Microsoft.SysinternalsSuite_2023.10.0.0_x64__8wekyb3d8bbwe\\Tools\\Procmon.exe"
  },
  "message": ""
}

Community Notes #

Logs direct interaction with objects that require SeSecurity/SeTakeOwnership, ie SAM hives.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Elastic # view in reference

References #

Event ID 4675 — SIDs were filtered.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Logon
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

SIDs were filtered.

Message #

SIDs were filtered.

Target Account:
	Security ID: %1
	Account Name: %2
	Account Domain: %3

Trust Information:
	Trust Direction: %4
	Trust Attributes: %5
	Trust Type: %6
	TDO Domain SID: %7

Filtered SIDs: %8

Fields #

NameDescription
Security_ID SID[Target Account] Security ID.
Account_Name UnicodeString[Target Account] Account Name.
Account_Domain UnicodeString[Target Account] Account Domain.
Trust_Direction UInt32[Trust Information] Trust Direction.
Trust_Attributes UInt32[Trust Information] Trust Attributes.
Trust_Type UInt32[Trust Information] Trust Type.
TDO_Domain_SID SID[Trust Information] TDO Domain SID.
Filtered_SIDs UnicodeString[Trust Information] Filtered SIDs.
TargetUserSid SID[Target Account] Security ID
TargetUserName UnicodeString[Target Account] Account Name
TargetDomainName UnicodeString[Target Account] Account Domain
TdoDirection UInt32[Trust Information] Trust Direction
TdoAttributes UInt32[Trust Information] Trust Attributes
TdoType UInt32[Trust Information] Trust Type
TdoSid SID[Trust Information] TDO Domain SID
SidList UnicodeStringFiltered SIDs

Detection Patterns #

References #

Event ID 4688 — A new process has been created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Process Creation
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A new process has been created.

Message #

A new process has been created.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process Information:
	New Process ID: %5
	New Process Name: %6
	Token Elevation Type: %7
	Creator Process ID: %8

Token Elevation Type indicates the type of token that was assigned to the new process in accordance with User Account Control policy.

Type 1 is a full token with no privileges removed or groups disabled.  A full token is only used if User Account Control is disabled or if the user is the built-in Administrator account or a service account.

Type 2 is an elevated token with no privileges removed or groups disabled.  An elevated token is used when User Account Control is enabled and the user chooses to start the program using Run as administrator.  An elevated token is also used when an application is configured to always require administrative privilege or to always require maximum privilege, and the user is a member of the Administrators group.

Type 3 is a limited token with administrative privileges removed and administrative groups disabled.  The limited token is used when User Account Control is enabled, the application does not require administrative privilege, and the user does not choose to start the program using Run as administrator.

Fields #

NameDescription
SubjectUserSid SID[Creator Subject] Security ID.
SubjectUserName UnicodeString[Creator Subject] Account Name.
SubjectDomainName UnicodeString[Creator Subject] Account Domain.
SubjectLogonId HexInt64[Creator Subject] Logon ID.
NewProcessId Pointer[Process Information] New Process ID.
NewProcessName UnicodeString[Process Information] New Process Name.
TokenElevationType UnicodeString[Process Information] Token Elevation Type.
Known values
%%1936
TokenElevationTypeDefault (1)
%%1937
TokenElevationTypeFull (2)
%%1938
TokenElevationTypeLimited (3)
1
TokenElevationTypeDefault
2
TokenElevationTypeFull
3
TokenElevationTypeLimited
ProcessId Pointer[Process Information] Creator Process ID.
CommandLine UnicodeString[Process Information] Process Command Line.
TargetUserSid SID[Target Subject] Security ID.
TargetUserName UnicodeString[Target Subject] Account Name.
TargetDomainName UnicodeString[Target Subject] Account Domain.
TargetLogonId HexInt64[Target Subject] Logon ID.
ParentProcessName UnicodeString[Process Information] Creator Process Name.
MandatoryLabel SID[Process Information] Mandatory Label.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4688,
    "version": 2,
    "level": 0,
    "task": 13312,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:27.153945+00:00",
    "event_record_id": 2753,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 336
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "-",
    "SubjectDomainName": "-",
    "SubjectLogonId": "0x3e7",
    "NewProcessId": "0x328",
    "NewProcessName": "C:\\Windows\\System32\\lsass.exe",
    "TokenElevationType": "%%1936",
    "ProcessId": "0x27c",
    "CommandLine": "",
    "TargetUserSid": "S-1-0-0",
    "TargetUserName": "-",
    "TargetDomainName": "-",
    "TargetLogonId": "0x0",
    "ParentProcessName": "C:\\Windows\\System32\\wininit.exe",
    "MandatoryLabel": "S-1-16-16384"
  },
  "message": ""
}

Detection Patterns #

429 rules

Sigma

Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Show 411 more (414 total)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Andreas Hunkeler (@Karneades), Markus Neis
Maxim Pavlunin, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Roberto Rodriguez @Cyb3rWard0g
Vadim Khrykov (ThreatIntel), Cyb3rEng, Florian Roth (Nextron Systems)
pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
frack113, Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), Florian Roth (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community
Victor Sergeev, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Markus Neis, Nasreddine Bencherchali (Nextron Systems)
Markus Neis, Nasreddine Bencherchali (Nextron Systems)
Moriarty Meng (idea), Anton Kutepov (rule), oscd.community
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community
Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community
Jonathan Cheong, oscd.community
Daniel Bohannon (@Mandiant/@FireEye), oscd.community
Jonathan Cheong, oscd.community
Jonathan Cheong, oscd.community
Timur Zinniatullin, oscd.community
Nikita Nazarov, oscd.community
Nikita Nazarov, oscd.community
Nikita Nazarov, oscd.community
Julia Fomina, oscd.community
Florian Roth (Nextron Systems)
Christian Burkard (Nextron Systems), pH-T (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), Nounou Mbeiri
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix)
Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community
James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), Beyu Denis, oscd.community
Swachchhanda Shrawan Poudel (Nextron Systems)
Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community, Nasreddine Bencherchali (Nextron Systems)
Max Altgelt (Nextron Systems)
Swachchhanda Shrawan Poudel (Nextron Systems)
Swachchhanda Shrawan Poudel
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Michael Haag, Florian Roth (Nextron Systems), Markus Neis, Elastic, FPT.EagleEye Team
montysecurity, Swachchhanda Shrawan Poudel (Nextron Systems)
0xFustang, Swachchhanda Shrawan Poudel (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Tom Ueltschi (@c_APT_ure), Tim Shelton
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Aedan Russell, frack113, X__Junior (Nextron Systems)
Aedan Russell, frack113, X__Junior (Nextron Systems)
Florian Roth (Nextron Systems), MSTI (query)
Florian Roth (Nextron Systems)
Cian Heasley, Florian Roth (Nextron Systems)
Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community
Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Victor Sergeev, oscd.community, Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Hai Vaknin @LuxNoBulIshit, Avihay eldad @aloneliassaf, Austin Songer @austinsonger
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Swachchhanda Shrawan Poudel (Nextron Systems)
Ivan Dyachkov, Yulia Fomina, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), @twjackomo, Jonhnathan Ribeiro, oscd.community
Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Christian Burkard (Nextron Systems)
Christian Burkard (Nextron Systems)
Christian Burkard (Nextron Systems)
E.M. Anhaus (originally from Atomic Blue Detections, Tony Lambert), oscd.community
Christian Burkard (Nextron Systems)
Christian Burkard (Nextron Systems)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Florian Roth (Nextron Systems)
Christian Burkard (Nextron Systems)
Florian Roth (Nextron Systems)
Ensar Şamil, @sblmsrsn, @oscd_initiative
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), @gott_cyber
Florian Roth (Nextron Systems)
juju4, Jonhnathan Ribeiro, oscd.community
Florian Roth (Nextron Systems), Tim Shelton
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
David Burkett, @signalblur
Swachchhanda Shrawan Poudel (Nextron Systems)
@neu5ron, Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
Konstantin Grishchenko, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Teymur Kheirkhabarov, Ecco, Florian Roth
Florian Roth (Nextron Systems)
@gott_cyber, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Swachchhanda Shrawan Poudel (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), oscd.community, Natalia Shornikova
frack113, Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), oscd.community, Natalia Shornikova, frack113
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Michael McKinley (@McKinleyMike), Tony Latteri (@TheLatteri)
andrewdanis, Swachchhanda Shrawan Poudel (Nextron Systems)
Josh Nickels, mttaggart
Sreeman, Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Bhabesh Raj, X__Junior (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Beyu Denis, oscd.community (rule), @_felamos (idea)
Beyu Denis, oscd.community
Beyu Denis, oscd.community (rule), @harr0ey (idea)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Ensar Şamil, @sblmsrsn, @oscd_initiative
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative
Nasreddine Bencherchali (Nextron Systems), Swachchhanda Shrawan Poudel
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), Swachchhanda Shrawan Poudel
Nasreddine Bencherchali (Nextron Systems), Karneades / Markus Neis, Jonhnathan Ribeiro, oscd.community
Nasreddine Bencherchali (Nextron Systems), Karneades / Markus Neis, Jonhnathan Ribeiro, oscd.community
Austin Songer (@austinsonger)
Nasreddine Bencherchali (Nextron Systems), Swachchhanda Shrawan Poudel
Agro (@agro_sev), Ensar Şamil (@sblmsrsn), oscd.community
Maxime Thiebaut (@0xThiebaut)
Ensar Şamil, @sblmsrsn, @oscd_initiative, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
elhoim, Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Timur Zinniatullin, oscd.community
Swachchhanda Shrawan Poudel
Nasreddine Bencherchali (Nextron Systems)
Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), John Lambert (idea), elhoim
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Ilya Krestinichev, Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Sreeman, Florian Roth (Nextron Systems)
Sergey Soldatov, Kaspersky Lab, oscd.community
Nasreddine Bencherchali (Nextron Systems), Scoubi (@ScoubiMtl)
frack113, Nasreddine Bencherchali (Nextron Systems)
frack113, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems), Samir Bousseaden
Teymur Kheirkhabarov, oscd.community, David ANDRE (additional keywords), Tim Shelton
Kirill Kiryanov, oscd.community
E.M. Anhaus, Tony Lambert, oscd.community, Nasreddine Bencherchali (Nextron Systems)
Teymur Kheirkhabarov, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Furkan Caliskan (@caliskanfurkan_)
Swachchhanda Shrawan Poudel (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems), kagebunsher
Swachchhanda Shrawan Poudel (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Swachchhanda Shrawan Poudel (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io'
Janantha Marasinghe (https://github.com/blueteam0ps), FPT.EagleEye Team, omkar72, oscd.community
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Nikita Nazarov, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
@2xxeformyshirt (Security Risk Advisors) - rule; Teymur Kheirkhabarov (idea)
Karneades, Swisscom CSIRT
@Kostastsale, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community, Nasreddine Bencherchali (Nextron Systems)
E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community
pH-T (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Timur Zinniatullin, E.M. Anhaus, oscd.community
Daniil Yugoslavskiy, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Muhammad Faisal (@faisalusuf), Hunter Juhan (@threatHNTR)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Swachchhanda Shrawan Poudel (Nextron Systems)
Muhammad Faisal (@faisalusuf)
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
Nounou Mbeiri, Swachchhanda Shrawan Poudel (Nextron Systems)
Daniil Yugoslavskiy, Ian Davis, oscd.community
Nasreddine Bencherchali (Nextron Systems)
Nasreddine Bencherchali (Nextron Systems)
frack113, Nasreddine Bencherchali (Nextron Systems), X__Junior
Max Altgelt (Nextron Systems), Tobias Michalski (Nextron Systems)
Max Altgelt (Nextron Systems), Tobias Michalski (Nextron Systems)

Kusto Query Language

Microsoft Security Research
26 rules

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 17 more (55 total)

Elastic # view in reference

  • Potential LSASS Clone Creation via PssCaptureSnapShot source high: Identifies the creation of an LSASS process clone via PssCaptureSnapShot where the parent process is the initial LSASS process instance. This may indicate an attempt to evade detection and dump LSASS memory for credential access.

Kusto Query Language # view in reference

  • SUNBURST suspicious SolarWinds child processes source medium: Identifies suspicious child processes of SolarWinds.Orion.Core.BusinessLayer.dll that may be evidence of the SUNBURST backdoor References: - https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html - https://gist.github.com/olafhartong/71ffdd4cab4b6acd5cbcd1a0691ff82f
  • Unusual identity creation using exchange powershell source high: ' The query below identifies creation of unusual identity by the Europium actor to mimic Microsoft Exchange Health Manager Service account using Exchange PowerShell commands Reference: https://www.microsoft.com/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-the-albanian-government/'
  • Identify Mango Sandstorm powershell commands source high: 'The query below identifies powershell commands used by the threat actor Mango Sandstorm. Reference: https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/'
Show 16 more (19 total)

References #

Event ID 4689 — A process has exited.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Process Termination
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A process has exited.

Message #

A process has exited.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process Information:
	Process ID: %6
	Process Name: %7
	Exit Status: %5

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
Status HexInt32[Process Information] Exit Status. NTSTATUS reference
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4689,
    "version": 0,
    "level": 0,
    "task": 13313,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T02:04:26.563982+00:00",
    "event_record_id": 315178,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 20768
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "Status": "0x0",
    "ProcessId": "0x3f24",
    "ProcessName": "C:\\Windows\\System32\\svchost.exe"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4690 — An attempt was made to duplicate a handle to an object.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Handle Manipulation
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt was made to duplicate a handle to an object.

Message #

An attempt was made to duplicate a handle to an object.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Source Handle Information:
	Source Handle ID: %5
	Source Process ID: %6

New Handle Information:
	Target Handle ID: %7
	Target Process ID: %8

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Source_Handle_ID[Source Handle Information] Source Handle ID.
Source_Process_ID[Source Handle Information] Source Process ID.
Target_Handle_ID[New Handle Information] Target Handle ID.
Target_Process_ID[New Handle Information] Target Process ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4690,
    "version": 0,
    "level": 0,
    "task": 12807,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-04-26T08:26:03.063863Z",
    "event_record_id": 463066,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 6080
    },
    "channel": "Security",
    "computer": "srvdefender01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "SRVDEFENDER01$",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x3e7",
    "SourceHandleId": "0x2a4",
    "SourceProcessId": "0xc8c",
    "TargetHandleId": "0x11ac",
    "TargetProcessId": "0x4"
  }
}

References #

Event ID 4691 — Indirect access to an object was requested.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Indirect access to an object was requested.

Message #

Indirect access to an object was requested.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Type: %5
	Object Name: %6

Process Information:
	Process ID: %9

Access Request Information:
	Accesses: %7
	Access Mask: %8

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Object_Type UnicodeString[Object] Object Type.
Object_Name UnicodeString[Object] Object Name.
Accesses UnicodeString[Access Request Information] Accesses.
Access_Mask HexInt32[Access Request Information] Access Mask. Access mask reference
Process_ID Pointer[Process Information] Process ID.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectType UnicodeString[Object] Object Type
ObjectName UnicodeString[Object] Object Name
AccessList UnicodeString[Access Request Information] Accesses
AccessMask HexInt32[Access Request Information] Access Mask Access mask reference
ProcessId Pointer[Process Information] Process ID

References #

Event ID 4692 — Backup of data protection master key was attempted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → DPAPI Activity
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Backup of data protection master key was attempted.

Message #

Backup of data protection master key was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Key Information:
	Key Identifier: %5
	Recovery Server: %6
	Recovery Key ID: %7

Status Information:
	Status Code: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
MasterKeyId UnicodeString[Key Information] Key Identifier
RecoveryServer UnicodeString[Key Information] Recovery Server
RecoveryKeyId UnicodeString[Key Information] Recovery Key ID
FailureReason HexInt32[Status Information] Status Code
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Key_Identifier UnicodeString[Key Information] Key Identifier.
Recovery_Server UnicodeString[Key Information] Recovery Server.
Recovery_Key_ID UnicodeString[Key Information] Recovery Key ID.
Status_Code HexInt32[Status Information] Status Code.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4692,
    "version": 0,
    "level": 0,
    "task": 13314,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-14T16:30:04.309269+00:00",
    "event_record_id": 2554242,
    "correlation": {
      "ActivityID": "0375AF68-73B8-434A-AE18-9AF03149A7A2"
    },
    "execution": {
      "process_id": 1092,
      "thread_id": 4244
    },
    "channel": "Security",
    "computer": "LAB-WIN11.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0x1470e85",
    "MasterKeyId": "0bb6fb5d-7c2d-44b7-8df0-e4526299350b",
    "RecoveryServer": "",
    "RecoveryKeyId": "fed516d7-c48c-48e4-8eb3-77f6590ccb36",
    "FailureReason": "0x0"
  },
  "message": ""
}

Community Notes #

Backup of a user/computer master key to the DC, rarely seen after first logon. Several events may indicate key theft or mass profile creation.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 4693 — Recovery of data protection master key was attempted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → DPAPI Activity
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Recovery of data protection master key was attempted.

Message #

Recovery of data protection master key was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Key Information:
	Key Identifier: %5
	Recovery Server: %6
	Recovery Key ID: %8
	Recovery Reason: %7

Status Information:
	Status Code: %9

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Key_Identifier UnicodeString[Key Information] Key Identifier.
Recovery_Server HexInt32[Key Information] Recovery Server.
Recovery_Reason UnicodeString[Key Information] Recovery Reason.
Recovery_Key_ID UnicodeString[Key Information] Recovery Key ID.
Status_Code HexInt32[Status Information] Status Code.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
MasterKeyId UnicodeString[Key Information] Key Identifier
RecoveryReason HexInt32[Key Information] Recovery Server
RecoveryServer UnicodeString[Key Information] Recovery Reason
RecoveryKeyId UnicodeString[Key Information] Recovery Key ID
FailureId HexInt32[Status Information] Status Code

Community Notes #

May appear when an attacker re-uses offline profiles or moves tokens between hosts. Correlate with LogonType 7/9 in 4624. Detecting Credential Stealing Attacks Through Active In-Network Defense

References #

Event ID 4694 — Protection of auditable protected data was attempted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → DPAPI Activity
Collection Priority
Recommended (ASD, others)
Opcode
Info

Description

Protection of auditable protected data was attempted.

Message #

Protection of auditable protected data was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Protected Data:
	Data Description: %6
	Key Identifier: %5
	Protected Data Flags: %7
	Protection Algorithms: %8

Status Information:
	Status Code: %9

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
DataDescription UnicodeString[Protected Data] Key Identifier.
MasterKeyId UnicodeString[Protected Data] Data Description.
ProtectedDataFlags HexInt32[Protected Data] Protected Data Flags.
CryptoAlgorithms UnicodeString[Protected Data] Protection Algorithms.
FailureReason HexInt32[Status Information] Status Code.
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4694,
    "version": 0,
    "level": 0,
    "task": 13314,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:44:39.871358+00:00",
    "event_record_id": 290370,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 844
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x27844",
    "DataDescription": "ecf918da-9b78-4ed5-bd64-9ff40e3484a1",
    "MasterKeyId": "Chromium",
    "ProtectedDataFlags": "0x10",
    "CryptoAlgorithms": "AES-256 , SHA2-512 ",
    "FailureReason": "0x0"
  },
  "message": ""
}

Community Notes #

When seen outside of software installation it may indicate payload staging hidden in DPAPI.

References #

Event ID 4695 — Unprotection of auditable protected data was attempted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → DPAPI Activity
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

Unprotection of auditable protected data was attempted.

Message #

Unprotection of auditable protected data was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Protected Data:
	Data Description: %6
	Key Identifier: %5
	Protected Data Flags: %7
	Protection Algorithms: %8

Status Information:
	Status Code: %9

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
DataDescription UnicodeString[Protected Data] Key Identifier.
MasterKeyId UnicodeString[Protected Data] Data Description.
ProtectedDataFlags HexInt32[Protected Data] Protected Data Flags.
CryptoAlgorithms UnicodeString[Protected Data] Protection Algorithms.
FailureReason HexInt32[Status Information] Status Code.
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4695,
    "version": 0,
    "level": 0,
    "task": 13314,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:47:40.735119+00:00",
    "event_record_id": 293247,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 15768
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x27844",
    "DataDescription": "ecf918da-9b78-4ed5-bd64-9ff40e3484a1",
    "MasterKeyId": "Google Chrome",
    "ProtectedDataFlags": "0x0",
    "CryptoAlgorithms": "AES-256 , SHA2-512 ",
    "FailureReason": "0x0"
  },
  "message": ""
}

Community Notes #

Pair with 4694 to identify which user accessed encrypted blobs.

References #

Event ID 4696 — A primary token was assigned to process.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Process Creation
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A primary token was assigned to process.

Message #

A primary token was assigned to process.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process Information:
	Process ID: %11
	Process Name: %12

Target Process:
	Target Process ID: %9
	Target Process Name: %10

New Token Information:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
TargetUserSid SID[New Token Information] Security ID.
TargetUserName UnicodeString[New Token Information] Account Name.
TargetDomainName UnicodeString[New Token Information] Account Domain.
TargetLogonId HexInt64[New Token Information] Logon ID.
TargetProcessId Pointer[Target Process] Target Process ID.
TargetProcessName UnicodeString[Target Process] Target Process Name.
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4696,
    "version": 0,
    "level": 0,
    "task": 13312,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:19.637636+00:00",
    "event_record_id": 2742,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 96
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "-",
    "SubjectDomainName": "-",
    "SubjectLogonId": "0x3e7",
    "TargetUserSid": "S-1-0-0",
    "TargetUserName": "-",
    "TargetDomainName": "-",
    "TargetLogonId": "0x3e7",
    "TargetProcessId": "0x64",
    "TargetProcessName": "Registry",
    "ProcessId": "0x4",
    "ProcessName": ""
  },
  "message": ""
}

References #

Event ID 4697 — A service was installed in the system.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Security System Extension
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A service was installed in the system.

Message #

A service was installed in the system.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Service Information:
	Service Name: %5
	Service File Name: %6
	Service Type: %7
	Service Start Type: %8
	Service Account: %9

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ServiceName UnicodeString[Service Information] Service Name.
ServiceFileName UnicodeString[Service Information] Service File Name.
ServiceType HexInt32[Service Information] Service Type.
Known values
1
Kernel Driver
2
File System Driver
4
Adapter
8
Recognizer Driver
16
Own Process
32
Share Process
256
Interactive
ServiceStartType UInt32[Service Information] Service Start Type.
Known values
0
Boot
1
System
2
Automatic
3
Manual
4
Disabled
ServiceAccount UnicodeString[Service Information] Service Account.
ClientProcessStartKey UInt64
ClientProcessId UInt32
ParentProcessId UInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4697,
    "version": 1,
    "level": 0,
    "task": 12289,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T14:08:37.173232+00:00",
    "event_record_id": 34393,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 3964
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-TKC15D7KHUR$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ServiceName": "MpKsl6680716f",
    "ServiceFileName": "C:\\ProgramData\\Microsoft\\Windows Defender\\Definition Updates\\{94297FD4-6E63-4B60-B47B-85D76376014D}\\MpKslDrv.sys",
    "ServiceType": "0x1",
    "ServiceStartType": 3,
    "ServiceAccount": "LocalSystem",
    "ClientProcessStartKey": 1407374883553325,
    "ClientProcessId": 1796,
    "ParentProcessId": 604
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 17 more (21 total)

Elastic # view in reference

  • Windows Service Installed via an Unusual Client source high: Identifies the creation of a Windows service by an unusual client process. Services may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges from administrator to SYSTEM.

References #

Event ID 4698 — A scheduled task was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A scheduled task was created.

Message #

A scheduled task was created.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Task Information:
	Task Name: %5
	Task Content: %6

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4698,
    "version": 0,
    "level": 0,
    "task": 12804,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-19T00:02:04.319945Z",
    "event_record_id": 566836,
    "correlation": {},
    "execution": {
      "process_id": 452,
      "thread_id": 2836
    },
    "channel": "Security",
    "computer": "WIN-77LTAPHIQ1R.example.corp",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1587066498-1489273250-1035260531-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "EXAMPLE",
    "SubjectLogonId": "0x17e2d2",
    "TaskName": "\\CYAlyNSS",
    "TaskContent": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <Triggers>\r\n    <CalendarTrigger>\r\n      <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary>\r\n      <Enabled>true</Enabled>\r\n      <ScheduleByDay>\r\n        <DaysInterval>1</DaysInterval>\r\n      </ScheduleByDay>\r\n    </CalendarTrigger>\r\n  </Triggers>\r\n  <Principals>\r\n    <Principal id=\"LocalSystem\">\r\n      <UserId>S-1-5-18</UserId>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n      <LogonType>InteractiveToken</LogonType>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>true</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>true</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>P3D</ExecutionTimeLimit>\r\n    <Priority>7</Priority>\r\n  </Settings>\r\n  <Actions Context=\"LocalSystem\">\r\n    <Exec>\r\n      <Command>cmd.exe</Command>\r\n      <Arguments>/C tasklist &gt; %windir%\\Temp\\CYAlyNSS.tmp 2&gt;&amp;1</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task>"
  }
}

Detection Patterns #

Community Notes #

May also indicate remote creation via relayed SMB/WinRM session, PS cmdlets, DCOM over RPC, WMI, others.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Elastic # view in reference

Splunk # view in reference

  • Randomly Generated Scheduled Task Name source: The following analytic detects the creation of a Scheduled Task with a high entropy, randomly generated name, leveraging Event ID 4698. It uses the `ut_shannon` function from the URL ToolBox Splunk application to measure the entropy of the Task Name. This activity is significant as adversaries often use randomly named Scheduled Tasks for lateral movement and remote code execution, employing tools like Impacket or CrackMapExec. If confirmed malicious, this could allow attackers to execute arbitrary code remotely, potentially leading to further compromise and persistence within the network.
  • Schedule Task with HTTP Command Arguments source: The following analytic detects the creation of scheduled tasks on Windows systems that include HTTP command arguments, using Windows Security EventCode 4698. It identifies tasks registered via schtasks.exe or TaskService with HTTP in their command arguments. This behavior is significant as it often indicates malware activity or the use of Living off the Land binaries (lolbins) to download additional payloads. If confirmed malicious, this activity could lead to data exfiltration, malware propagation, or unauthorized access to sensitive information, necessitating immediate investigation and mitigation.
  • Schedule Task with Rundll32 Command Trigger source: The following analytic detects the creation of scheduled tasks in Windows that use the rundll32 command. It leverages Windows Security EventCode 4698, which logs the creation of scheduled tasks, and filters for tasks executed via rundll32. This activity is significant as it is a common technique used by malware, such as TrickBot, to persist in an environment or deliver additional payloads. If confirmed malicious, this could lead to data theft, ransomware deployment, or other damaging outcomes. Immediate investigation and mitigation are crucial to prevent further compromise.
Show 4 more (7 total)
  • Windows Hidden Schedule Task Settings source: The following analytic detects the creation of hidden scheduled tasks on Windows systems, which are not visible in the UI. It leverages Windows Security EventCode 4698 to identify tasks where the 'Hidden' setting is enabled. This behavior is significant as it may indicate malware activity, such as Industroyer2, or the use of living-off-the-land binaries (LOLBINs) to download additional payloads. If confirmed malicious, this activity could allow attackers to execute code stealthily, maintain persistence, or further compromise the system by downloading additional malicious payloads.
  • Windows Scheduled Tasks for CompMgmtLauncher or Eventvwr source: The following analytic detects the creation or modification of Windows Scheduled Tasks related to CompMgmtLauncher or Eventvwr. These legitimate system utilities, used for launching the Computer Management Console and Event Viewer, can be abused by attackers to execute malicious payloads under the guise of normal system processes. By leveraging these tasks, adversaries can establish persistence or elevate privileges without raising suspicion. This detection helps security analysts identify unusual or unauthorized scheduled tasks involving these executables, allowing for timely investigation and remediation of potential threats.
  • WinEvent Scheduled Task Created to Spawn Shell source: The following analytic detects the creation of scheduled tasks designed to execute commands using native Windows shells like PowerShell, Cmd, Wscript, or Cscript. It leverages Windows Security EventCode 4698 to identify when such tasks are registered. This activity is significant as it may indicate an attempt to establish persistence or execute malicious commands on a system. If confirmed malicious, this could allow an attacker to maintain access, execute arbitrary code, or escalate privileges, posing a severe threat to the environment.
  • WinEvent Scheduled Task Created Within Public Path source: The following analytic detects the creation of scheduled tasks within user-writable paths using Windows Security EventCode 4698. It identifies tasks registered via schtasks.exe or TaskService that execute commands from directories like Public, ProgramData, Temp, and AppData. This behavior is significant as it may indicate an attempt to establish persistence or execute unauthorized commands. If confirmed malicious, an attacker could maintain long-term access, escalate privileges, or execute arbitrary code, posing a severe threat to system integrity and security.

References #

Event ID 4699 — A scheduled task was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A scheduled task was deleted.

Message #

A scheduled task was deleted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Task Information:
	Task Name: %5
	Task Content: %6

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4699,
    "version": 0,
    "level": 0,
    "task": 12804,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-19T00:02:04.351252Z",
    "event_record_id": 566840,
    "correlation": {},
    "execution": {
      "process_id": 452,
      "thread_id": 2836
    },
    "channel": "Security",
    "computer": "WIN-77LTAPHIQ1R.example.corp",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1587066498-1489273250-1035260531-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "EXAMPLE",
    "SubjectLogonId": "0x17e2d2",
    "TaskName": "\\CYAlyNSS",
    "TaskContent": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <Triggers>\r\n    <CalendarTrigger>\r\n      <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary>\r\n      <Enabled>true</Enabled>\r\n      <ScheduleByDay>\r\n        <DaysInterval>1</DaysInterval>\r\n      </ScheduleByDay>\r\n    </CalendarTrigger>\r\n  </Triggers>\r\n  <Principals>\r\n    <Principal id=\"LocalSystem\">\r\n      <UserId>S-1-5-18</UserId>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n      <LogonType>InteractiveToken</LogonType>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>true</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>true</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>P3D</ExecutionTimeLimit>\r\n    <Priority>7</Priority>\r\n  </Settings>\r\n  <Actions Context=\"LocalSystem\">\r\n    <Exec>\r\n      <Command>cmd.exe</Command>\r\n      <Arguments>/C tasklist &gt; %windir%\\Temp\\CYAlyNSS.tmp 2&gt;&amp;1</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task>"
  }
}

Detection Patterns #

References #

Event ID 4700 — A scheduled task was enabled.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A scheduled task was enabled.

Message #

A scheduled task was enabled.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Task Information:
	Task Name: %5
	Task Content: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
TaskName UnicodeString[Task Information] Task Name
TaskContent UnicodeString[Task Information] Task Content
ClientProcessStartKey UInt64[Other Information] ProcessCreationTime
ClientProcessId UInt32[Other Information] ClientProcessId
ParentProcessId UInt32[Other Information] ParentProcessId
RpcCallClientLocality UInt32[Other Information] FQDN
FQDN UnicodeString
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4700,
    "version": 1,
    "level": 0,
    "task": 12804,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-08T23:13:42.036906+00:00",
    "event_record_id": 1552683,
    "correlation": {
      "ActivityID": "0973643C-548D-4680-AA95-124DB4FF8472"
    },
    "execution": {
      "process_id": 780,
      "thread_id": 2440
    },
    "channel": "Security",
    "computer": "LAB-WIN11.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-20",
    "SubjectUserName": "LAB-WIN11$",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0x3e4",
    "TaskName": "\\Microsoft\\Windows\\SoftwareProtectionPlatform\\SvcRestartTaskLogon",
    "TaskContent": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo>\r\n    <Version>1.0</Version>\r\n    <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FRFW;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-4)</SecurityDescriptor>\r\n    <Source>$(@%systemroot%\\system32\\sppc.dll,-200)</Source>\r\n    <Author>$(@%systemroot%\\system32\\sppc.dll,-200)</Author>\r\n    <Description>$(@%systemroot%\\system32\\sppc.dll,-202)</Description>\r\n    <URI>\\Microsoft\\Windows\\SoftwareProtectionPlatform\\SvcRestartTaskLogon</URI>\r\n  </RegistrationInfo>\r\n  <Principals>\r\n    <Principal id=\"InteractiveUser\">\r\n      <GroupId>S-1-5-4</GroupId>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <AllowHardTerminate>false</AllowHardTerminate>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Hidden>true</Hidden>\r\n    <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>\r\n    <RestartOnFailure>\r\n      <Count>3</Count>\r\n      <Interval>PT1M</Interval>\r\n    </RestartOnFailure>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>true</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>\r\n  </Settings>\r\n  <Triggers>\r\n    <LogonTrigger />\r\n  </Triggers>\r\n  <Actions Context=\"InteractiveUser\">\r\n    <ComHandler>\r\n      <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId>\r\n      <Data><![CDATA[logon]]></Data>\r\n    </ComHandler>\r\n  </Actions>\r\n</Task>",
    "ClientProcessStartKey": 1970324836977758,
    "ClientProcessId": 5592,
    "ParentProcessId": 204,
    "RpcCallClientLocality": 0,
    "FQDN": "LAB-WIN11.ludus.domain"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4701 — A scheduled task was disabled.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A scheduled task was disabled.

Message #

A scheduled task was disabled.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Task Information:
	Task Name: %5
	Task Content: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
TaskName UnicodeString[Task Information] Task Name
TaskContent UnicodeString[Task Information] Task Content
ClientProcessStartKey UInt64[Other Information] ProcessCreationTime
ClientProcessId UInt32[Other Information] ClientProcessId
ParentProcessId UInt32[Other Information] ParentProcessId
RpcCallClientLocality UInt32[Other Information] FQDN
FQDN UnicodeString
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_Content[Task Information] Task Content.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4701,
    "version": 1,
    "level": 0,
    "task": 12804,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-09T18:21:07.550543+00:00",
    "event_record_id": 1753741,
    "correlation": {
      "ActivityID": "B6034439-245E-4C44-9C16-887F1090313D"
    },
    "execution": {
      "process_id": 8,
      "thread_id": 6100
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "LAB-WIN11$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "TaskName": "\\Microsoft\\Windows\\EnterpriseMgmt\\69C01DBD-8068-44F9-9507-8A9DF76C127A\\Wsc Startup event listener created by enrollment client",
    "TaskContent": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.4\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo>\r\n    <SecurityDescriptor>D:P(A;;FA;;;BA)(A;;FA;;;SY)(A;;FRFX;;;LS)</SecurityDescriptor>\r\n    <Author>Microsoft Corporation</Author>\r\n    <URI>\\Microsoft\\Windows\\EnterpriseMgmt\\69C01DBD-8068-44F9-9507-8A9DF76C127A\\Wsc Startup event listener created by enrollment client</URI>\r\n  </RegistrationInfo>\r\n  <Principals>\r\n    <Principal id=\"LocalSystem\">\r\n      <UserId>S-1-5-18</UserId>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <Enabled>false</Enabled>\r\n    <ExecutionTimeLimit>PT1H</ExecutionTimeLimit>\r\n    <MultipleInstancesPolicy>Queue</MultipleInstancesPolicy>\r\n    <RunOnlyIfNetworkAvailable>true</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>\r\n  </Settings>\r\n  <Triggers>\r\n    <WnfStateChangeTrigger>\r\n      <StateName>7510BCA33A1D8541</StateName>\r\n    </WnfStateChangeTrigger>\r\n  </Triggers>\r\n  <Actions Context=\"LocalSystem\">\r\n    <Exec>\r\n      <Command>%windir%\\system32\\deviceenroller.exe</Command>\r\n      <Arguments>/s \"69C01DBD-8068-44F9-9507-8A9DF76C127A\" /c /WscStartupAlert</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task>",
    "ClientProcessStartKey": 3940649673950061,
    "ClientProcessId": 9152,
    "ParentProcessId": 840,
    "RpcCallClientLocality": 0,
    "FQDN": "LAB-WIN11"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4702 — A scheduled task was updated.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A scheduled task was updated.

Message #

A scheduled task was updated.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Task Information:
	Task Name: %5
	Task New Content: %6

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Task_Name[Task Information] Task Name.
Task_New_Content[Task Information] Task New Content.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4702,
    "version": 0,
    "level": 0,
    "task": 12804,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-25T11:22:45.080609Z",
    "event_record_id": 198238563,
    "correlation": {},
    "execution": {
      "process_id": 444,
      "thread_id": 2260
    },
    "channel": "Security",
    "computer": "DC1.insecurebank.local",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-20",
    "SubjectUserName": "DC1$",
    "SubjectDomainName": "insecurebank",
    "SubjectLogonId": "0x3e4",
    "TaskName": "\\Microsoft\\Windows\\SoftwareProtectionPlatform\\SvcRestartTask",
    "TaskContentNew": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.4\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo>\r\n    <Source>$(@%systemroot%\\system32\\sppc.dll,-200)</Source>\r\n    <Author>$(@%systemroot%\\system32\\sppc.dll,-200)</Author>\r\n    <Version>1.0</Version>\r\n    <Description>$(@%systemroot%\\system32\\sppc.dll,-201)</Description>\r\n    <URI>\\Microsoft\\Windows\\SoftwareProtectionPlatform\\SvcRestartTask</URI>\r\n    <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor>\r\n  </RegistrationInfo>\r\n  <Triggers>\r\n    <CalendarTrigger>\r\n      <StartBoundary>2019-03-26T11:21:44Z</StartBoundary>\r\n      <Enabled>true</Enabled>\r\n      <ScheduleByDay>\r\n        <DaysInterval>1</DaysInterval>\r\n      </ScheduleByDay>\r\n    </CalendarTrigger>\r\n  </Triggers>\r\n  <Principals>\r\n    <Principal id=\"NetworkService\">\r\n      <UserId>S-1-5-20</UserId>\r\n      <RunLevel>LeastPrivilege</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>false</AllowHardTerminate>\r\n    <StartWhenAvailable>true</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>true</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>true</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession>\r\n    <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>7</Priority>\r\n    <RestartOnFailure>\r\n      <Interval>PT1M</Interval>\r\n      <Count>3</Count>\r\n    </RestartOnFailure>\r\n  </Settings>\r\n  <Actions Context=\"NetworkService\">\r\n    <ComHandler>\r\n      <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId>\r\n      <Data><![CDATA[timer]]></Data>\r\n    </ComHandler>\r\n  </Actions>\r\n</Task>"
  }
}

Detection Patterns #

Community Notes #

May indicate path or trigger edits.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Elastic # view in reference

References #

Event ID 4703 — A user right was adjusted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Token Right Adjusted Events
Collection Priority
Recommended (mdecrevoisier, others)
Opcode
Info

Description

A token right was adjusted.

Message #

A token right was adjusted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Target Account:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Process Information:
	Process ID: %10
	Process Name: %9

Enabled Privileges:
			%11

Disabled Privileges:
			%12

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
TargetUserSid SID[Target Account] Security ID.
TargetUserName UnicodeString[Target Account] Account Name.
TargetDomainName UnicodeString[Target Account] Account Domain.
TargetLogonId HexInt64[Target Account] Logon ID.
ProcessName UnicodeString[Process Information] Process Name.
ProcessId Pointer[Process Information] Process ID.
EnabledPrivilegeList UnicodeStringEnabled Privileges Privilege constants reference
DisabledPrivilegeList UnicodeStringDisabled Privileges Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4703,
    "version": 0,
    "level": 0,
    "task": 13317,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T02:04:44.861115+00:00",
    "event_record_id": 315382,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 9496
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "TargetUserSid": "S-1-5-18",
    "TargetUserName": "WINDEV2310EVAL$",
    "TargetDomainName": "WORKGROUP",
    "TargetLogonId": "0x3e7",
    "ProcessName": "C:\\Windows\\System32\\svchost.exe",
    "ProcessId": "0xd0c",
    "EnabledPrivilegeList": "SeAssignPrimaryTokenPrivilege\r\n\t\t\tSeIncreaseQuotaPrivilege\r\n\t\t\tSeSecurityPrivilege\r\n\t\t\tSeTakeOwnershipPrivilege\r\n\t\t\tSeLoadDriverPrivilege\r\n\t\t\tSeSystemtimePrivilege\r\n\t\t\tSeBackupPrivilege\r\n\t\t\tSeRestorePrivilege\r\n\t\t\tSeShutdownPrivilege\r\n\t\t\tSeSystemEnvironmentPrivilege\r\n\t\t\tSeUndockPrivilege\r\n\t\t\tSeManageVolumePrivilege",
    "DisabledPrivilegeList": "-"
  },
  "message": ""
}

Community Notes #

Generated when token privileges are changed (tracks rights like SeDebugPrivilege, SeLoadDriverPrivilege).

Detection Rules #

View all rules referencing this event →

Elastic # view in reference

  • SeDebugPrivilege Enabled by a Suspicious Process source medium: Identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege. Adversaries may enable this privilege to debug and modify other processes, typically reserved for system-level tasks, to escalate privileges and bypass access controls.

Splunk # view in reference

  • Windows Access Token Manipulation SeDebugPrivilege source: The following analytic detects a process enabling the "SeDebugPrivilege" privilege token. It leverages Windows Security Event Logs with EventCode 4703, filtering out common legitimate processes. This activity is significant because SeDebugPrivilege allows a process to inspect and modify the memory of other processes, potentially leading to credential dumping or code injection. If confirmed malicious, an attacker could gain extensive control over system processes, enabling them to escalate privileges, persist in the environment, or access sensitive information.

References #

Event ID 4704 — A user right was assigned.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authorization Policy Change
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A user right was assigned.

Message #

A user right was assigned.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Target Account:
	Account Name: %5

New Right:
	User Right: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
TargetSid SID[Target Account] Account Name.
PrivilegeList UnicodeString[New Right] User Right. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4704,
    "version": 0,
    "level": 0,
    "task": 13570,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T23:16:25.782413+00:00",
    "event_record_id": 71899,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 844
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "TargetSid": "S-1-5-83-0",
    "PrivilegeList": "SeCreateSymbolicLinkPrivilege"
  },
  "message": ""
}

Community Notes #

Tracks changes to token privileges.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Elastic # view in reference

  • Sensitive Privilege SeEnableDelegationPrivilege assigned to a User source high: Identifies the assignment of the SeEnableDelegationPrivilege sensitive "user right" to a user. The SeEnableDelegationPrivilege "user right" enables computer and user accounts to be trusted for delegation. Attackers can abuse this right to compromise Active Directory accounts and elevate their privileges.

References #

Event ID 4705 — A user right was removed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authorization Policy Change
Collection Priority
Recommended (ASD, others)
Opcode
Info

Description

A user right was removed.

Message #

A user right was removed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Target Account:
	Account Name: %5

Removed Right:
	User Right: %6

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Account_Name[Target Account] Account Name.
User_Right[Removed Right] User Right.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4705,
    "version": 0,
    "level": 0,
    "task": 13570,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-12T20:23:39.973927Z",
    "event_record_id": 1239002,
    "correlation": {},
    "execution": {
      "process_id": 464,
      "thread_id": 2980
    },
    "channel": "Security",
    "computer": "fs02.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x202dac8",
    "TargetSid": "S-1-5-21-4230534742-2542757381-3142984815-1158",
    "PrivilegeList": "SeCreateTokenPrivilege"
  }
}

References #

Event ID 4706 — A new trust was created to a domain.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A new trust was created to a domain.

Message #

A new trust was created to a domain.

Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6

Trusted Domain:
	Domain Name: %1
	Domain ID: %2

Trust Information:
	Trust Type: %7
	Trust Direction: %8
	Trust Attributes: %9
	SID Filtering: %10

Fields #

NameDescription
Domain_Name[Trusted Domain] Domain Name.
Domain_ID[Trusted Domain] Domain ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Trust_Type[Trust Information] Trust Type.
Trust_Direction[Trust Information] Trust Direction.
Trust_Attributes[Trust Information] Trust Attributes.
SID_Filtering[Trust Information] SID Filtering.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4706,
    "version": 0,
    "level": 0,
    "task": 13569,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2024-06-22T14:02:41.639162Z",
    "event_record_id": 3175612,
    "correlation": {},
    "execution": {
      "process_id": 596,
      "thread_id": 11064
    },
    "channel": "Security",
    "computer": "CDCWTRDC01.mypartner.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "DomainName": "rootblue.lan",
    "DomainSid": "S-1-5-21-392370121-190461309-2151315433",
    "SubjectUserSid": "S-1-5-21-1407145384-2259788832-4099636412-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "MYPARTNER",
    "SubjectLogonId": "0xffad8559",
    "TdoType": 2,
    "TdoDirection": 3,
    "TdoAttributes": 8,
    "SidFilteringEnabled": "%%1796"
  }
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 4707 — A trust to a domain was removed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A trust to a domain was removed.

Message #

A trust to a domain was removed.

Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6

Domain Information:
	Domain Name: %1
	Domain ID: %2

Fields #

NameDescription
Domain_Name UnicodeString[Domain Information] Domain Name.
Domain_ID SID[Domain Information] Domain ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
DomainName UnicodeString[Domain Information] Domain Name
DomainSid SID[Domain Information] Domain ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID

References #

Event ID 4709 — The IPsec Policy Agent service was started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The IPsec Policy Agent service was started.

Message #

The IPsec Policy Agent service was started.

%1

Policy Source: %2

%3

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeStringPolicy Source
param3 UnicodeString

References #

Event ID 4710 — The IPsec Policy Agent service was disabled.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The IPsec Policy Agent service was disabled.

Message #

The IPsec Policy Agent service was disabled.

%1
%2

Fields #

NameDescription
param1 UnicodeString
param2 UnicodeString

References #

Event ID 4711 — param1

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Message #

%1

Fields #

NameDescription
param1 UnicodeString

References #

Event ID 4712 — IPsec Policy Agent encountered a potentially serious failure.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent encountered a potentially serious failure.

Message #

IPsec Policy Agent encountered a potentially serious failure.
%1

Fields #

NameDescription
param1 UnicodeString

References #

Event ID 4713 — Kerberos policy was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

Kerberos policy was changed.

Message #

Kerberos policy was changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Changes Made:
('--' means no changes, otherwise each change is shown as:
(Parameter Name):	(new value) (old value))
%5

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
KerberosPolicyChange UnicodeString
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4713,
    "version": 0,
    "level": 0,
    "task": 13569,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:28:27.466929+00:00",
    "event_record_id": 16696941,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 11540
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "LAB-DC01$",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0x3e7",
    "KerberosPolicyChange": "KerMaxT: 0x430e234000 (0x53d1ac1000);  KerLogoff: 0x7ffdce8d4d08 (0x1);  "
  },
  "message": ""
}

References #

Event ID 4714 — Data Recovery Agent group policy for Encrypting File System (EFS) has changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Data Recovery Agent group policy for Encrypting File System (EFS) has changed. The new changes have been applied.

Message #

Data Recovery Agent group policy for Encrypting File System (EFS) has changed. The new changes have been applied.

Fields #

NameDescription
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
EfsPolicyChange UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "{54849625-5478-4994-a5ba-3e3b0328c30d}",
    "event_source_name": "",
    "event_id": 4714,
    "version": 0,
    "level": 0,
    "task": 13573,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:18:12.649403+00:00",
    "event_record_id": 16250501,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 7468
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 4715 — The audit policy (SACL) on an object was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The audit policy (SACL) on an object was changed.

Message #

The audit policy (SACL) on an object was changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Audit Policy Change:
	Original Security Descriptor: %5
	New Security Descriptor: %6

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Original_Security_Descriptor UnicodeString[Audit Policy Change] Original Security Descriptor.
New_Security_Descriptor UnicodeString[Audit Policy Change] New Security Descriptor.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
OldSd UnicodeString[Audit Policy Change] Original Security Descriptor
NewSd UnicodeString[Audit Policy Change] New Security Descriptor

References #

Event ID 4716 — Trusted domain information was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

Trusted domain information was modified.

Message #

Trusted domain information was modified.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Trusted Domain:
	Domain Name: %5
	Domain ID: %6

New Trust Information:
	Trust Type: %7
	Trust Direction: %8
	Trust Attributes: %9
	SID Filtering: %10

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Domain_Name UnicodeString[Trusted Domain] Domain Name.
Domain_ID SID[Trusted Domain] Domain ID.
Trust_Type UInt32[New Trust Information] Trust Type.
Trust_Direction UInt32[New Trust Information] Trust Direction.
Trust_Attributes UInt32[New Trust Information] Trust Attributes.
SID_Filtering UnicodeString[New Trust Information] SID Filtering.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DomainName UnicodeString[Trusted Domain] Domain Name
DomainSid SID[Trusted Domain] Domain ID
TdoType UInt32[New Trust Information] Trust Type
TdoDirection UInt32[New Trust Information] Trust Direction
TdoAttributes UInt32[New Trust Information] Trust Attributes
SidFilteringEnabled UnicodeString[New Trust Information] SID Filtering

References #

Event ID 4717 — System security access was granted to an account.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

System security access was granted to an account.

Message #

System security access was granted to an account.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Account Modified:
	Account Name: %5

Access Granted:
	Access Right: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
TargetSid SID[Account Modified] Account Name.
AccessGranted UnicodeString[Access Granted] Access Right.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4717,
    "version": 0,
    "level": 0,
    "task": 13569,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T23:16:25.814727+00:00",
    "event_record_id": 71900,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 844
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "TargetSid": "S-1-5-83-0",
    "AccessGranted": "SeServiceLogonRight"
  },
  "message": ""
}

References #

Event ID 4718 — System security access was removed from an account.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

System security access was removed from an account.

Message #

System security access was removed from an account.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Account Modified:
	Account Name: %5

Access Removed:
	Access Right: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
TargetSid SID[Account Modified] Account Name.
AccessRemoved UnicodeString[Access Removed] Access Right.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4718,
    "version": 0,
    "level": 0,
    "task": 13569,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-07T16:44:47.045997+00:00",
    "event_record_id": 89,
    "correlation": {
      "ActivityID": "C1DC836A-4A9E-0000-8485-DCC19E4AD801"
    },
    "execution": {
      "process_id": 648,
      "thread_id": 700
    },
    "channel": "Security",
    "computer": "WIN-FPV0DSIC9O6",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "MINWINPC$",
    "SubjectDomainName": "",
    "SubjectLogonId": "0x3e7",
    "TargetSid": "S-1-5-90-0",
    "AccessRemoved": "SeInteractiveLogonRight"
  },
  "message": ""
}

References #

Event ID 4719 — System audit policy was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

System audit policy was changed.

Message #

System audit policy was changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Audit Policy Change:
	Category: %5
	Subcategory: %6
	Subcategory GUID: %7
	Changes: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
CategoryId UnicodeString[Audit Policy Change] Category.
Known values
%%8272
System
%%8273
Logon/Logoff
%%8274
Object Access
%%8275
Privilege Use
%%8276
Detailed Tracking
%%8277
Policy Change
%%8278
Account Management
%%8279
DS Access
%%8280
Account Logon
SubcategoryId UnicodeString[Audit Policy Change] Subcategory.
Known values
%%12288
Security State Change
%%12289
Security System Extension
%%12290
System Integrity
%%12291
IPsec Driver
%%12292
Other System Events
%%12544
Logon
%%12545
Logoff
%%12546
Account Lockout
%%12547
IPsec Main Mode
%%12548
Special Logon
%%12549
IPsec Quick Mode
%%12550
IPsec Extended Mode
%%12551
Other Logon/Logoff Events
%%12552
Network Policy Server
%%12553
User / Device Claims
%%12554
Group Membership
%%12800
File System
%%12801
Registry
%%12802
Kernel Object
%%12803
SAM
%%12804
Other Object Access Events
%%12805
Certification Services
%%12806
Application Generated
%%12807
Handle Manipulation
%%12808
File Share
%%12809
Filtering Platform Packet Drop
%%12810
Filtering Platform Connection
%%12811
Detailed File Share
%%12812
Removable Storage
%%12813
Central Policy Staging
%%13056
Sensitive Privilege Use
%%13057
Non Sensitive Privilege Use
%%13058
Other Privilege Use Events
%%13312
Process Creation
%%13313
Process Termination
%%13314
DPAPI Activity
%%13315
RPC Events
%%13316
Plug and Play Events
%%13317
Token Right Adjusted Events
%%13568
Audit Policy Change
%%13569
Authentication Policy Change
%%13570
Authorization Policy Change
%%13571
MPSSVC Rule-Level Policy Change
%%13572
Filtering Platform Policy Change
%%13573
Other Policy Change Events
%%13824
User Account Management
%%13825
Computer Account Management
%%13826
Security Group Management
%%13827
Distribution Group Management
%%13828
Application Group Management
%%13829
Other Account Management Events
%%14080
Directory Service Access
%%14081
Directory Service Changes
%%14082
Directory Service Replication
%%14083
Detailed Directory Service Replication
%%14336
Credential Validation
%%14337
Kerberos Service Ticket Operations
%%14338
Other Account Logon Events
%%14339
Kerberos Authentication Service
SubcategoryGuid GUID[Audit Policy Change] Subcategory GUID.
Known values
%%12288
Security State Change
%%12289
Security System Extension
%%12290
System Integrity
%%12291
IPsec Driver
%%12292
Other System Events
%%12544
Logon
%%12545
Logoff
%%12546
Account Lockout
%%12547
IPsec Main Mode
%%12548
Special Logon
%%12549
IPsec Quick Mode
%%12550
IPsec Extended Mode
%%12551
Other Logon/Logoff Events
%%12552
Network Policy Server
%%12553
User / Device Claims
%%12554
Group Membership
%%12800
File System
%%12801
Registry
%%12802
Kernel Object
%%12803
SAM
%%12804
Other Object Access Events
%%12805
Certification Services
%%12806
Application Generated
%%12807
Handle Manipulation
%%12808
File Share
%%12809
Filtering Platform Packet Drop
%%12810
Filtering Platform Connection
%%12811
Detailed File Share
%%12812
Removable Storage
%%12813
Central Policy Staging
%%13056
Sensitive Privilege Use
%%13057
Non Sensitive Privilege Use
%%13058
Other Privilege Use Events
%%13312
Process Creation
%%13313
Process Termination
%%13314
DPAPI Activity
%%13315
RPC Events
%%13316
Plug and Play Events
%%13317
Token Right Adjusted Events
%%13568
Audit Policy Change
%%13569
Authentication Policy Change
%%13570
Authorization Policy Change
%%13571
MPSSVC Rule-Level Policy Change
%%13572
Filtering Platform Policy Change
%%13573
Other Policy Change Events
%%13824
User Account Management
%%13825
Computer Account Management
%%13826
Security Group Management
%%13827
Distribution Group Management
%%13828
Application Group Management
%%13829
Other Account Management Events
%%14080
Directory Service Access
%%14081
Directory Service Changes
%%14082
Directory Service Replication
%%14083
Detailed Directory Service Replication
%%14336
Credential Validation
%%14337
Kerberos Service Ticket Operations
%%14338
Other Account Logon Events
%%14339
Kerberos Authentication Service
AuditPolicyChanges UnicodeString[Audit Policy Change] Changes.
Known values
%%8448
Success removed
%%8449
Success Added
%%8450
Failure removed
%%8451
Failure added
%%8452
Success include removed
%%8453
Success include added
%%8454
Success exclude removed
%%8455
Success exclude added
%%8456
Failure include removed
%%8457
Failure include added
%%8458
Failure exclude removed
%%8459
Failure exclude added
ClientProcessId UInt32
ClientProcessStartKey UInt64

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4719,
    "version": 1,
    "level": 0,
    "task": 13568,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T23:49:58.098445+00:00",
    "event_record_id": 112372,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 8228
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "CategoryId": "%%8279",
    "SubcategoryId": "%%14080",
    "SubcategoryGuid": "0CCE923B-69AE-11D9-BED3-505054503030",
    "AuditPolicyChanges": "%%8449, %%8451",
    "ClientProcessId": 8540,
    "ClientProcessStartKey": 3659174697239635
  },
  "message": ""
}

Community Notes #

System audit policy changed. Attackers often disable auditing to reduce detection.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Windows Event Auditing Disabled source low: Detects scenarios where system auditing (i.e.: Windows event log auditing) is disabled. This may be used in a scenario where an entity would want to bypass local logging to evade detection when Windows event logging is enabled and reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc". Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications - however, it is recommended to perform these modifications in Active Directory anyways.
  • Important Windows Event Auditing Disabled source high: Detects scenarios where system auditing for important events such as "Process Creation" or "Logon" events is disabled.

Elastic # view in reference

Splunk # view in reference

  • Windows AD Domain Controller Audit Policy Disabled source: The following analytic detects the disabling of audit policies on a domain controller. It leverages EventCode 4719 from Windows Security Event Logs to identify changes where success or failure auditing is removed. This activity is significant as it suggests an attacker may have gained access to the domain controller and is attempting to evade detection by tampering with audit policies. If confirmed malicious, this could lead to severe consequences, including data theft, privilege escalation, and full network compromise. Immediate investigation is required to determine the source and intent of the change.
  • Windows Important Audit Policy Disabled source: The following analytic detects the disabling of important audit policies. It leverages EventCode 4719 from Windows Security Event Logs to identify changes where success or failure auditing is removed. This activity is significant as it suggests an attacker may have gained access to the domain controller and is attempting to evade detection by tampering with audit policies. If confirmed malicious, this could lead to severe consequences, including data theft, privilege escalation, and full network compromise. Immediate investigation is required to determine the source and intent of the change.

References #

Event ID 4720 — A user account was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A user account was created.

Message #

A user account was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

New Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Attributes:
	SAM Account Name: %9
	Display Name: %10
	User Principal Name: %11
	Home Directory: %12
	Home Drive: %13
	Script Path: %14
	Profile Path: %15
	User Workstations: %16
	Password Last Set: %17
	Account Expires: %18
	Primary Group ID: %19
	Allowed To Delegate To: %20
	Old UAC Value: %21
	New UAC Value: %22
	User Account Control: %23
	User Parameters: %24
	SID History: %25
	Logon Hours: %26

Additional Information:
	Privileges		%8

Fields #

NameDescription
TargetUserName UnicodeString[New Account] Account Name.
TargetDomainName UnicodeString[New Account] Account Domain.
TargetSid SID[New Account] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name.
DisplayName UnicodeString[Attributes] Display Name.
UserPrincipalName UnicodeString[Attributes] User Principal Name.
HomeDirectory UnicodeString[Attributes] Home Directory.
HomePath UnicodeString[Attributes] Home Drive.
ScriptPath UnicodeString[Attributes] Script Path.
ProfilePath UnicodeString[Attributes] Profile Path.
UserWorkstations UnicodeString[Attributes] User Workstations.
PasswordLastSet UnicodeString[Attributes] Password Last Set.
AccountExpires UnicodeString[Attributes] Account Expires.
PrimaryGroupId UnicodeString[Attributes] Primary Group ID.
AllowedToDelegateTo UnicodeString[Attributes] Allowed To Delegate To.
OldUacValue UnicodeString[Attributes] Old UAC Value. UAC flags reference
NewUacValue UnicodeString[Attributes] New UAC Value. UAC flags reference
UserAccountControl UnicodeString[Attributes] User Account Control.
UserParameters UnicodeString[Attributes] User Parameters.
SidHistory UnicodeString[Attributes] SID History.
LogonHours UnicodeString[Attributes] Logon Hours.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4720,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:34.963101+00:00",
    "event_record_id": 2779,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "User",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "SamAccountName": "User",
    "DisplayName": "%%1793",
    "UserPrincipalName": "-",
    "HomeDirectory": "%%1793",
    "HomePath": "%%1793",
    "ScriptPath": "%%1793",
    "ProfilePath": "%%1793",
    "UserWorkstations": "%%1793",
    "PasswordLastSet": "%%1794",
    "AccountExpires": "%%1794",
    "PrimaryGroupId": "513",
    "AllowedToDelegateTo": "-",
    "OldUacValue": "0x0",
    "NewUacValue": "0x15",
    "UserAccountControl": "\r\n\t\t%%2080\r\n\t\t%%2082\r\n\t\t%%2084",
    "UserParameters": "%%1793",
    "SidHistory": "-",
    "LogonHours": "%%1797"
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Hidden Local User Creation source high: Detects the creation of a local hidden user account which should not happen for event ID 4720.
  • Suspicious Windows ANONYMOUS LOGON Local Account Created source high: Detects the creation of suspicious accounts similar to ANONYMOUS LOGON, such as using additional spaces. Created as an covering detection for exclusion of Logon Type 3 from ANONYMOUS LOGON accounts.
  • Local User Creation source low: Detects local user creation on Windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your Windows server logs and not on your DC logs.

Splunk # view in reference

  • Windows Create Local Account source: The following analytic detects the creation of a new local user account on a Windows system. It leverages Windows Security Audit logs, specifically event ID 4720, to identify this activity. Monitoring the creation of local accounts is crucial for a SOC as it can indicate unauthorized access or lateral movement within the network. If confirmed malicious, this activity could allow an attacker to establish persistence, escalate privileges, or gain unauthorized access to sensitive systems and data.

Kusto Query Language # view in reference

  • Fake computer account created source medium: 'This query detects domain user accounts creation (event ID 4720) where the username ends with $. Accounts that end with $ are normally domain computer accounts and when they are created the event ID 4741 is generated instead.'

References #

Event ID 4722 — A user account was enabled.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A user account was enabled.

Message #

A user account was enabled.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Fields #

NameDescription
TargetUserName UnicodeString[Target Account] Account Name.
TargetDomainName UnicodeString[Target Account] Account Domain.
TargetSid SID[Target Account] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4722,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:34.966226+00:00",
    "event_record_id": 2780,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "User",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4723 — An attempt was made to change an account's password.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An attempt was made to change an account's password.

Message #

An attempt was made to change an account's password.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Additional Information:
	Privileges		%8

Fields #

NameDescription
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4723,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2021-12-04T22:47:47.872773Z",
    "event_record_id": 233289145,
    "correlation": {
      "#attributes": {
        "ActivityID": "D96638DA-E4F9-0001-F038-66D9F9E4D701"
      }
    },
    "execution": {
      "process_id": 596,
      "thread_id": 3492
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "hacker2",
    "TargetDomainName": "OFFSEC",
    "TargetSid": "S-1-5-21-4230534742-2542757381-3142984815-1242",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x10e7c4430",
    "PrivilegeList": "-"
  }
}

Detection Patterns #

References #

Event ID 4724 — An attempt was made to reset an account's password.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An attempt was made to reset an account's password.

Message #

An attempt was made to reset an account's password.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Fields #

NameDescription
TargetUserName UnicodeString[Target Account] Account Name.
TargetDomainName UnicodeString[Target Account] Account Domain.
TargetSid SID[Target Account] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4724,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:35.054380+00:00",
    "event_record_id": 2787,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "User",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7"
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Multiple Account Passwords Changed source: The following analytic detects instances where more than five unique Windows account passwords are changed within a 10-minute interval. It leverages Event Code 4724 from the Windows Security Event Log, using the wineventlog_security dataset to monitor and count distinct TargetUserName values. This behavior is significant as rapid password changes across multiple accounts are unusual and may indicate unauthorized access or internal compromise. If confirmed malicious, this activity could lead to widespread account compromise, unauthorized access to sensitive information, and potential disruption of services.

References #

Event ID 4725 — A user account was disabled.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A user account was disabled.

Message #

A user account was disabled.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Fields #

NameDescription
TargetUserName UnicodeString[Target Account] Account Name.
TargetDomainName UnicodeString[Target Account] Account Domain.
TargetSid SID[Target Account] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4725,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-10-25T22:53:19.612560+00:00",
    "event_record_id": 2634,
    "correlation": {
      "ActivityID": "D5BBEBF4-0795-0001-A8EC-BBD59507DA01"
    },
    "execution": {
      "process_id": 824,
      "thread_id": 880
    },
    "channel": "Security",
    "computer": "WinDevEval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Administrator",
    "TargetDomainName": "WINDEVEVAL",
    "TargetSid": "S-1-5-21-2533829718-189860685-2477588761-500",
    "SubjectUserSid": "S-1-5-21-2533829718-189860685-2477588761-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "WINDEVEVAL",
    "SubjectLogonId": "0x42eea"
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Multiple Accounts Disabled source: The following analytic identifies instances where more than five unique Windows accounts are disabled within a 10-minute window, as indicated by Event Code 4725 in the Windows Security Event Log. It leverages the wineventlog_security dataset, grouping data into 10-minute segments and tracking the count and distinct count of TargetUserName. This behavior is significant as it may indicate internal policy breaches or an external attacker's attempt to disrupt operations. If confirmed malicious, this activity could lead to widespread account lockouts, hindering user access and potentially disrupting business operations.

References #

Event ID 4726 — A user account was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A user account was deleted.

Message #

A user account was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Additional Information:
	Privileges	%8

Fields #

NameDescription
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4726,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-01-24T17:03:25.009874Z",
    "event_record_id": 1934526,
    "correlation": {},
    "execution": {
      "process_id": 480,
      "thread_id": 1496
    },
    "channel": "Security",
    "computer": "fs03vuln.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "3teamssixf$",
    "TargetDomainName": "FS03VULN",
    "TargetSid": "S-1-5-21-2721507831-1374043488-2540227515-1008",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x14f509e2",
    "PrivilegeList": "-"
  }
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Multiple Accounts Deleted source: The following analytic detects the deletion of more than five unique Windows accounts within a 10-minute period, using Event Code 4726 from the Windows Security Event Log. It leverages the `wineventlog_security` dataset, segmenting data into 10-minute intervals to identify suspicious account deletions. This activity is significant as it may indicate an attacker attempting to erase traces of their actions. If confirmed malicious, this could lead to unauthorized access removal, hindering incident response and forensic investigations.

References #

Event ID 4727 — A security-enabled global group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled global group was created.

Message #

A security-enabled global group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

New Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[New Group] Group Name.
TargetDomainName UnicodeString[New Group] Group Domain.
TargetSid SID[New Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name.
SidHistory UnicodeString[Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4727,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-07T16:44:41.241410+00:00",
    "event_record_id": 51,
    "correlation": {
      "ActivityID": "C1DC836A-4A9E-0000-8485-DCC19E4AD801"
    },
    "execution": {
      "process_id": 648,
      "thread_id": 652
    },
    "channel": "Security",
    "computer": "WIN-FPV0DSIC9O6",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Storage Replica Administrators",
    "TargetDomainName": "Builtin",
    "TargetSid": "S-1-5-32-582",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "MINWINPC$",
    "SubjectDomainName": "",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "SamAccountName": "Storage Replica Administrators",
    "SidHistory": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4728 — A member was added to a security-enabled global group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A member was added to a security-enabled global group.

Message #

A member was added to a security-enabled global group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
MemberName UnicodeString[Member] Account Name.
MemberSid SID[Member] Security ID.
TargetUserName UnicodeString[Group] Group Name.
TargetDomainName UnicodeString[Group] Group Domain.
TargetSid SID[Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4728,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:34.961043+00:00",
    "event_record_id": 2778,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "MemberName": "-",
    "MemberSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "TargetUserName": "None",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-513",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Member added to security-enabled global group. May indicate domain-level privilege escalation, ie membership in Domain Admins.

Detection Rules #

View all rules referencing this event →

Elastic # view in reference

  • Active Directory Group Modification by SYSTEM source medium: Identifies a user being added to an active directory group by the SYSTEM (S-1-5-18) user. This behavior can indicate that the attacker has achieved SYSTEM privileges in a domain controller, which attackers can obtain by exploiting vulnerabilities or abusing default group privileges (e.g., Server Operators), and is attempting to pivot to a domain account.

Splunk # view in reference

  • Windows AD add Self to Group source: This analytic detects instances where a user adds themselves to an Active Directory (AD) group. This activity is a common indicator of privilege escalation, where a user attempts to gain unauthorized access to higher privileges or sensitive resources. By monitoring AD logs, this detection identifies such suspicious behavior, which could be part of a larger attack strategy aimed at compromising critical systems and data.
  • Windows AD Privileged Group Modification source: This detection identifies when users are added to privileged Active Directory groups by leveraging the Windows Security Event Code 4728 along with a lookup of privileged AD groups provided by Splunk Enterprise Security. Attackers often add user accounts to privileged AD groups to escalate privileges or maintain persistence within an Active Directory environment. Monitoring for modifications to privileged groups can help identify potential security breaches and unauthorized access attempts.

References #

Event ID 4729 — A member was removed from a security-enabled global group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A member was removed from a security-enabled global group.

Message #

A member was removed from a security-enabled global group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4729,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-01-24T17:03:25.009874Z",
    "event_record_id": 1934525,
    "correlation": {},
    "execution": {
      "process_id": 480,
      "thread_id": 1496
    },
    "channel": "Security",
    "computer": "fs03vuln.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "MemberName": "-",
    "MemberSid": "S-1-5-21-2721507831-1374043488-2540227515-1008",
    "TargetUserName": "None",
    "TargetDomainName": "FS03VULN",
    "TargetSid": "S-1-5-21-2721507831-1374043488-2540227515-513",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x14f509e2",
    "PrivilegeList": "-"
  }
}

Detection Patterns #

Community Notes #

A member was removed from a security-enabled global group, may be an effort to slow IR or clean-up after escalation. Security-enabled local group changed, indicates changes to local Administrators or Remote Desktop Users.

References #

Event ID 4730 — A security-enabled global group was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled global group was deleted.

Message #

A security-enabled global group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Deleted Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Deleted Group] Group Name
TargetDomainName UnicodeString[Deleted Group] Group Domain
TargetSid SID[Deleted Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Group_Name UnicodeString[Deleted Group] Group Name.
Group_Domain UnicodeString[Deleted Group] Group Domain.
Security_ID SID[Deleted Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4730,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:14.140561+00:00",
    "event_record_id": 16240240,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 6288
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "evtgen_global",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1118",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4731 — A security-enabled local group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A security-enabled local group was created.

Message #

A security-enabled local group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

New Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[New Group] Group Name.
TargetDomainName UnicodeString[New Group] Group Domain.
TargetSid SID[New Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name.
SidHistory UnicodeString[Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4731,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-07T16:44:41.241162+00:00",
    "event_record_id": 49,
    "correlation": {
      "ActivityID": "C1DC836A-4A9E-0000-8485-DCC19E4AD801"
    },
    "execution": {
      "process_id": 648,
      "thread_id": 652
    },
    "channel": "Security",
    "computer": "WIN-FPV0DSIC9O6",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Remote Management Users",
    "TargetDomainName": "Builtin",
    "TargetSid": "S-1-5-32-580",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "MINWINPC$",
    "SubjectDomainName": "",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "SamAccountName": "Remote Management Users",
    "SidHistory": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4732 — A member was added to a security-enabled local group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A member was added to a security-enabled local group.

Message #

A member was added to a security-enabled local group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
MemberName UnicodeString[Member] Account Name.
MemberSid SID[Member] Security ID.
TargetUserName UnicodeString[Group] Group Name.
TargetDomainName UnicodeString[Group] Group Domain.
TargetSid SID[Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4732,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:35.063652+00:00",
    "event_record_id": 2788,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "MemberName": "-",
    "MemberSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "TargetUserName": "Administrators",
    "TargetDomainName": "Builtin",
    "TargetSid": "S-1-5-32-544",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-"
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Splunk # view in reference

  • Windows DnsAdmins New Member Added source: The following analytic detects the addition of a new member to the DnsAdmins group in Active Directory by leveraging Event ID 4732. This detection uses security event logs to identify changes to this high-privilege group. Monitoring this activity is crucial because members of the DnsAdmins group can manage the DNS service, often running on Domain Controllers, and potentially execute malicious code with SYSTEM privileges. If confirmed malicious, this activity could allow an attacker to escalate privileges and gain control over critical domain services, posing a significant security risk.

References #

Event ID 4733 — A member was removed from a security-enabled local group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

A member was removed from a security-enabled local group.

Message #

A member was removed from a security-enabled local group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4733,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2013-10-23T16:22:40.036000Z",
    "event_record_id": 117,
    "correlation": {},
    "execution": {
      "process_id": 508,
      "thread_id": 1032
    },
    "channel": "Security",
    "computer": "IE8Win7",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "MemberName": "-",
    "MemberSid": "S-1-5-21-3463664321-2923530833-3546627382-1000",
    "TargetUserName": "Users",
    "TargetDomainName": "Builtin",
    "TargetSid": "S-1-5-32-545",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-QALA5Q3KJ43$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-"
  }
}

Detection Patterns #

References #

Event ID 4734 — A security-enabled local group was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled local group was deleted.

Message #

A security-enabled local group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4734,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:14.168517+00:00",
    "event_record_id": 16240246,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 1756
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "evtgen_domlocal",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1119",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4735 — A security-enabled local group was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A security-enabled local group was changed.

Message #

A security-enabled local group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Changed Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name.
TargetDomainName UnicodeString[Group] Group Domain.
TargetSid SID[Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference
SamAccountName UnicodeString[Changed Attributes] SAM Account Name.
SidHistory UnicodeString[Changed Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4735,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:37.334332+00:00",
    "event_record_id": 2847,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Device Owners",
    "TargetDomainName": "Builtin",
    "TargetSid": "S-1-5-32-583",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "SamAccountName": "Device Owners",
    "SidHistory": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4737 — A security-enabled global group was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled global group was changed.

Message #

A security-enabled global group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Changed Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name.
TargetDomainName UnicodeString[Group] Group Domain.
TargetSid SID[Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference
SamAccountName UnicodeString[Changed Attributes] SAM Account Name.
SidHistory UnicodeString[Changed Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4737,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:37.340456+00:00",
    "event_record_id": 2858,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "None",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-513",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "SamAccountName": "None",
    "SidHistory": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4738 — A user account was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A user account was changed.

Message #

A user account was changed.

Subject:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Target Account:
	Security ID: %4
	Account Name: %2
	Account Domain: %3

Changed Attributes:
	SAM Account Name: %10
	Display Name: %11
	User Principal Name: %12
	Home Directory: %13
	Home Drive: %14
	Script Path: %15
	Profile Path: %16
	User Workstations: %17
	Password Last Set: %18
	Account Expires: %19
	Primary Group ID: %20
	AllowedToDelegateTo: %21
	Old UAC Value: %22
	New UAC Value: %23
	User Account Control: %24
	User Parameters: %25
	SID History: %26
	Logon Hours: %27

Additional Information:
	Privileges: %9

Fields #

NameDescription
Dummy UnicodeString
TargetUserName UnicodeString[Target Account] Account Name.
TargetDomainName UnicodeString[Target Account] Account Domain.
TargetSid SID[Target Account] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference
SamAccountName UnicodeString[Changed Attributes] SAM Account Name.
DisplayName UnicodeString[Changed Attributes] Display Name.
UserPrincipalName UnicodeString[Changed Attributes] User Principal Name.
HomeDirectory UnicodeString[Changed Attributes] Home Directory.
HomePath UnicodeString[Changed Attributes] Home Drive.
ScriptPath UnicodeString[Changed Attributes] Script Path.
ProfilePath UnicodeString[Changed Attributes] Profile Path.
UserWorkstations UnicodeString[Changed Attributes] User Workstations.
PasswordLastSet UnicodeString[Changed Attributes] Password Last Set.
AccountExpires UnicodeString[Changed Attributes] Account Expires.
PrimaryGroupId UnicodeString[Changed Attributes] Primary Group ID.
AllowedToDelegateTo UnicodeString[Changed Attributes] AllowedToDelegateTo.
OldUacValue UnicodeString[Changed Attributes] Old UAC Value. UAC flags reference
NewUacValue UnicodeString[Changed Attributes] New UAC Value. UAC flags reference
UserAccountControl UnicodeString[Changed Attributes] User Account Control.
UserParameters UnicodeString[Changed Attributes] User Parameters.
SidHistory UnicodeString[Changed Attributes] SID History.
LogonHours UnicodeString[Changed Attributes] Logon Hours.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4738,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:37.339747+00:00",
    "event_record_id": 2855,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "Dummy": "-",
    "TargetUserName": "WDAGUtilityAccount",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-504",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "SamAccountName": "WDAGUtilityAccount",
    "DisplayName": "%%1793",
    "UserPrincipalName": "-",
    "HomeDirectory": "%%1793",
    "HomePath": "%%1793",
    "ScriptPath": "%%1793",
    "ProfilePath": "%%1793",
    "UserWorkstations": "%%1793",
    "PasswordLastSet": "10/25/2023 8:16:53 PM",
    "AccountExpires": "%%1794",
    "PrimaryGroupId": "513",
    "AllowedToDelegateTo": "-",
    "OldUacValue": "0x11",
    "NewUacValue": "0x11",
    "UserAccountControl": "-",
    "UserParameters": "%%1793",
    "SidHistory": "-",
    "LogonHours": "%%1797"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

User account changed, may capture priv-esc, password changes, or UAC flag changes.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Elastic # view in reference

  • Kerberos Pre-authentication Disabled for User source medium: Identifies the modification of an account's Kerberos pre-authentication options. An adversary with GenericWrite/GenericAll rights over the account can maliciously modify these settings to perform offline password cracking attacks such as AS-REP roasting.
  • KRBTGT Delegation Backdoor source high: Identifies the modification of the msDS-AllowedToDelegateTo attribute to KRBTGT. Attackers can use this technique to maintain persistence to the domain by having the ability to request tickets for the KRBTGT service.

Splunk # view in reference

  • Kerberos Pre-Authentication Flag Disabled in UserAccountControl source: The following analytic detects when the Kerberos Pre-Authentication flag is disabled in a user account, using Windows Security Event 4738. This event indicates a change in the UserAccountControl property of a domain user object. Disabling this flag allows adversaries to perform offline brute force attacks on the user's password using the AS-REP Roasting technique. This activity is significant as it can be used by attackers with existing privileges to escalate their access or maintain persistence. If confirmed malicious, this could lead to unauthorized access and potential compromise of sensitive information.

Kusto Query Language # view in reference

  • AD account with Don't Expire Password source low: 'Identifies whenever a user account has the setting "Password Never Expires" in the user account properties selected. This is indicated in Security event 4738 in the EventData item labeled UserAccountControl with an included value of %%2089. %%2089 resolves to "Don't Expire Password - Enabled".'

References #

Event ID 4739 — Domain Policy was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Domain Policy was changed.

Message #

Domain Policy was changed.

Change Type: %1 modified

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Domain:
	Domain Name: %2
	Domain ID: %3

Changed Attributes:
	Min. Password Age: %9
	Max. Password Age: %10
	Force Logoff: %11
	Lockout Threshold: %12
	Lockout Observation Window: %13
	Lockout Duration: %14
	Password Properties: %15
	Min. Password Length: %16
	Password History Length: %17
	Machine Account Quota: %18
	Mixed Domain Mode: %19
	Domain Behavior Version: %20
	OEM Information: %21

Additional Information:
	Privileges: %8

Fields #

NameDescription
DomainPolicyChanged UnicodeStringChange Type.
DomainName UnicodeString[Domain] Domain Name.
DomainSid SID[Domain] Domain ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference
MinPasswordAge UnicodeString[Changed Attributes] Min. Password Age.
MaxPasswordAge UnicodeString[Changed Attributes] Max. Password Age.
ForceLogoff UnicodeString[Changed Attributes] Force Logoff.
LockoutThreshold UnicodeString[Changed Attributes] Lockout Threshold.
LockoutObservationWindow UnicodeString[Changed Attributes] Lockout Observation Window.
LockoutDuration UnicodeString[Changed Attributes] Lockout Duration.
PasswordProperties UnicodeString[Changed Attributes] Password Properties.
MinPasswordLength UnicodeString[Changed Attributes] Min. Password Length.
PasswordHistoryLength UnicodeString[Changed Attributes] Password History Length.
MachineAccountQuota UnicodeString[Changed Attributes] Machine Account Quota.
MixedDomainMode UnicodeString[Changed Attributes] Mixed Domain Mode.
DomainBehaviorVersion UnicodeString[Changed Attributes] Domain Behavior Version.
OemInformation UnicodeString[Changed Attributes] OEM Information.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4739,
    "version": 0,
    "level": 0,
    "task": 13569,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:34.991613+00:00",
    "event_record_id": 2783,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "DomainPolicyChanged": "Password Policy",
    "DomainName": "WINDEV2310EVAL",
    "DomainSid": "S-1-5-21-1992711665-1655669231-58201500",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-",
    "MinPasswordAge": "ퟏ~",
    "MaxPasswordAge": "ퟏ~",
    "ForceLogoff": "-",
    "LockoutThreshold": "-",
    "LockoutObservationWindow": "-",
    "LockoutDuration": "-",
    "PasswordProperties": "8",
    "MinPasswordLength": "0",
    "PasswordHistoryLength": "0",
    "MachineAccountQuota": "-",
    "MixedDomainMode": "-",
    "DomainBehaviorVersion": "-",
    "OemInformation": "-"
  },
  "message": ""
}

Community Notes #

Attackers with Domain Admin may weaken password/lockout requirements to speed credential attacks. May precede password spraying or Kerberos ticket forgery. Pair with 4768 and 4771. Also a prelude to DCShadow or other directory-level attacks.

References #

Event ID 4740 — A user account was locked out.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A user account was locked out.

Message #

A user account was locked out.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Account That Was Locked Out:
	Security ID: %3
	Account Name: %1

Additional Information:
	Caller Computer Name: %2

Fields #

NameDescription
TargetUserName UnicodeString[Account That Was Locked Out] Account Name
TargetDomainName UnicodeString[Additional Information] Caller Computer Name
TargetSid SID[Account That Was Locked Out] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
Account_Name UnicodeString[Account That Was Locked Out] Account Name.
Caller_Computer_Name UnicodeString[Additional Information] Caller Computer Name.
Security_ID SID[Account That Was Locked Out] Security ID.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4740,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:03:33.513406+00:00",
    "event_record_id": 16594636,
    "correlation": {},
    "execution": {
      "process_id": 936,
      "thread_id": 10928
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "KrbTestLockout",
    "TargetDomainName": "LAB-DC01",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1268",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "LAB-DC01$",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0x3e7"
  },
  "message": ""
}

Community Notes #

Pair with 4625 and related IPs during investigation. Review Caller_Computer_Name.

References #

Event ID 4741 — A computer account was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Computer Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A computer account was created.

Message #

A computer account was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

New Computer Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Attributes:
	SAM Account Name: %9
	Display Name: %10
	User Principal Name: %11
	Home Directory: %12
	Home Drive: %13
	Script Path: %14
	Profile Path: %15
	User Workstations: %16
	Password Last Set: %17
	Account Expires: %18
	Primary Group ID: %19
	AllowedToDelegateTo: %20
	Old UAC Value: %21
	New UAC Value: %22
	User Account Control: %23
	User Parameters: %24
	SID History: %25
	Logon Hours: %26
	DNS Host Name: %27
	Service Principal Names: %28

Additional Information:
	Privileges		%8

Fields #

NameDescription
Account_Name[New Computer Account] Account Name.
Account_Domain[New Computer Account] Account Domain.
Security_ID[New Computer Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
SAM_Account_Name
Display_Name[Attributes] SAM Account Name.
User_Principal_Name[Attributes] Display Name.
Home_Directory[Attributes] User Principal Name.
Home_Drive[Attributes] Home Directory.
Script_Path[Attributes] Home Drive.
Profile_Path[Attributes] Script Path.
User_Workstations[Attributes] Profile Path.
Password_Last_Set[Attributes] User Workstations.
Account_Expires[Attributes] Password Last Set.
Primary_Group_ID[Attributes] Account Expires.
AllowedToDelegateTo UnicodeString[Attributes] Primary Group ID.
Old_UAC_Value[Attributes] AllowedToDelegateTo. UAC flags reference
New_UAC_Value[Attributes] Old UAC Value. UAC flags reference
User_Account_Control[Attributes] New UAC Value.
User_Parameters[Attributes] User Account Control.
SID_History[Attributes] User Parameters.
Logon_Hours[Attributes] SID History.
DNS_Host_Name[Attributes] Logon Hours.
Service_Principal_Names[Attributes] DNS Host Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4741,
    "version": 0,
    "level": 0,
    "task": 13825,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-12-12T17:57:52.313673Z",
    "event_record_id": 2982085,
    "correlation": {},
    "execution": {
      "process_id": 624,
      "thread_id": 3652
    },
    "channel": "Security",
    "computer": "01566s-win16-ir.threebeesco.com",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "DC012$",
    "TargetDomainName": "3B",
    "TargetSid": "S-1-5-21-308926384-506822093-3341789130-220105",
    "SubjectUserSid": "S-1-5-21-308926384-506822093-3341789130-101606",
    "SubjectUserName": "labuser",
    "SubjectDomainName": "3B",
    "SubjectLogonId": "0x738ae4",
    "PrivilegeList": "-",
    "SamAccountName": "DC012$",
    "DisplayName": "-",
    "UserPrincipalName": "-",
    "HomeDirectory": "-",
    "HomePath": "-",
    "ScriptPath": "-",
    "ProfilePath": "-",
    "UserWorkstations": "-",
    "PasswordLastSet": "12/12/2021 9:57:52 AM",
    "AccountExpires": "%%1794",
    "PrimaryGroupId": "515",
    "AllowedToDelegateTo": "-",
    "OldUacValue": "0x0",
    "NewUacValue": "0x80",
    "UserAccountControl": "\r\n\t\t%%2087",
    "UserParameters": "-",
    "SidHistory": "-",
    "LogonHours": "%%1793",
    "DnsHostName": "DC012.threebeesco.com",
    "ServicePrincipalNames": "\r\n\t\tHOST/DC012.threebeesco.com\r\n\t\tRestrictedKrbHost/DC012.threebeesco.com\r\n\t\tHOST/DC012\r\n\t\tRestrictedKrbHost/DC012"
  }
}

Detection Patterns #

Community Notes #

May alert on golden ticket style attacks.

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Computer Account Created by Computer Account source: The following analytic identifies a computer account creating a new computer account with a specific Service Principal Name (SPN) "RestrictedKrbHost". This detection leverages Windows Security Event Logs, specifically EventCode 4741, to identify such activities. This behavior is significant as it may indicate an attempt to establish unauthorized Kerberos authentication channels, potentially leading to lateral movement or privilege escalation. If confirmed malicious, this activity could allow an attacker to impersonate services, access sensitive information, or maintain persistence within the network.
  • Windows Computer Account With SPN source: The following analytic detects the addition of Service Principal Names (SPNs) HOST and RestrictedKrbHost to a computer account, indicative of KrbRelayUp behavior. This detection leverages Windows Security Event Logs, specifically EventCode 4741, to identify changes in SPNs. This activity is significant as it is commonly associated with Kerberos-based attacks, which can be used to escalate privileges or perform lateral movement within a network. If confirmed malicious, this behavior could allow an attacker to impersonate services, potentially leading to unauthorized access to sensitive resources.

References #

Event ID 4742 — A computer account was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Computer Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A computer account was changed.

Message #

A computer account was changed.

Subject:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Computer Account That Was Changed:
	Security ID: %4
	Account Name: %2
	Account Domain: %3

Changed Attributes:
	SAM Account Name: %10
	Display Name: %11
	User Principal Name: %12
	Home Directory: %13
	Home Drive: %14
	Script Path: %15
	Profile Path: %16
	User Workstations: %17
	Password Last Set: %18
	Account Expires: %19
	Primary Group ID: %20
	AllowedToDelegateTo: %21
	Old UAC Value: %22
	New UAC Value: %23
	User Account Control: %24
	User Parameters: %25
	SID History: %26
	Logon Hours: %27
	DNS Host Name: %28
	Service Principal Names: %29

Additional Information:
	Privileges: %9

Fields #

NameDescription
Account_Name
Account_Domain[Computer Account That Was Changed] Account Name.
Security_ID[Computer Account That Was Changed] Account Domain.
Security_ID[Computer Account That Was Changed] Security ID.
Account_Name[Subject] Security ID.
Account_Domain[Subject] Account Name.
Logon_ID[Subject] Account Domain.
Privileges[Subject] Logon ID. Privilege constants reference
SAM_Account_Name[Additional Information] Privileges.
Display_Name[Changed Attributes] SAM Account Name.
User_Principal_Name[Changed Attributes] Display Name.
Home_Directory[Changed Attributes] User Principal Name.
Home_Drive[Changed Attributes] Home Directory.
Script_Path[Changed Attributes] Home Drive.
Profile_Path[Changed Attributes] Script Path.
User_Workstations[Changed Attributes] Profile Path.
Password_Last_Set[Changed Attributes] User Workstations.
Account_Expires[Changed Attributes] Password Last Set.
Primary_Group_ID[Changed Attributes] Account Expires.
AllowedToDelegateTo UnicodeString[Changed Attributes] Primary Group ID.
Old_UAC_Value[Changed Attributes] AllowedToDelegateTo. UAC flags reference
New_UAC_Value[Changed Attributes] Old UAC Value. UAC flags reference
User_Account_Control[Changed Attributes] New UAC Value.
User_Parameters[Changed Attributes] User Account Control.
SID_History[Changed Attributes] User Parameters.
Logon_Hours[Changed Attributes] SID History.
DNS_Host_Name[Changed Attributes] Logon Hours.
Service_Principal_Names[Changed Attributes] DNS Host Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4742,
    "version": 0,
    "level": 0,
    "task": 13825,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-25T13:01:41.935605Z",
    "event_record_id": 198239294,
    "correlation": {},
    "execution": {
      "process_id": 444,
      "thread_id": 3948
    },
    "channel": "Security",
    "computer": "DC1.insecurebank.local",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ComputerAccountChange": "-",
    "TargetUserName": "CLIENT01$",
    "TargetDomainName": "insecurebank",
    "TargetSid": "S-1-5-21-738609754-2819869699-4189121830-1120",
    "SubjectUserSid": "S-1-5-21-738609754-2819869699-4189121830-1108",
    "SubjectUserName": "bob",
    "SubjectDomainName": "insecurebank",
    "SubjectLogonId": "0x3d8e8db",
    "PrivilegeList": "-",
    "SamAccountName": "-",
    "DisplayName": "-",
    "UserPrincipalName": "-",
    "HomeDirectory": "-",
    "HomePath": "-",
    "ScriptPath": "-",
    "ProfilePath": "-",
    "UserWorkstations": "-",
    "PasswordLastSet": "-",
    "AccountExpires": "-",
    "PrimaryGroupId": "-",
    "AllowedToDelegateTo": "-",
    "OldUacValue": "-",
    "NewUacValue": "-",
    "UserAccountControl": "-",
    "UserParameters": "-",
    "SidHistory": "-",
    "LogonHours": "-",
    "DnsHostName": "-",
    "ServicePrincipalNames": "-"
  }
}

Detection Patterns #

Defense Evasion: Rogue Domain Controller

1 rule

Sigma

Ilyas Ochkov, oscd.community, Chakib Gzenayi (@Chak092), Hosni Mribah

Detection Rules #

View all rules referencing this event →

Elastic # view in reference

  • Remote Computer Account DnsHostName Update source high: Identifies the remote update to a computer account's DnsHostName attribute. If the new value set is a valid domain controller DNS hostname and the subject computer name is not a domain controller, then it's highly likely a preparation step to exploit CVE-2022-26923 in an attempt to elevate privileges from a standard domain user to domain admin privileges.

Splunk # view in reference

  • Detect Computer Changed with Anonymous Account source: The following analytic detects changes to computer accounts using an anonymous logon. It leverages Windows Security Event Codes 4742 (Computer Change) with a SubjectUserName of a value "ANONYMOUS LOGON". This activity can be significant because anonymous logons should not typically be modifying computer accounts, indicating potential unauthorized access or misconfiguration. If confirmed malicious, this could allow an attacker to alter computer accounts, potentially leading to privilege escalation or persistent access within the network.
  • Windows AD Domain Controller Promotion source: The following analytic identifies a genuine Domain Controller (DC) promotion event by detecting when a computer assigns itself the necessary Service Principal Names (SPNs) to function as a domain controller. It leverages Windows Security Event Code 4742 to monitor existing domain controllers for these changes. This activity is significant as it can help identify rogue DCs added to the network, which could indicate a DCShadow attack. If confirmed malicious, this could allow an attacker to manipulate Active Directory, leading to potential privilege escalation and persistent access within the environment.

References #

Event ID 4743 — A computer account was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Computer Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A computer account was deleted.

Message #

A computer account was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Computer:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name[Target Computer] Account Name.
Account_Domain[Target Computer] Account Domain.
Security_ID[Target Computer] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4743,
    "version": 0,
    "level": 0,
    "task": 13825,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-12T19:36:44.227880Z",
    "event_record_id": 16334944,
    "correlation": {},
    "execution": {
      "process_id": 528,
      "thread_id": 3156
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "YOURPC$",
    "TargetDomainName": "OFFSEC",
    "TargetSid": "S-1-5-21-4230534742-2542757381-3142984815-1167",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1158",
    "SubjectUserName": "lambda-user",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x87e482b",
    "PrivilegeList": "-"
  }
}

Detection Patterns #

References #

Event ID 4744 — A security-disabled local group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A security-disabled local group was created.

Message #

A security-disabled local group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

New Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Group_Name UnicodeString[New Group] Group Name.
Group_Domain UnicodeString[New Group] Group Domain.
Security_ID SID[New Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.
TargetUserName UnicodeString[New Group] Group Name
TargetDomainName UnicodeString[New Group] Group Domain
TargetSid SID[New Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History

Detection Patterns #

References #

Event ID 4745 — A security-disabled local group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A security-disabled local group was changed.

Message #

A security-disabled local group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Changed Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Changed Attributes] SAM Account Name.
SID_History UnicodeString[Changed Attributes] SID History.
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Changed Attributes] SAM Account Name
SidHistory UnicodeString[Changed Attributes] SID History

References #

Event ID 4746 — A member was added to a security-disabled local group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A member was added to a security-disabled local group.

Message #

A member was added to a security-disabled local group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
MembershipExpirationTime FILETIMEExpiration time

References #

Event ID 4747 — A member was removed from a security-disabled local group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A member was removed from a security-disabled local group.

Message #

A member was removed from a security-disabled local group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name UnicodeString[Member] Account Name.
Security_ID SID[Member] Security ID.
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4748 — A security-disabled local group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A security-disabled local group was deleted.

Message #

A security-disabled local group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4749 — A security-disabled global group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A security-disabled global group was created.

Message #

A security-disabled global group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4749,
    "version": 0,
    "level": 0,
    "task": 13827,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:04.301935+00:00",
    "event_record_id": 16239926,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 6292
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "evtgen_distro",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1121",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-",
    "SamAccountName": "evtgen_distro",
    "SidHistory": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4750 — A security-disabled global group was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A security-disabled global group was changed.

Message #

A security-disabled global group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Changed Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Changed Attributes] SAM Account Name
SidHistory UnicodeString[Changed Attributes] SID History
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Changed Attributes] SAM Account Name.
SID_History UnicodeString[Changed Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4750,
    "version": 0,
    "level": 0,
    "task": 13827,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:45.668811+00:00",
    "event_record_id": 16619490,
    "correlation": {},
    "execution": {
      "process_id": 936,
      "thread_id": 7768
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "TestAuditGroup_Distribution",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1287",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec",
    "PrivilegeList": "-",
    "SamAccountName": "-",
    "SidHistory": "-"
  },
  "message": ""
}

References #

Event ID 4751 — A member was added to a security-disabled global group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A member was added to a security-disabled global group.

Message #

A member was added to a security-disabled global group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference
MembershipExpirationTime FILETIMEExpiration time

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4751,
    "version": 0,
    "level": 0,
    "task": 13827,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:45.668821+00:00",
    "event_record_id": 16619491,
    "correlation": {},
    "execution": {
      "process_id": 936,
      "thread_id": 7768
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "MemberName": "CN=testaudit1,CN=Users,DC=ludus,DC=domain",
    "MemberSid": "S-1-5-21-1006758700-2167138679-1475694448-1290",
    "TargetUserName": "TestAuditGroup_Distribution",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1287",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec",
    "PrivilegeList": "-"
  },
  "message": ""
}

References #

Event ID 4752 — A member was removed from a security-disabled global group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A member was removed from a security-disabled global group.

Message #

A member was removed from a security-disabled global group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Account_Name UnicodeString[Member] Account Name.
Security_ID SID[Member] Security ID.
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4752,
    "version": 0,
    "level": 0,
    "task": 13827,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:46.319360+00:00",
    "event_record_id": 16619502,
    "correlation": {},
    "execution": {
      "process_id": 936,
      "thread_id": 3104
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "MemberName": "CN=testaudit1,CN=Users,DC=ludus,DC=domain",
    "MemberSid": "S-1-5-21-1006758700-2167138679-1475694448-1290",
    "TargetUserName": "TestAuditGroup_Distribution",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1287",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec",
    "PrivilegeList": "-"
  },
  "message": ""
}

References #

Event ID 4753 — A security-disabled global group was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A security-disabled global group was deleted.

Message #

A security-disabled global group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4753,
    "version": 0,
    "level": 0,
    "task": 13827,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:24:00.966756+00:00",
    "event_record_id": 16290238,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 7132
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "TestDistGroup",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1132",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-"
  },
  "message": ""
}

References #

Event ID 4754 — A security-enabled universal group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled universal group was created.

Message #

A security-enabled universal group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4754,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:04.236865+00:00",
    "event_record_id": 16239922,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 1756
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "evtgen_universal",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1120",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-",
    "SamAccountName": "evtgen_universal",
    "SidHistory": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4755 — A security-enabled universal group was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled universal group was changed.

Message #

A security-enabled universal group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Changed Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Changed Attributes] SAM Account Name
SidHistory UnicodeString[Changed Attributes] SID History
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Changed Attributes] SAM Account Name.
SID_History UnicodeString[Changed Attributes] SID History.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4755,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:04.432295+00:00",
    "event_record_id": 16239937,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 6292
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "evtgen_universal",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1120",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-",
    "SamAccountName": "-",
    "SidHistory": "-"
  },
  "message": ""
}

References #

Event ID 4756 — A member was added to a security-enabled universal group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A member was added to a security-enabled universal group.

Message #

A member was added to a security-enabled universal group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Account Name: %3
	Account Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Account_Name[Group] Account Name.
Account_Domain[Group] Account Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4756,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-12T06:01:13.765572Z",
    "event_record_id": 16088267,
    "correlation": {},
    "execution": {
      "process_id": 528,
      "thread_id": 3156
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "MemberName": "CN=honey-pot1,OU=Test-OU,OU=OFFSEC-COMPANY,DC=offsec,DC=lan",
    "MemberSid": "S-1-5-21-4230534742-2542757381-3142984815-1159",
    "TargetUserName": "Enterprise Admins",
    "TargetDomainName": "OFFSEC",
    "TargetSid": "S-1-5-21-4230534742-2542757381-3142984815-519",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1158",
    "SubjectUserName": "lambda-user",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x80e25b9",
    "PrivilegeList": "-"
  }
}

Detection Patterns #

Community Notes #

May capture cross-domain privilege escalation in a multi-forest trust.

References #

Event ID 4757 — A member was removed from a security-enabled universal group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A member was removed from a security-enabled universal group.

Message #

A member was removed from a security-enabled universal group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name UnicodeString[Member] Account Name.
Security_ID SID[Member] Security ID.
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4758 — A security-enabled universal group was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled universal group was deleted.

Message #

A security-enabled universal group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4758,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:14.194447+00:00",
    "event_record_id": 16240252,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 6288
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "evtgen_universal",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1120",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-"
  },
  "message": ""
}

References #

Event ID 4759 — A security-disabled universal group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A security-disabled universal group was created.

Message #

A security-disabled universal group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History

Detection Patterns #

References #

Event ID 4760 — A security-disabled universal group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A security-disabled universal group was changed.

Message #

A security-disabled universal group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Changed Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Changed Attributes] SAM Account Name.
SID_History UnicodeString[Changed Attributes] SID History.
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Changed Attributes] SAM Account Name
SidHistory UnicodeString[Changed Attributes] SID History

References #

Event ID 4761 — A member was added to a security-disabled universal group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A member was added to a security-disabled universal group.

Message #

A member was added to a security-disabled universal group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
MembershipExpirationTime FILETIMEExpiration time

References #

Event ID 4762 — A member was removed from a security-disabled universal group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A member was removed from a security-disabled universal group.

Message #

A member was removed from a security-disabled universal group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name UnicodeString[Member] Account Name.
Security_ID SID[Member] Security ID.
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4763 — A security-disabled universal group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Distribution Group Management
Collection Priority
Low (Splunk-UBA)
Opcode
Info

Description

A security-disabled universal group was deleted.

Message #

A security-disabled universal group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4764 — A group’s type was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A group?s type was changed.

Message #

A group?s type was changed.

Subject:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Change Type: %1

Group:
	Security ID: %4
	Group Name: %2
	Group Domain: %3

Additional Information:
	Privileges: %9

Fields #

NameDescription
GroupTypeChange UnicodeStringChange Type
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Change_Type UnicodeString[Subject] Change Type.
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4764,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:10.897820+00:00",
    "event_record_id": 16240135,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 6288
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "GroupTypeChange": "Security Disabled Global Group Changed to Security Enabled Global Group.",
    "TargetUserName": "evtgen_distro",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1121",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "PrivilegeList": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4765 — SID History was added to an account.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

SID History was added to an account.

Message #

SID History was added to an account.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Target Account:
	Security ID: %5
	Account Name: %3
	Account Domain: %4

Source Account:
	Security ID: %2
	Account Name: %1

Additional Information:
	Privileges: %10
	SID List: %11

Fields #

NameDescription
Account_Name[Source Account] Account Name.
Security_ID[Source Account] Security ID.
Account_Name[Target Account] Account Name.
Account_Domain[Target Account] Account Domain.
Security_ID[Target Account] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference
SID_List[Additional Information] SID List.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4765,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2017-06-12T23:39:43.512986Z",
    "event_record_id": 8075,
    "correlation": {},
    "execution": {
      "process_id": 496,
      "thread_id": 1696
    },
    "channel": "Security",
    "computer": "2012r2srv.maincorp.local",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SourceUserName": "maincorp.local\\Domain Admins",
    "SourceSid": "S-1-5-21-2634088540-571122920-1382659128-512",
    "TargetUserName": "labuser",
    "TargetDomainName": "MAINCORP",
    "TargetSid": "S-1-5-21-2634088540-571122920-1382659128-1104",
    "SubjectUserSid": "S-1-5-21-2634088540-571122920-1382659128-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "MAINCORP",
    "SubjectLogonId": "0x432c8",
    "PrivilegeList": "-",
    "SidList": "-"
  }
}

Detection Patterns #

Community Notes #

May indicate DCShadow or similar lateral movement attacks.

References #

Event ID 4766 — An attempt to add SID History to an account failed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt to add SID History to an account failed.

Message #

An attempt to add SID History to an account failed.

Subject:
	Security ID:
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %4
	Account Name: %2
	Account Domain: %3

Source Account
	Account Name: %1

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name UnicodeString[Target Account] Account Name.
Account_Name UnicodeString[Target Account] Account Name.
Account_Domain UnicodeString[Target Account] Account Domain.
Security_ID UnicodeString[Target Account] Security ID.
Account_Name UnicodeString[Security ID] Account Name.
Account_Domain UnicodeString[Security ID] Account Domain.
Logon_ID UnicodeString[Security ID] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SourceUserName UnicodeString[Target Account] Account Name
TargetUserName UnicodeString[Target Account] Account Name
TargetDomainName UnicodeString[Target Account] Account Domain
TargetSid UnicodeString[Target Account] Security ID
SubjectUserName UnicodeString[Security ID] Account Name
SubjectDomainName UnicodeString[Security ID] Account Domain
SubjectLogonId UnicodeString[Security ID] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

Detection Patterns #

Community Notes #

May indicate DCShadow or similar lateral movement attacks.

References #

Event ID 4767 — A user account was unlocked.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A user account was unlocked.

Message #

A user account was unlocked.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Fields #

NameDescription
TargetUserName UnicodeString[Target Account] Account Name
TargetDomainName UnicodeString[Target Account] Account Domain
TargetSid SID[Target Account] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
Account_Name UnicodeString[Target Account] Account Name.
Account_Domain UnicodeString[Target Account] Account Domain.
Security_ID SID[Target Account] Security ID.
Logon_ID HexInt64[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4767,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:16:10.398421+00:00",
    "event_record_id": 16240087,
    "correlation": {},
    "execution": {
      "process_id": 968,
      "thread_id": 1756
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "evtgen_user3",
    "TargetDomainName": "ludus",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-1115",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e"
  },
  "message": ""
}

References #

Event ID 4768 — A Kerberos authentication ticket (TGT) was requested.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Kerberos Authentication Service
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A Kerberos authentication ticket (TGT) was requested.

Message #

A Kerberos authentication ticket (TGT) was requested.

Account Information:
	Account Name: %1
	Supplied Realm Name: %2
	User ID: %3

Service Information:
	Service Name: %4
	Service ID: %5

Network Information:
	Client Address: %10
	Client Port: %11

Additional Information:
	Ticket Options: %6
	Result Code: %7
	Ticket Encryption Type: %8
	Pre-Authentication Type: %9

Certificate Information:
	Certificate Issuer Name: %12
	Certificate Serial Number: %13
	Certificate Thumbprint: %14

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields #

NameDescription
Account_Name[Account Information] Account Name.
Supplied_Realm_Name[Account Information] Supplied Realm Name.
User_ID[Account Information] User ID.
Service_Name[Service Information] Service Name.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Result_Code[Additional Information] Result Code.
Known values
0x0
KDC_ERR_NONE (Success)
0x1
KDC_ERR_NAME_EXP
0x2
KDC_ERR_SERVICE_EXP
0x3
KDC_ERR_BAD_PVNO
0x6
KDC_ERR_C_PRINCIPAL_UNKNOWN
0x7
KDC_ERR_S_PRINCIPAL_UNKNOWN
0x9
KDC_ERR_NULL_KEY
0xA
KDC_ERR_CANNOT_POSTDATE
0xC
KDC_ERR_POLICY
0xD
KDC_ERR_BADOPTION
0xE
KDC_ERR_ETYPE_NOSUPP
0x12
KDC_ERR_CLIENT_REVOKED
0x17
KDC_ERR_KEY_EXPIRED
0x18
KDC_ERR_PREAUTH_FAILED
0x19
KDC_ERR_PREAUTH_REQUIRED
0x1F
KRB_AP_ERR_BAD_INTEGRITY
0x20
KRB_AP_ERR_TKT_EXPIRED
0x21
KRB_AP_ERR_TKT_NYV
0x22
KRB_AP_ERR_REPEAT
0x25
KRB_AP_ERR_SKEW
0x29
KRB_AP_ERR_BADADDR
0x3C
KRB_ERR_GENERIC
0x44
KRB_ERR_WRONG_REALM
0x00000000
STATUS_SUCCESS
0xC0000002
STATUS_NOT_IMPLEMENTED
0xC0000005
STATUS_ACCESS_VIOLATION
0xC0000008
STATUS_INVALID_HANDLE
0xC000000D
STATUS_INVALID_PARAMETER
0xC0000017
STATUS_NO_MEMORY
0xC0000022
STATUS_ACCESS_DENIED
0xC0000034
STATUS_OBJECT_NAME_NOT_FOUND
0xC0000035
STATUS_OBJECT_NAME_COLLISION
0xC000003A
STATUS_OBJECT_PATH_NOT_FOUND
0xC0000043
STATUS_SHARING_VIOLATION
0xC0000056
STATUS_DELETE_PENDING
0xC000005E
STATUS_NO_LOGON_SERVERS
0xC0000061
STATUS_PRIVILEGE_NOT_HELD
0xC0000062
STATUS_INVALID_ACCOUNT_NAME
0xC0000064
STATUS_NO_SUCH_USER
0xC0000065
STATUS_GROUP_EXISTS
0xC0000066
STATUS_NO_SUCH_GROUP
0xC0000067
STATUS_MEMBER_IN_GROUP
0xC0000068
STATUS_MEMBER_NOT_IN_GROUP
0xC000006A
STATUS_WRONG_PASSWORD
0xC000006B
STATUS_ILL_FORMED_PASSWORD
0xC000006C
STATUS_PASSWORD_RESTRICTION
0xC000006D
STATUS_LOGON_FAILURE
0xC000006E
STATUS_ACCOUNT_RESTRICTION
0xC000006F
STATUS_INVALID_LOGON_HOURS
0xC0000070
STATUS_INVALID_WORKSTATION
0xC0000071
STATUS_PASSWORD_EXPIRED
0xC0000072
STATUS_ACCOUNT_DISABLED
0xC0000073
STATUS_NONE_MAPPED
0xC0000074
STATUS_TOO_MANY_LUIDS_REQUESTED
0xC0000076
STATUS_INVALID_SUB_AUTHORITY
0xC0000077
STATUS_INVALID_ACL
0xC0000078
STATUS_INVALID_SID
0xC0000079
STATUS_INVALID_SECURITY_DESCR
0xC000007C
STATUS_NO_TOKEN
0xC000009A
STATUS_INSUFFICIENT_RESOURCES
0xC00000A5
STATUS_BAD_IMPERSONATION_LEVEL
0xC00000BB
STATUS_NOT_SUPPORTED
0xC00000CC
STATUS_BAD_NETWORK_NAME
0xC00000DC
STATUS_INVALID_SERVER_STATE
0xC00000E5
STATUS_INTERNAL_ERROR
0xC00000ED
STATUS_NOT_LOGON_PROCESS
0xC0000106
STATUS_NAME_TOO_LONG
0xC000010A
STATUS_PROCESS_IS_TERMINATING
0xC0000120
STATUS_CANCELLED
0xC0000121
STATUS_CANNOT_DELETE
0xC0000133
STATUS_TIME_DIFFERENCE_AT_DC
0xC000015B
STATUS_LOGON_TYPE_NOT_GRANTED
0xC000018A
STATUS_NO_TRUST_LSA_SECRET
0xC000018B
STATUS_NO_TRUST_SAM_ACCOUNT
0xC000018C
STATUS_TRUSTED_DOMAIN_FAILURE
0xC000018D
STATUS_TRUSTED_RELATIONSHIP_FAILURE
0xC0000190
STATUS_TRUST_FAILURE
0xC0000192
STATUS_NETLOGON_NOT_STARTED
0xC0000193
STATUS_ACCOUNT_EXPIRED
0xC0000198
STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT
0xC0000199
STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
0xC000019A
STATUS_NOLOGON_SERVER_TRUST_ACCOUNT
0xC0000224
STATUS_PASSWORD_MUST_CHANGE
0xC0000225
STATUS_NOT_FOUND
0xC0000233
STATUS_DOMAIN_CONTROLLER_NOT_FOUND
0xC0000234
STATUS_ACCOUNT_LOCKED_OUT
0xC0000236
STATUS_CONNECTION_REFUSED
0xC000035B
STATUS_BAD_BINDINGS
0xC0000380
STATUS_SMARTCARD_WRONG_PIN
0xC0000381
STATUS_SMARTCARD_CARD_BLOCKED
0xC0000386
STATUS_SMARTCARD_NO_KEYSET
0xC0000387
STATUS_SMARTCARD_IO_ERROR
0xC0000388
STATUS_DOWNGRADE_DETECTED
0xC0000389
STATUS_SMARTCARD_CERT_REVOKED
0xC0000408
STATUS_USER2USER_REQUIRED
0xC0000409
STATUS_STACK_BUFFER_OVERRUN
0xC0000413
STATUS_AUTHENTICATION_FIREWALL_FAILED
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
PreAuthentication_Type[Additional Information] Pre-Authentication Type.
Known values
0
PA-NONE
2
PA-ENC-TIMESTAMP
11
PA-ETYPE-INFO
14
PA-PK-AS-REQ-OLD
15
PA-PK-AS-REQ
16
PA-PK-AS-REP
17
PA-ETYPE-INFO2
19
PA-ETYPE-INFO2
20
PA-SVR-REFERRAL-INFO
128
PA-SUPPORTED-ENCTYPES
129
PA-PAC-OPTIONS
165
PA-SPAKE
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Certificate_Issuer_Name[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint[Certificate Information] Certificate Thumbprint.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4768,
    "version": 0,
    "level": 0,
    "task": 14339,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2020-07-22T20:29:36.414827Z",
    "event_record_id": 887107,
    "correlation": {},
    "execution": {
      "process_id": 568,
      "thread_id": 2476
    },
    "channel": "Security",
    "computer": "01566s-win16-ir.threebeesco.com",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "HD01",
    "TargetDomainName": "CONTOSO.COM",
    "TargetSid": "S-1-0-0",
    "ServiceName": "krbtgt/CONTOSO.COM",
    "ServiceSid": "S-1-0-0",
    "TicketOptions": "0x10",
    "Status": "0x6",
    "TicketEncryptionType": "0xffffffff",
    "PreAuthType": "-",
    "IpAddress": "172.16.66.1",
    "IpPort": "55961",
    "CertIssuerName": "",
    "CertSerialNumber": "",
    "CertThumbprint": ""
  }
}

Detection Patterns #

Community Notes #

Kerberos TGT request (consider Pass-the-Ticket, Golden TGT attacks). Requests from a non-interactive source prior to 4769 may indicate ticket replay or Pass-the-Ticket staging.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Potential AS-REP Roasting via Kerberos TGT Requests source medium: Detects suspicious Kerberos TGT requests with pre-authentication disabled (Pre-Authentication Type = 0) and Ticket Encryption Type (0x17) i.e, RC4-HMAC. This may indicate an AS-REP Roasting attack, where attackers request AS-REP messages for accounts without pre-authentication and attempt to crack the encrypted ticket offline to recover user passwords.
  • PetitPotam Suspicious Kerberos TGT Request source high: Detect suspicious Kerberos TGT requests. Once an attacer obtains a computer certificate by abusing Active Directory Certificate Services in combination with PetitPotam, the next step would be to leverage the certificate for malicious purposes. One way of doing this is to request a Kerberos Ticket Granting Ticket using a tool like Rubeus. This request will generate a 4768 event with some unusual fields depending on the environment. This analytic will require tuning, we recommend filtering Account_Name to the Domain Controller computer accounts.

Splunk # view in reference

  • Kerberos TGT Request Using RC4 Encryption source: The following analytic detects a Kerberos Ticket Granting Ticket (TGT) request using RC4-HMAC encryption (type 0x17) by leveraging Event 4768. This encryption type is outdated and its presence may indicate an OverPass The Hash attack. Monitoring this activity is crucial as it can signify credential theft, allowing adversaries to authenticate to the Kerberos Distribution Center (KDC) using a stolen NTLM hash. If confirmed malicious, this could enable unauthorized access to systems and resources, potentially leading to lateral movement and further compromise within the network.
  • Kerberos User Enumeration source: The following analytic detects an unusual number of Kerberos Ticket Granting Ticket (TGT) requests for non-existing users from a single source endpoint. It leverages Event ID 4768 and identifies anomalies using the 3-sigma statistical rule. This behavior is significant as it may indicate an adversary performing a user enumeration attack against Active Directory. If confirmed malicious, the attacker could validate a list of usernames, potentially leading to further attacks such as brute force or credential stuffing, compromising the security of the environment.
  • PetitPotam Suspicious Kerberos TGT Request source: The following analytic detects a suspicious Kerberos Ticket Granting Ticket (TGT) request, identified by Event Code 4768. This detection leverages Windows Security Event Logs to identify TGT requests with unusual fields, which may indicate the use of tools like Rubeus following the exploitation of CVE-2021-36942 (PetitPotam). This activity is significant as it can signal an attacker leveraging a compromised certificate to request Kerberos tickets, potentially leading to unauthorized access. If confirmed malicious, this could allow attackers to escalate privileges and persist within the environment, posing a severe security risk.
Show 5 more (8 total)
  • Windows Computer Account Requesting Kerberos Ticket source: The following analytic detects a computer account requesting a Kerberos ticket, which is unusual as typically user accounts request these tickets. This detection leverages Windows Security Event Logs, specifically EventCode 4768, to identify instances where the TargetUserName ends with a dollar sign ($), indicating a computer account. This activity is significant because it may indicate the use of tools like KrbUpRelay or other Kerberos-based attacks. If confirmed malicious, this could allow attackers to impersonate computer accounts, potentially leading to unauthorized access and lateral movement within the network.
  • Windows Multiple Disabled Users Failed To Authenticate Wth Kerberos source: The following analytic detects a single source endpoint failing to authenticate with 30 unique disabled domain users using the Kerberos protocol within 5 minutes. It leverages Windows Security Event 4768, focusing on failure code `0x12`, indicating revoked credentials. This activity is significant as it may indicate a Password Spraying attack targeting disabled accounts, a tactic used by adversaries to gain initial access or elevate privileges. If confirmed malicious, this could lead to unauthorized access or privilege escalation within the Active Directory environment, posing a severe security risk.
  • Windows Multiple Invalid Users Fail To Authenticate Using Kerberos source: The following analytic identifies a source endpoint failing to authenticate with 30 unique invalid domain users using the Kerberos protocol. This detection leverages EventCode 4768, specifically looking for failure code 0x6, indicating the user is not found in the Kerberos database. This activity is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this could lead to unauthorized access or privilege escalation within the Active Directory environment, posing a significant security risk.
  • Windows Unusual Count Of Disabled Users Failed Auth Using Kerberos source: The following analytic identifies a source endpoint failing to authenticate with multiple disabled domain users using the Kerberos protocol. It leverages EventCode 4768, which is generated when the Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT) and detects failure code `0x12` (credentials revoked). This behavior is significant as it may indicate a Password Spraying attack targeting disabled accounts, potentially leading to initial access or privilege escalation. If confirmed malicious, attackers could gain unauthorized access or elevate privileges within the Active Directory environment.
  • Windows Unusual Count Of Invalid Users Fail To Auth Using Kerberos source: The following analytic identifies a source endpoint failing to authenticate with multiple invalid domain users using the Kerberos protocol. It leverages Event ID 4768, which is generated when the Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT) and detects failure code 0x6, indicating the user is not found in the Kerberos database. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this activity could lead to unauthorized access and potential privilege escalation within the Active Directory environment.

Kusto Query Language # view in reference

References #

Event ID 4769 — A Kerberos service ticket was requested.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Kerberos Service Ticket Operations
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A Kerberos service ticket was requested.

Message #

A Kerberos service ticket was requested.

Account Information:
	Account Name: %1
	Account Domain: %2
	Logon GUID: %10

Service Information:
	Service Name: %3
	Service ID: %4

Network Information:
	Client Address: %7
	Client Port: %8

Additional Information:
	Ticket Options: %5
	Ticket Encryption Type: %6
	Failure Code: %9
	Transited Services: %11

This event is generated every time access is requested to a resource such as a computer or a Windows service.  The service name indicates the resource to which access was requested.

This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event.  The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.

Ticket options, encryption types, and failure codes are defined in RFC 4120.

Fields #

NameDescription
Account_Name[Account Information] Account Name.
Account_Domain[Account Information] Account Domain.
Service_Name[Service Information] Service Name. Indicates the resource to which access was requested.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Failure_Code[Additional Information] Failure Code. NTSTATUS reference
Logon_GUID[Account Information] Logon GUID.
Transited_Services[Additional Information] Transited Services.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4769,
    "version": 0,
    "level": 0,
    "task": 14337,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-12-12T17:57:52.277095Z",
    "event_record_id": 2982083,
    "correlation": {},
    "execution": {
      "process_id": 624,
      "thread_id": 3652
    },
    "channel": "Security",
    "computer": "01566s-win16-ir.threebeesco.com",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "labuser@CONTOSO.COM",
    "TargetDomainName": "CONTOSO.COM",
    "ServiceName": "01566S-WIN16-IR$",
    "ServiceSid": "S-1-5-21-308926384-506822093-3341789130-35103",
    "TicketOptions": "0x40810000",
    "TicketEncryptionType": "0x12",
    "IpAddress": "::ffff:172.16.66.19",
    "IpPort": "50612",
    "Status": "0x0",
    "LogonGuid": "58ADC6C7-668E-A999-C52A-384B1CB8E553",
    "TransmittedServices": "-"
  }
}

Community Notes #

Tickets for hosts that a user previously hasn't accessed may indicate Pass-the-Ticket or RDP/WMI pivoting. Confirm that the target server is also the host that is contacted, and unusual/vulnerable encryption types (may indicate S4U2Proxy) like RC4. Check for movement between services or SPNs, and unusual service names.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Kerberoasting Activity - Initial Query source medium: This rule will collect the data needed to start looking into possible kerberoasting activity. Further analysis or computation within the query is needed focusing on requests from one specific host/IP towards multiple service names within a time period of 5 seconds. You can then set a threshold for the number of requests and time between the requests to turn this into an alert.
  • Suspicious Kerberos RC4 Ticket Encryption source medium: Detects service ticket requests using RC4 encryption type

Splunk # view in reference

  • Kerberoasting spn request with RC4 encryption source: The following analytic detects potential Kerberoasting attacks by identifying Kerberos service ticket requests with RC4 encryption through Event ID 4769. It leverages specific Ticket_Options values commonly used by Kerberoasting tools. This activity is significant as Kerberoasting allows attackers to request service tickets for domain accounts, typically service accounts, and crack them offline to gain privileged access. If confirmed malicious, this could lead to unauthorized access, privilege escalation, and further compromise of the Active Directory environment.
  • Kerberos Service Ticket Request Using RC4 Encryption source: The following analytic detects Kerberos service ticket requests using RC4 encryption, leveraging Kerberos Event 4769. This method identifies potential Golden Ticket attacks, where adversaries forge Kerberos Granting Tickets (TGT) using the Krbtgt account NTLM password hash to gain unrestricted access to an Active Directory environment. Monitoring for RC4 encryption usage is significant as it is rare in modern networks, indicating possible malicious activity. If confirmed malicious, attackers could move laterally and execute code on remote systems, compromising the entire network. Note: This detection may be bypassed if attackers use the AES key instead of the NTLM hash.
  • Suspicious Kerberos Service Ticket Request source: The following analytic detects suspicious Kerberos Service Ticket (TGS) requests where the requesting account name matches the service name, potentially indicating an exploitation attempt of CVE-2021-42278 and CVE-2021-42287. This detection leverages Event ID 4769 from Domain Controller and Kerberos events. Such activity is significant as it may represent an adversary attempting to escalate privileges by impersonating a domain controller. If confirmed malicious, this could allow an attacker to take control of the domain controller, leading to complete domain compromise and unauthorized access to sensitive information.
Show 3 more (6 total)
  • Unusual Number of Computer Service Tickets Requested source: The following analytic identifies an unusual number of computer service ticket requests from a single source, leveraging Event ID 4769, "A Kerberos service ticket was requested." It uses statistical analysis, including standard deviation and the 3-sigma rule, to detect anomalies in service ticket requests. This activity is significant as it may indicate malicious behavior such as lateral movement, malware staging, or reconnaissance. If confirmed malicious, an attacker could gain unauthorized access to multiple endpoints, facilitating further compromise and potential data exfiltration.
  • Unusual Number of Kerberos Service Tickets Requested source: The following analytic identifies an unusual number of Kerberos service ticket requests, potentially indicating a kerberoasting attack. It leverages Kerberos Event 4769 and calculates the standard deviation for each host, using the 3-sigma rule to detect anomalies. This activity is significant as kerberoasting allows adversaries to request service tickets and crack them offline, potentially gaining privileged access to the domain. If confirmed malicious, this could lead to unauthorized access to sensitive accounts and escalation of privileges within the Active Directory environment.
  • Windows Large Number of Computer Service Tickets Requested source: The following analytic detects a high volume of Kerberos service ticket requests, specifically more than 30, from a single source within a 5-minute window. It leverages Event ID 4769, which logs when a Kerberos service ticket is requested, focusing on requests with computer names as the Service Name. This behavior is significant as it may indicate malicious activities such as lateral movement, malware staging, or reconnaissance. If confirmed malicious, an attacker could gain unauthorized access to multiple endpoints, potentially compromising the entire network.

References #

Event ID 4770 — A Kerberos service ticket was renewed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Kerberos Service Ticket Operations
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A Kerberos service ticket was renewed.

Message #

A Kerberos service ticket was renewed.

Account Information:
	Account Name: %1
	Account Domain: %2

Service Information:
	Service Name: %3
	Service ID: %4

Network Information:
	Client Address: %7
	Client Port: %8

Additional Information:
	Ticket Options: %5
	Ticket Encryption Type: %6

Ticket options and encryption types are defined in RFC 4120.

Fields #

NameDescription
TargetUserName UnicodeString[Account Information] Account Name
TargetDomainName UnicodeString[Account Information] Account Domain
ServiceName UnicodeString[Service Information] Service Name
ServiceSid SID[Service Information] Service ID
TicketOptions HexInt32[Additional Information] Ticket Options
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
TicketEncryptionType HexInt32[Additional Information] Ticket Encryption Type
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
IpAddress UnicodeString[Network Information] Client Address
IpPort UnicodeString[Network Information] Client Port
Account_Name UnicodeString[Account Information] Account Name.
Account_Domain UnicodeString[Account Information] Account Domain.
Service_Name UnicodeString[Service Information] Service Name.
Service_ID SID[Service Information] Service ID.
Ticket_Options HexInt32[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Ticket_Encryption_Type HexInt32[Additional Information] Ticket Encryption Type.
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
Client_Address UnicodeString[Network Information] Client Address.
Client_Port UnicodeString[Network Information] Client Port.
RequestTicketHash UnicodeString
ResponseTicketHash UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4770,
    "version": 0,
    "level": 0,
    "task": 14337,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-07T02:29:17.564406+00:00",
    "event_record_id": 13430760,
    "correlation": {},
    "execution": {
      "process_id": 916,
      "thread_id": 2888
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "LAB-DC01$@LUDUS.DOMAIN",
    "TargetDomainName": "LUDUS.DOMAIN",
    "ServiceName": "krbtgt",
    "ServiceSid": "S-1-5-21-1006758700-2167138679-1475694448-502",
    "TicketOptions": "0x10002",
    "TicketEncryptionType": "0x12",
    "IpAddress": "::1",
    "IpPort": "0"
  },
  "message": ""
}

References #

Event ID 4771 — Kerberos pre-authentication failed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Kerberos Authentication Service
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

Kerberos pre-authentication failed.

Message #

Kerberos pre-authentication failed.

Account Information:
	Security ID: %2
	Account Name: %1

Service Information:
	Service Name: %3

Network Information:
	Client Address: %7
	Client Port: %8

Additional Information:
	Ticket Options: %4
	Failure Code: %5
	Pre-Authentication Type: %6

Certificate Information:
	Certificate Issuer Name: %9
	Certificate Serial Number: %10
	Certificate Thumbprint: %11

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.

Fields #

NameDescription
Account_Name[Account Information] Account Name.
Security_ID[Account Information] Security ID.
Service_Name[Service Information] Service Name.
Ticket_Options[Additional Information] Ticket Options. Was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Failure_Code[Additional Information] Failure Code. NTSTATUS reference
PreAuthentication_Type[Additional Information] Pre-Authentication Type.
Known values
0
PA-NONE
2
PA-ENC-TIMESTAMP
11
PA-ETYPE-INFO
14
PA-PK-AS-REQ-OLD
15
PA-PK-AS-REQ
16
PA-PK-AS-REP
17
PA-ETYPE-INFO2
19
PA-ETYPE-INFO2
20
PA-SVR-REFERRAL-INFO
128
PA-SUPPORTED-ENCTYPES
129
PA-PAC-OPTIONS
165
PA-SPAKE
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Certificate_Issuer_Name[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint[Certificate Information] Certificate Thumbprint.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4771,
    "version": 0,
    "level": 0,
    "task": 14339,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2020-07-22T20:29:36.425365Z",
    "event_record_id": 887114,
    "correlation": {},
    "execution": {
      "process_id": 568,
      "thread_id": 2356
    },
    "channel": "Security",
    "computer": "01566s-win16-ir.threebeesco.com",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Administrator",
    "TargetSid": "S-1-5-21-308926384-506822093-3341789130-500",
    "ServiceName": "krbtgt/CONTOSO.COM",
    "TicketOptions": "0x10",
    "Status": "0x18",
    "PreAuthType": "2",
    "IpAddress": "172.16.66.1",
    "IpPort": "55967",
    "CertIssuerName": "",
    "CertSerialNumber": "",
    "CertThumbprint": ""
  }
}

Community Notes #

May indicate password spraying. Pivot on ClientAddress.

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Multiple Users Failed To Authenticate Using Kerberos source: The following analytic identifies a single source endpoint failing to authenticate with 30 unique users using the Kerberos protocol. It leverages EventCode 4771 with Status 0x18, indicating wrong password attempts, and aggregates these events over a 5-minute window. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges in an Active Directory environment. If confirmed malicious, this activity could lead to unauthorized access, privilege escalation, and potential compromise of sensitive information.
  • Windows Unusual Count Of Users Failed To Auth Using Kerberos source: The following analytic identifies a source endpoint failing to authenticate multiple valid users using the Kerberos protocol, potentially indicating a Password Spraying attack. It leverages Event 4771, which is generated when the Key Distribution Center fails to issue a Kerberos Ticket Granting Ticket (TGT) due to a wrong password (failure code 0x18). This detection uses statistical analysis, specifically the 3-sigma rule, to identify unusual authentication failures. If confirmed malicious, this activity could allow an attacker to gain initial access or elevate privileges within an Active Directory environment.

References #

Event ID 4772 — A Kerberos authentication ticket request failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Kerberos Authentication Service
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A Kerberos authentication ticket request failed.

Message #

A Kerberos authentication ticket request failed.

Account Information:
	Account Name: %1
	Supplied Realm Name: %2

Service Information:
	Service Name: %3

Network Information:
	Client Address: %6
	Client Port: %7

Additional Information:
	Ticket Options: %4
	Failure Code: %5

Ticket options and failure codes are defined in RFC 4120.

Fields #

NameDescription
Account_Name UnicodeString[Account Information] Account Name.
Supplied_Realm_Name UnicodeString[Account Information] Supplied Realm Name.
Service_Name UnicodeString[Service Information] Service Name.
Ticket_Options UnicodeString[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Failure_Code UnicodeString[Additional Information] Failure Code. NTSTATUS reference
Client_Address UnicodeString[Network Information] Client Address.
Client_Port UnicodeString[Network Information] Client Port.
TargetUserName UnicodeString[Account Information] Account Name
TargetDomainName UnicodeString[Account Information] Supplied Realm Name
ServiceName UnicodeString[Service Information] Service Name
TicketOptions UnicodeString[Additional Information] Ticket Options
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
FailureCode UnicodeString[Additional Information] Failure Code NTSTATUS reference
IpAddress UnicodeString[Network Information] Client Address
IpPort UnicodeString[Network Information] Client Port

References #

Event ID 4773 — A Kerberos service ticket request failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Kerberos Service Ticket Operations
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

A Kerberos service ticket request failed.

Message #

A Kerberos service ticket request failed.

Account Information:
	Account Name: %1
	Account Domain: %2

Service Information:
	Service Name: %3

Network Information:
	Client Address: %6
	Client Port: %7

Additional Information:
	Ticket Options: %4
	Failure Code: %5

Ticket options and failure codes are defined in RFC 4120.

Fields #

NameDescription
Account_Name UnicodeString[Account Information] Account Name.
Account_Domain UnicodeString[Account Information] Account Domain.
Service_Name UnicodeString[Service Information] Service Name.
Ticket_Options UnicodeString[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Failure_Code UnicodeString[Additional Information] Failure Code. NTSTATUS reference
Client_Address UnicodeString[Network Information] Client Address.
Client_Port UnicodeString[Network Information] Client Port.
TargetUserName UnicodeString[Account Information] Account Name
TargetDomainName UnicodeString[Account Information] Account Domain
ServiceName UnicodeString[Service Information] Service Name
TicketOptions UnicodeString[Additional Information] Ticket Options
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
FailureCode UnicodeString[Additional Information] Failure Code NTSTATUS reference
IpAddress UnicodeString[Network Information] Client Address
IpPort UnicodeString[Network Information] Client Port

References #

Event ID 4774 — An account was mapped for logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Credential Validation
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An account was mapped for logon.

Message #

An account was mapped for logon.

Authentication Package: %1
Account UPN: %2
Mapped Name: %3

Fields #

NameDescription
Authentication_Package UnicodeString
Account_UPN UnicodeString
Mapped_Name UnicodeString
MappingBy UnicodeStringAuthentication Package
ClientUserName UnicodeStringAccount UPN
MappedName UnicodeStringMapped Name

References #

Event ID 4775 — An account could not be mapped for logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Credential Validation
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

An account could not be mapped for logon.

Message #

An account could not be mapped for logon.

Authentication Package: %1
Account Name: %2

Fields #

NameDescription
Authentication_Package UnicodeString
Account_Name UnicodeString
ClientUserName UnicodeStringAuthentication Package
MappingBy UnicodeStringAccount Name

References #

Event ID 4776 — The domain controller attempted to validate the credentials for an account.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Credential Validation
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

The computer attempted to validate the credentials for an account.

Message #

The computer attempted to validate the credentials for an account.

Authentication Package: %1
Logon Account: %2
Source Workstation: %3
Error Code: %4

Fields #

NameDescription
PackageName UnicodeStringAuthentication Package.
TargetUserName UnicodeStringLogon Account.
Workstation UnicodeStringSource Workstation.
Status HexInt32Error Code. NTSTATUS reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4776,
    "version": 0,
    "level": 0,
    "task": 14336,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-07T16:48:22.599068+00:00",
    "event_record_id": 388,
    "correlation": {
      "ActivityID": "DD7B0B6A-4A9E-0000-E519-7BDD9E4AD801"
    },
    "execution": {
      "process_id": 648,
      "thread_id": 3868
    },
    "channel": "Security",
    "computer": "WIN-FPV0DSIC9O6",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "PackageName": "MICROSOFT_AUTHENTICATION_PACKAGE_V1_0",
    "TargetUserName": "Administrator",
    "Workstation": "WIN-FPV0DSIC9O6",
    "Status": "0x0"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

This may capture fall-back NTLM use. Note Workstation (does it list the client? If not, this may be NTLM coercion).

The Status field is an NTSTATUS code indicating the credential validation result:

CodeNameDescription
0x00000000STATUS_SUCCESSCredentials validated successfully
0xC000006DSTATUS_LOGON_FAILUREGeneric failure (bad username or password)
0xC0000064STATUS_NO_SUCH_USERNon-existent account
0xC000006ASTATUS_WRONG_PASSWORDIncorrect password
0xC0000234STATUS_ACCOUNT_LOCKED_OUTAccount locked out
0xC0000072STATUS_ACCOUNT_DISABLEDAccount disabled
0xC0000193STATUS_ACCOUNT_EXPIREDAccount expired
0xC0000071STATUS_PASSWORD_EXPIREDPassword expired
0xC000006FSTATUS_INVALID_LOGON_HOURSOutside allowed logon hours
0xC0000070STATUS_INVALID_WORKSTATIONNot allowed from this workstation
0xC0000224STATUS_PASSWORD_MUST_CHANGEPassword must change at next logon
0xC000005ESTATUS_NO_LOGON_SERVERSNo logon servers available
0xC00002DBSTATUS_NTLM_BLOCKEDNTLM blocked by policy

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Multiple Invalid Users Failed To Authenticate Using NTLM source: The following analytic detects a single source endpoint failing to authenticate with 30 unique invalid users using the NTLM protocol. It leverages EventCode 4776 from Domain Controller logs, focusing on error code 0xC0000064, which indicates non-existent usernames. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this activity could lead to unauthorized access, privilege escalation, and potential compromise of sensitive information within the Active Directory environment.
  • Windows Multiple Users Failed To Authenticate From Host Using NTLM source: The following analytic identifies a single source endpoint failing to authenticate with 30 unique valid users using the NTLM protocol. It leverages EventCode 4776 from Domain Controller logs, focusing on error code 0xC000006A, which indicates a bad password. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this activity could lead to unauthorized access to sensitive information or further compromise of the Active Directory environment.
  • Windows Unusual Count Of Invalid Users Failed To Auth Using NTLM source: The following analytic identifies a source endpoint failing to authenticate with multiple invalid users using the NTLM protocol. It leverages EventCode 4776 and calculates the standard deviation for each host, using the 3-sigma rule to detect anomalies. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this activity could lead to unauthorized access or privilege escalation, posing a significant threat to the Active Directory environment. This detection is focused on domain controllers.
Show 1 more (4 total)
  • Windows Unusual Count Of Users Failed To Authenticate Using NTLM source: The following analytic identifies a source endpoint failing to authenticate multiple valid users using the NTLM protocol, potentially indicating a Password Spraying attack. It leverages Event 4776 from Domain Controllers, calculating the standard deviation for each host and applying the 3-sigma rule to detect anomalies. This activity is significant as it may represent an adversary attempting to gain initial access or elevate privileges. If confirmed malicious, the attacker could compromise multiple accounts, leading to unauthorized access and potential lateral movement within the network.

References #

Event ID 4777 — The domain controller failed to validate the credentials for an account.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Credential Validation
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

The domain controller failed to validate the credentials for an account.

Message #

The domain controller failed to validate the credentials for an account.

Authentication Package: %1
Logon Account: %2
Source Workstation: %3
Error Code: %4

Fields #

NameDescription
Authentication_Package UnicodeString
Logon_Account UnicodeString
Source_Workstation UnicodeString
Error_Code UnicodeString
ClientUserName UnicodeStringAuthentication Package
TargetUserName UnicodeStringLogon Account
Workstation UnicodeStringSource Workstation
Status UnicodeStringError Code NTSTATUS reference

Community Notes #

Logged when NTLM credential validation fails. Pair with 4776 (which logs both successes and failures).

The Status field is an NTSTATUS code — see Event 4776 for the full code table.

References #

Event ID 4778 — A session was reconnected to a Window Station.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A session was reconnected to a Window Station.

Message #

A session was reconnected to a Window Station.

Subject:
	Account Name: %1
	Account Domain: %2
	Logon ID: %3

Session:
	Session Name: %4

Additional Information:
	Client Name: %5
	Client Address: %6

This event is generated when a user reconnects to an existing Terminal Services session, or when a user switches to an existing desktop using Fast User Switching.

Fields #

NameDescription
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_Name[Session] Session Name.
Client_Name[Additional Information] Client Name.
Client_Address[Additional Information] Client Address.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4778,
    "version": 0,
    "level": 0,
    "task": 12551,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-05-14T21:01:05.831748Z",
    "event_record_id": 1829819,
    "correlation": {
      "#attributes": {
        "ActivityID": "A67BE420-4636-0001-36E4-7BA63646D701"
      }
    },
    "execution": {
      "process_id": 576,
      "thread_id": 4904
    },
    "channel": "Security",
    "computer": "fs01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "AccountName": "admmarsid",
    "AccountDomain": "OFFSEC",
    "LogonID": "0x6a423",
    "SessionName": "RDP-Tcp#8",
    "ClientName": "JUMP01",
    "ClientAddress": "10.23.23.9"
  }
}

Community Notes #

Useful for tracing session re-use.

References #

Event ID 4779 — A session was disconnected from a Window Station.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A session was disconnected from a Window Station.

Message #

A session was disconnected from a Window Station.

Subject:
	Account Name: %1
	Account Domain: %2
	Logon ID: %3

Session:
	Session Name: %4

Additional Information:
	Client Name: %5
	Client Address: %6


This event is generated when a user disconnects from an existing Terminal Services session, or when a user switches away from an existing desktop using Fast User Switching.

Fields #

NameDescription
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Session_Name[Session] Session Name.
Client_Name[Additional Information] Client Name.
Client_Address[Additional Information] Client Address.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4779,
    "version": 0,
    "level": 0,
    "task": 12551,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-05-14T21:01:05.370030Z",
    "event_record_id": 1829816,
    "correlation": {
      "#attributes": {
        "ActivityID": "A67BE420-4636-0001-36E4-7BA63646D701"
      }
    },
    "execution": {
      "process_id": 576,
      "thread_id": 628
    },
    "channel": "Security",
    "computer": "fs01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "AccountName": "admmig",
    "AccountDomain": "OFFSEC",
    "LogonID": "0x13b5e1e",
    "SessionName": "RDP-Tcp#8",
    "ClientName": "JUMP01",
    "ClientAddress": "10.23.23.9"
  }
}

References #

Event ID 4780 — The ACL was set on accounts which are members of administrators groups.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The ACL was set on accounts which are members of administrators groups.

Message #

The ACL was set on accounts which are members of administrators groups.


Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Target Account:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Additional Information:
	Privileges: %8

Every hour, the Windows domain controller that holds the primary domain controller (PDC) Flexible Single Master Operation (FSMO) role compares the ACL on all security principal accounts (users, groups, and machine accounts) present for its domain in Active Directory and that are in administrative groups against the ACL on the AdminSDHolder object.  If the ACL on the principal account differs from the ACL on the AdminSDHolder object, then the ACL on the principal account is reset to match the ACL on the AdminSDHolder object and this event is generated.

Fields #

NameDescription
TargetUserName UnicodeString[Target Account] Account Name
TargetDomainName UnicodeString[Target Account] Account Domain
TargetSid SID[Target Account] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
Account_Name UnicodeString[Target Account] Account Name.
Account_Domain UnicodeString[Target Account] Account Domain.
Security_ID SID[Target Account] Security ID.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4780,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-14T00:17:46.607238+00:00",
    "event_record_id": 16777470,
    "correlation": {},
    "execution": {
      "process_id": 940,
      "thread_id": 1056
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Domain Admins",
    "TargetDomainName": "DC=ludus,DC=domain",
    "TargetSid": "S-1-5-21-1006758700-2167138679-1475694448-512",
    "SubjectUserSid": "S-1-5-7",
    "SubjectUserName": "ANONYMOUS LOGON",
    "SubjectDomainName": "NT AUTHORITY",
    "SubjectLogonId": "0x3e6",
    "PrivilegeList": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4781 — The name of an account was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

The name of an account was changed.

Message #

The name of an account was changed:

Subject:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Target Account:
	Security ID: %4
	Account Domain: %3
	Old Account Name: %1
	New Account Name: %2

Additional Information:
	Privileges: %9

Fields #

NameDescription
OldTargetUserName UnicodeString[Target Account] Old Account Name.
NewTargetUserName UnicodeString[Target Account] New Account Name.
TargetDomainName UnicodeString[Target Account] Account Domain.
TargetSid SID[Target Account] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
PrivilegeList UnicodeString[Additional Information] Privileges. Privilege constants reference

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4781,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:37.340432+00:00",
    "event_record_id": 2857,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "OldTargetUserName": "None",
    "NewTargetUserName": "None",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-513",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "PrivilegeList": "-"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Attackers may rename an existing, highly privileged account to blend in.

Detection Rules #

View all rules referencing this event →

Elastic # view in reference

  • Potential Privileged Escalation via SamAccountName Spoofing source high: Identifies a suspicious computer account name rename event, which may indicate an attempt to exploit CVE-2021-42278 to elevate privileges from a standard domain user to a user with domain admin privileges. CVE-2021-42278 is a security vulnerability that allows potential attackers to impersonate a domain controller via samAccountName attribute spoofing.

Splunk # view in reference

  • Suspicious Computer Account Name Change source: The following analytic detects a suspicious computer account name change in Active Directory. It leverages Event ID 4781, which logs account name changes, to identify instances where a computer account name is changed to one that does not end with a `$`. This behavior is significant as it may indicate an attempt to exploit CVE-2021-42278 and CVE-2021-42287, which can lead to domain controller impersonation and privilege escalation. If confirmed malicious, this activity could allow an attacker to gain elevated privileges and potentially control the domain.

References #

Event ID 4782 — The password hash an account was accessed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Other Account Management Events
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

The password hash an account was accessed.

Message #

The password hash an account was accessed.

Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6

Target Account:
	Account Name: %1
	Account Domain: %2

Fields #

NameDescription
Account_Name UnicodeString[Target Account] Account Name.
Account_Domain UnicodeString[Target Account] Account Domain.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
TargetUserName UnicodeString[Target Account] Account Name
TargetDomainName UnicodeString[Target Account] Account Domain
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID

Community Notes #

May indicate Pass-the-Hash. Legitimate use occurs during AD password migration operations under SYSTEM or a dedicated migration account.

References #

Event ID 4783 — A basic application group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A basic application group was created.

Message #

A basic application group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History

Detection Patterns #

References #

Event ID 4784 — A basic application group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A basic application group was changed.

Message #

A basic application group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History

References #

Event ID 4785 — A member was added to a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A member was added to a basic application group.

Message #

A member was added to a basic application group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name[Member] Account Name.
Security_ID[Member] Security ID.
Group_Name[Group] Group Name.
Group_Domain[Group] Group Domain.
Security_ID[Group] Security ID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Privileges[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
MembershipExpirationTime FILETIMEExpiration time

References #

Event ID 4786 — A member was removed from a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A member was removed from a basic application group.

Message #

A member was removed from a basic application group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Group Name: %3
	Group Domain: %4

Additional Information:
	Privileges: %10

Fields #

NameDescription
Account_Name UnicodeString[Member] Account Name.
Security_ID SID[Member] Security ID.
Group_Name UnicodeString[Group] Group Name.
Group_Domain UnicodeString[Group] Group Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Group Name
TargetDomainName UnicodeString[Group] Group Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4787 — A non-member was added to a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A non-member was added to a basic application group.

Message #

A non-member was added to a basic application group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Account Name: %3
	Account Domain: %4

Additional Information:
	Privileges: %10

A non-member is an account that is explicitly excluded from membership in a basic application group.  Even if the account is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.

Fields #

NameDescription
Account_Name UnicodeString[Member] Account Name.
Security_ID SID[Member] Security ID.
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name. Is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4788 — A non-member was removed from a basic application group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A non-member was removed from a basic application group.

Message #

A non-member was removed from a basic application group.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Member:
	Security ID: %2
	Account Name: %1

Group:
	Security ID: %5
	Account Name: %3
	Account Domain: %4

Additional Information:
	Privileges: %10

A non-member is an account that is explicitly excluded from membership in a basic application group.  Even if the account is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.

Fields #

NameDescription
Account_Name UnicodeString[Member] Account Name.
Security_ID SID[Member] Security ID.
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name. Is specified as a member of the application group, either explicitly or through nested group membership, the account will not be treated as a group member if it is listed as a non-member.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
MemberName UnicodeString[Member] Account Name
MemberSid SID[Member] Security ID
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4789 — A basic application group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A basic application group was deleted.

Message #

A basic application group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4790 — An LDAP query group was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An LDAP query group was created.

Message #

An LDAP query group was created.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History

Detection Patterns #

References #

Event ID 4791 — A basic application group was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Opcode
Info

Description

A basic application group was changed.

Message #

A basic application group was changed.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Attributes:
	SAM Account Name: %9
	SID History: %10

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
SAM_Account_Name UnicodeString[Attributes] SAM Account Name.
SID_History UnicodeString[Attributes] SID History.
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SamAccountName UnicodeString[Attributes] SAM Account Name
SidHistory UnicodeString[Attributes] SID History

References #

Event ID 4792 — An LDAP query group was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Application Group Management
Opcode
Info

Description

An LDAP query group was deleted.

Message #

An LDAP query group was deleted.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Additional Information:
	Privileges: %8

Fields #

NameDescription
Account_Name UnicodeString[Group] Account Name.
Account_Domain UnicodeString[Group] Account Domain.
Security_ID SID[Group] Security ID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Privileges UnicodeString[Additional Information] Privileges. Privilege constants reference
TargetUserName UnicodeString[Group] Account Name
TargetDomainName UnicodeString[Group] Account Domain
TargetSid SID[Group] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference

References #

Event ID 4793 — The Password Policy Checking API was called.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Other Account Management Events
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

The Password Policy Checking API was called.

Message #

The Password Policy Checking API was called.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Additional Information:
	Caller Workstation: %5
	Provided Account Name (unauthenticated): %6
	Status Code: %7

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Caller_Workstation UnicodeString[Additional Information] Caller Workstation.
Provided_Account_Name_unauthenticated UnicodeString[Additional Information] Provided Account Name (unauthenticated).
Status_Code HexInt32[Additional Information] Status Code.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
Workstation UnicodeString[Additional Information] Caller Workstation
TargetUserName UnicodeString[Additional Information] Provided Account Name (unauthenticated)
Status HexInt32[Additional Information] Status Code NTSTATUS reference

References #

Event ID 4794 — An attempt was made to set the Directory Services Restore Mode administrator password.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt was made to set the Directory Services Restore Mode.

Message #

An attempt was made to set the Directory Services Restore Mode
administrator password.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Additional Information:
	Caller Workstation: %5
	Status Code: %6

Fields #

NameDescription
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.
Caller_Workstation[Additional Information] Caller Workstation.
Status_Code[Additional Information] Status Code.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4794,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2017-06-09T19:21:26.968669Z",
    "event_record_id": 3139859,
    "correlation": {
      "#attributes": {
        "ActivityID": "3B48C871-DFE6-0000-A5C8-483BE6DFD201"
      }
    },
    "execution": {
      "process_id": 792,
      "thread_id": 1648
    },
    "channel": "Security",
    "computer": "2016dc.hqcorp.local",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1913345275-1711810662-261465553-500",
    "SubjectUserName": "administrator",
    "SubjectDomainName": "HQCORP",
    "SubjectLogonId": "0x2f336f",
    "Workstation": "2016DC",
    "Status": "0x0"
  }
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Splunk # view in reference

  • Windows AD DSRM Password Reset source: The following analytic detects attempts to reset the Directory Services Restore Mode (DSRM) administrator password on a Domain Controller. It leverages event code 4794 from the Windows Security Event Log, specifically looking for events where the DSRM password reset is attempted. This activity is significant because the DSRM account can be used similarly to a local administrator account, providing potential persistence for an attacker. If confirmed malicious, this could allow an attacker to maintain administrative access to the Domain Controller, posing a severe risk to the domain's security.

References #

Event ID 4797 — An attempt was made to query the existence of a blank password for an account.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt was made to query the existence of a blank password for an account.

Message #

An attempt was made to query the existence of a blank password for an account.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Additional Information:
	Caller Workstation: %5
	Target Account Name: %6
	Target Account Domain: %7

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
Workstation UnicodeString[Additional Information] Caller Workstation.
TargetUserName UnicodeString[Additional Information] Target Account Name.
TargetDomainName UnicodeString[Additional Information] Target Account Domain.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4797,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T00:43:39.992357+00:00",
    "event_record_id": 184918,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 1928
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x27844",
    "Workstation": "WINDEV2310EVAL",
    "TargetUserName": "WDAGUtilityAccount",
    "TargetDomainName": "WINDEV2310EVAL"
  },
  "message": ""
}

References #

Event ID 4798 — A user's local group membership was enumerated.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A user's local group membership was enumerated.

Message #

A user's local group membership was enumerated.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

User:
	Security ID: %3
	Account Name: %1
	Account Domain: %2

Process Information:
	Process ID: %8
	Process Name: %9

Fields #

NameDescription
TargetUserName UnicodeString[User] Account Name.
TargetDomainName UnicodeString[User] Account Domain.
TargetSid SID[User] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
CallerProcessId Pointer[Process Information] Process ID.
CallerProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4798,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:35.014146+00:00",
    "event_record_id": 2785,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "User",
    "TargetDomainName": "WINDEV2310EVAL",
    "TargetSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "CallerProcessId": "0x57c",
    "CallerProcessName": "C:\\Windows\\System32\\rundll32.exe"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Enumerate Users Local Group Using Telegram source: The following analytic detects a Telegram process enumerating all network users in a local group. It leverages EventCode 4798, which is generated when a process enumerates a user's security-enabled local groups on a computer or device. This activity is significant as it may indicate an attempt to gather information on user accounts, a common precursor to further malicious actions. If confirmed malicious, this behavior could allow an attacker to map out user accounts, potentially leading to privilege escalation or lateral movement within the network.

References #

Event ID 4799 — A security-enabled local group membership was enumerated.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → Security Group Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security-enabled local group membership was enumerated.

Message #

A security-enabled local group membership was enumerated.

Subject:
	Security ID: %4
	Account Name: %5
	Account Domain: %6
	Logon ID: %7

Group:
	Security ID: %3
	Group Name: %1
	Group Domain: %2

Process Information:
	Process ID: %8
	Process Name: %9

Fields #

NameDescription
TargetUserName UnicodeString[Group] Group Name.
TargetDomainName UnicodeString[Group] Group Domain.
TargetSid SID[Group] Security ID.
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
CallerProcessId Pointer[Process Information] Process ID.
CallerProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4799,
    "version": 0,
    "level": 0,
    "task": 13826,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:50.749994+00:00",
    "event_record_id": 2946,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "Backup Operators",
    "TargetDomainName": "Builtin",
    "TargetSid": "S-1-5-32-551",
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "CallerProcessId": "0x138c",
    "CallerProcessName": "C:\\Windows\\System32\\SearchIndexer.exe"
  },
  "message": ""
}

References #

Event ID 4800 — The workstation was locked.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

The workstation was locked.

Message #

The workstation was locked.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Session ID: %5

Fields #

NameDescription
TargetUserSid SID[Subject] Security ID
TargetUserName UnicodeString[Subject] Account Name
TargetDomainName UnicodeString[Subject] Account Domain
TargetLogonId HexInt64[Subject] Logon ID
SessionId UInt32[Subject] Session ID
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Session_ID UInt32[Subject] Session ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4800,
    "version": 0,
    "level": 0,
    "task": 12551,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T23:16:10.990860+00:00",
    "event_record_id": 2684980,
    "correlation": {
      "ActivityID": "FA744C8F-80A0-4DBD-B165-8D96568C15CC"
    },
    "execution": {
      "process_id": 720,
      "thread_id": 3756
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserSid": "S-1-5-21-3407486967-1585450050-1838039599-1000",
    "TargetUserName": "localuser",
    "TargetDomainName": "LAB-WIN11",
    "TargetLogonId": "0x1b1557",
    "SessionId": 2
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Locked Workstation source informational: Detects locked workstation session events that occur automatically after a standard period of inactivity.

References #

Event ID 4801 — The workstation was unlocked.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

The workstation was unlocked.

Message #

The workstation was unlocked.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Session ID: %5

Fields #

NameDescription
TargetUserSid SID[Subject] Security ID
TargetUserName UnicodeString[Subject] Account Name
TargetDomainName UnicodeString[Subject] Account Domain
TargetLogonId HexInt64[Subject] Logon ID
SessionId UInt32[Subject] Session ID
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Session_ID UInt32[Subject] Session ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4801,
    "version": 0,
    "level": 0,
    "task": 12551,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-12T02:56:05.225999+00:00",
    "event_record_id": 2752626,
    "correlation": {
      "ActivityID": "A84A27DD-91F0-42B5-B4DA-0B267CDC42CF"
    },
    "execution": {
      "process_id": 720,
      "thread_id": 4416
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserSid": "S-1-5-21-3407486967-1585450050-1838039599-1000",
    "TargetUserName": "localuser",
    "TargetDomainName": "LAB-WIN11",
    "TargetLogonId": "0x1b1557",
    "SessionId": 2
  },
  "message": ""
}

References #

Event ID 4802 — The screen saver was invoked.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

The screen saver was invoked.

Message #

The screen saver was invoked.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Session ID: %5

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Session_ID UInt32[Subject] Session ID.
TargetUserSid SID[Subject] Security ID
TargetUserName UnicodeString[Subject] Account Name
TargetDomainName UnicodeString[Subject] Account Domain
TargetLogonId HexInt64[Subject] Logon ID
SessionId UInt32[Subject] Session ID

References #

Event ID 4803 — The screen saver was dismissed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

The screen saver was dismissed.

Message #

The screen saver was dismissed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Session ID: %5

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Session_ID UInt32[Subject] Session ID.
TargetUserSid SID[Subject] Security ID
TargetUserName UnicodeString[Subject] Account Name
TargetDomainName UnicodeString[Subject] Account Domain
TargetLogonId HexInt64[Subject] Logon ID
SessionId UInt32[Subject] Session ID

References #

Event ID 4816 — RPC detected an integrity violation while decrypting an incoming message.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

RPC detected an integrity violation while decrypting an incoming message.

Message #

RPC detected an integrity violation while decrypting an incoming message.

Peer Name: %1
Protocol Sequence: %2
Security Error: %3

Fields #

NameDescription
Peer_Name UnicodeString
Protocol_Sequence UnicodeString
Security_Error UInt32
PeerName UnicodeStringPeer Name
ProtocolSequence UnicodeStringProtocol Sequence
SecurityError UInt32Security Error

References #

Event ID 4817 — Auditing settings on object were changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Auditing settings on object were changed.

Message #

Auditing settings on object were changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7

Auditing Settings:
	Original Security Descriptor: %8
	New Security Descriptor: %9

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Object_Server UnicodeString[Object] Object Server.
Object_Type UnicodeString[Object] Object Type.
Object_Name UnicodeString[Object] Object Name.
Original_Security_Descriptor UnicodeString[Auditing Settings] Original Security Descriptor.
New_Security_Descriptor UnicodeString[Auditing Settings] New Security Descriptor.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectServer UnicodeString[Object] Object Server
ObjectType UnicodeString[Object] Object Type
ObjectName UnicodeString[Object] Object Name
OldSd UnicodeString[Auditing Settings] Original Security Descriptor
NewSd UnicodeString[Auditing Settings] New Security Descriptor

Community Notes #

Attackers that wish to suppress object-access logging can clear/replace the global SACL.

References #

Event ID 4818 — Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Central Policy Staging
Opcode
Info

Description

Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.

Message #

Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %9
	Process Name: %10

Current Central Access Policy results:

	Access Reasons: %11
Proposed Central Access Policy results that differ from the current Central Access Policy results:

	Access Reasons: %12

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Object_Server UnicodeString[Object] Object Server.
Object_Type UnicodeString[Object] Object Type.
Object_Name UnicodeString[Object] Object Name.
Handle_ID Pointer[Object] Handle ID.
Process_ID Pointer[Process Information] Process ID.
Process_Name UnicodeString[Process Information] Process Name.
Access_Reasons UnicodeString[Current Central Access Policy results] Access Reasons.
Access_Reasons UnicodeString[Proposed Central Access Policy results that differ from the current Central Access Policy results] Access Reasons.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectServer UnicodeString[Object] Object Server
ObjectType UnicodeString[Object] Object Type
ObjectName UnicodeString[Object] Object Name
HandleId Pointer[Object] Handle ID
ProcessId Pointer[Process Information] Process ID
ProcessName UnicodeString[Process Information] Process Name
AccessReason UnicodeString[Current Central Access Policy results] Access Reasons
Known values
%%1801
Granted by
%%1802
Denied by
%%1803
Denied by Integrity Policy check
%%1804
Granted by Ownership
%%1805
Not granted
%%1806
Granted by NULL DACL
%%1807
Denied by Empty DACL
%%1808
Granted by NULL Security Descriptor
%%1809
Unknown or unchecked
%%1810
Not granted due to missing
%%1811
Granted by ACE on parent folder
%%1812
Denied by ACE on parent folder
%%1813
Granted by Central Access Rule
%%1814
NOT Granted by Central Access Rule
%%1815
Granted by parent folder's Central Access Rule
%%1816
NOT Granted by parent folder's Central Access Rule
%%1830
Not granted to AppContainers
%%1841
Denied by Process Trust Label ACE
%%1856
Denied by Access Filter Ace
StagingReason UnicodeString[Proposed Central Access Policy results that differ from the current Central Access Policy results] Access Reasons

References #

Event ID 4819 — Central Access Policies on the machine have been changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Opcode
Info

Description

Central Access Policies on the machine have been changed.

Message #

Central Access Policies on the machine have been changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6

CAPs Added:%7

CAPs Deleted:%8

CAPs Modified:%9

CAPs As-Is:%10

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Object_Server UnicodeString[Object] Object Server.
Object_Type UnicodeString[Object] Object Type.
CAPs_Added UnicodeString[Object] CAPs Added.
CAPs_Deleted UnicodeString[Object] CAPs Deleted.
CAPs_Modified UnicodeString[Object] CAPs Modified.
CAPs_AsIs UnicodeString[Object] CAPs As-Is.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectServer UnicodeString[Object] Object Server
ObjectType UnicodeString[Object] Object Type
AddedCAPs UnicodeStringCAPs Added
DeletedCAPs UnicodeStringCAPs Deleted
ModifiedCAPs UnicodeStringCAPs Modified
AsIsCAPs UnicodeStringCAPs As-Is

References #

Event ID 4820 — A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Recommended (ASD, others)
Opcode
Info

Description

A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Message #

A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.

Account Information:
	Account Name: %1
	Supplied Realm Name: %2
	User ID: %3

Authentication Policy Information:
	Silo Name: %16
	Policy Name: %17
	TGT Lifetime: %18

Device Information:
	Device Name: %4

Service Information:
	Service Name: %5
	Service ID: %6

Network Information:
	Client Address: %11
	Client Port: %12

Additional Information:
	Ticket Options: %7
	Result Code: %8
	Ticket Encryption Type: %9
	Pre-Authentication Type: %10

Certificate Information:
	Certificate Issuer Name: %13
	Certificate Serial Number: %14
	Certificate Thumbprint: %15

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields #

NameDescription
Account_Name UnicodeString[Account Information] Account Name.
Supplied_Realm_Name UnicodeString[Account Information] Supplied Realm Name.
User_ID SID[Account Information] User ID.
Device_Name UnicodeString[Device Information] Device Name.
Service_Name UnicodeString[Service Information] Service Name.
Service_ID SID[Service Information] Service ID.
Ticket_Options HexInt32[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Result_Code HexInt32[Additional Information] Result Code.
Known values
0x0
KDC_ERR_NONE (Success)
0x1
KDC_ERR_NAME_EXP
0x2
KDC_ERR_SERVICE_EXP
0x3
KDC_ERR_BAD_PVNO
0x6
KDC_ERR_C_PRINCIPAL_UNKNOWN
0x7
KDC_ERR_S_PRINCIPAL_UNKNOWN
0x9
KDC_ERR_NULL_KEY
0xA
KDC_ERR_CANNOT_POSTDATE
0xC
KDC_ERR_POLICY
0xD
KDC_ERR_BADOPTION
0xE
KDC_ERR_ETYPE_NOSUPP
0x12
KDC_ERR_CLIENT_REVOKED
0x17
KDC_ERR_KEY_EXPIRED
0x18
KDC_ERR_PREAUTH_FAILED
0x19
KDC_ERR_PREAUTH_REQUIRED
0x1F
KRB_AP_ERR_BAD_INTEGRITY
0x20
KRB_AP_ERR_TKT_EXPIRED
0x21
KRB_AP_ERR_TKT_NYV
0x22
KRB_AP_ERR_REPEAT
0x25
KRB_AP_ERR_SKEW
0x29
KRB_AP_ERR_BADADDR
0x3C
KRB_ERR_GENERIC
0x44
KRB_ERR_WRONG_REALM
0x00000000
STATUS_SUCCESS
0xC0000002
STATUS_NOT_IMPLEMENTED
0xC0000005
STATUS_ACCESS_VIOLATION
0xC0000008
STATUS_INVALID_HANDLE
0xC000000D
STATUS_INVALID_PARAMETER
0xC0000017
STATUS_NO_MEMORY
0xC0000022
STATUS_ACCESS_DENIED
0xC0000034
STATUS_OBJECT_NAME_NOT_FOUND
0xC0000035
STATUS_OBJECT_NAME_COLLISION
0xC000003A
STATUS_OBJECT_PATH_NOT_FOUND
0xC0000043
STATUS_SHARING_VIOLATION
0xC0000056
STATUS_DELETE_PENDING
0xC000005E
STATUS_NO_LOGON_SERVERS
0xC0000061
STATUS_PRIVILEGE_NOT_HELD
0xC0000062
STATUS_INVALID_ACCOUNT_NAME
0xC0000064
STATUS_NO_SUCH_USER
0xC0000065
STATUS_GROUP_EXISTS
0xC0000066
STATUS_NO_SUCH_GROUP
0xC0000067
STATUS_MEMBER_IN_GROUP
0xC0000068
STATUS_MEMBER_NOT_IN_GROUP
0xC000006A
STATUS_WRONG_PASSWORD
0xC000006B
STATUS_ILL_FORMED_PASSWORD
0xC000006C
STATUS_PASSWORD_RESTRICTION
0xC000006D
STATUS_LOGON_FAILURE
0xC000006E
STATUS_ACCOUNT_RESTRICTION
0xC000006F
STATUS_INVALID_LOGON_HOURS
0xC0000070
STATUS_INVALID_WORKSTATION
0xC0000071
STATUS_PASSWORD_EXPIRED
0xC0000072
STATUS_ACCOUNT_DISABLED
0xC0000073
STATUS_NONE_MAPPED
0xC0000074
STATUS_TOO_MANY_LUIDS_REQUESTED
0xC0000076
STATUS_INVALID_SUB_AUTHORITY
0xC0000077
STATUS_INVALID_ACL
0xC0000078
STATUS_INVALID_SID
0xC0000079
STATUS_INVALID_SECURITY_DESCR
0xC000007C
STATUS_NO_TOKEN
0xC000009A
STATUS_INSUFFICIENT_RESOURCES
0xC00000A5
STATUS_BAD_IMPERSONATION_LEVEL
0xC00000BB
STATUS_NOT_SUPPORTED
0xC00000CC
STATUS_BAD_NETWORK_NAME
0xC00000DC
STATUS_INVALID_SERVER_STATE
0xC00000E5
STATUS_INTERNAL_ERROR
0xC00000ED
STATUS_NOT_LOGON_PROCESS
0xC0000106
STATUS_NAME_TOO_LONG
0xC000010A
STATUS_PROCESS_IS_TERMINATING
0xC0000120
STATUS_CANCELLED
0xC0000121
STATUS_CANNOT_DELETE
0xC0000133
STATUS_TIME_DIFFERENCE_AT_DC
0xC000015B
STATUS_LOGON_TYPE_NOT_GRANTED
0xC000018A
STATUS_NO_TRUST_LSA_SECRET
0xC000018B
STATUS_NO_TRUST_SAM_ACCOUNT
0xC000018C
STATUS_TRUSTED_DOMAIN_FAILURE
0xC000018D
STATUS_TRUSTED_RELATIONSHIP_FAILURE
0xC0000190
STATUS_TRUST_FAILURE
0xC0000192
STATUS_NETLOGON_NOT_STARTED
0xC0000193
STATUS_ACCOUNT_EXPIRED
0xC0000198
STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT
0xC0000199
STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
0xC000019A
STATUS_NOLOGON_SERVER_TRUST_ACCOUNT
0xC0000224
STATUS_PASSWORD_MUST_CHANGE
0xC0000225
STATUS_NOT_FOUND
0xC0000233
STATUS_DOMAIN_CONTROLLER_NOT_FOUND
0xC0000234
STATUS_ACCOUNT_LOCKED_OUT
0xC0000236
STATUS_CONNECTION_REFUSED
0xC000035B
STATUS_BAD_BINDINGS
0xC0000380
STATUS_SMARTCARD_WRONG_PIN
0xC0000381
STATUS_SMARTCARD_CARD_BLOCKED
0xC0000386
STATUS_SMARTCARD_NO_KEYSET
0xC0000387
STATUS_SMARTCARD_IO_ERROR
0xC0000388
STATUS_DOWNGRADE_DETECTED
0xC0000389
STATUS_SMARTCARD_CERT_REVOKED
0xC0000408
STATUS_USER2USER_REQUIRED
0xC0000409
STATUS_STACK_BUFFER_OVERRUN
0xC0000413
STATUS_AUTHENTICATION_FIREWALL_FAILED
Ticket_Encryption_Type HexInt32[Additional Information] Ticket Encryption Type.
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
PreAuthentication_Type UnicodeString[Additional Information] Pre-Authentication Type.
Known values
0
PA-NONE
2
PA-ENC-TIMESTAMP
11
PA-ETYPE-INFO
14
PA-PK-AS-REQ-OLD
15
PA-PK-AS-REQ
16
PA-PK-AS-REP
17
PA-ETYPE-INFO2
19
PA-ETYPE-INFO2
20
PA-SVR-REFERRAL-INFO
128
PA-SUPPORTED-ENCTYPES
129
PA-PAC-OPTIONS
165
PA-SPAKE
Client_Address UnicodeString[Network Information] Client Address.
Client_Port UnicodeString[Network Information] Client Port.
Certificate_Issuer_Name UnicodeString[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number UnicodeString[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint UnicodeString[Certificate Information] Certificate Thumbprint.
Silo_Name UnicodeString[Authentication Policy Information] Silo Name.
Policy_Name UnicodeString[Authentication Policy Information] Policy Name.
TGT_Lifetime UInt32[Authentication Policy Information] TGT Lifetime.
TargetUserName UnicodeString[Account Information] Account Name
TargetDomainName UnicodeString[Account Information] Supplied Realm Name
TargetSid SID[Account Information] User ID
DeviceName UnicodeString[Device Information] Device Name
ServiceName UnicodeString[Service Information] Service Name
ServiceSid SID[Service Information] Service ID
TicketOptions HexInt32[Additional Information] Ticket Options
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Status HexInt32[Additional Information] Result Code NTSTATUS reference
TicketEncryptionType HexInt32[Additional Information] Ticket Encryption Type
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
PreAuthType UnicodeString[Additional Information] Pre-Authentication Type
Known values
0
PA-NONE
2
PA-ENC-TIMESTAMP
11
PA-ETYPE-INFO
14
PA-PK-AS-REQ-OLD
15
PA-PK-AS-REQ
16
PA-PK-AS-REP
17
PA-ETYPE-INFO2
19
PA-ETYPE-INFO2
20
PA-SVR-REFERRAL-INFO
128
PA-SUPPORTED-ENCTYPES
129
PA-PAC-OPTIONS
165
PA-SPAKE
IpAddress UnicodeString[Network Information] Client Address
IpPort UnicodeString[Network Information] Client Port
CertIssuerName UnicodeString[Certificate Information] Certificate Issuer Name
CertSerialNumber UnicodeString[Certificate Information] Certificate Serial Number
CertThumbprint UnicodeString[Certificate Information] Certificate Thumbprint
SiloName UnicodeString[Authentication Policy Information] Silo Name
PolicyName UnicodeString[Authentication Policy Information] Policy Name
TGTLifetime UInt32[Authentication Policy Information] TGT Lifetime

References #

Event ID 4821 — A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Recommended (ASD)
Opcode
Info

Description

A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.

Message #

A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.

Account Information:
	Account Name: %1
	Account Domain: %2
	Logon GUID: %11

Authentication Policy Information:
	Silo Name: %13
	Policy Name: %14

Device Information:
	Device Name: %3

Service Information:
	Service Name: %4
	Service ID: %5

Network Information:
	Client Address: %8
	Client Port: %9

Additional Information:
	Ticket Options: %6
	Ticket Encryption Type: %7
	Failure Code: %10
	Transited Services: %12

This event is generated every time access is requested to a resource such as a computer or a Windows service.  The service name indicates the resource to which access was requested.

This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event.  The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.

Ticket options, encryption types, and failure codes are defined in RFC 4120.

Fields #

NameDescription
Account_Name UnicodeString[Account Information] Account Name.
Account_Domain UnicodeString[Account Information] Account Domain.
Device_Name UnicodeString[Device Information] Device Name.
Service_Name UnicodeString[Service Information] Service Name. Indicates the resource to which access was requested.
Service_ID SID[Service Information] Service ID.
Ticket_Options HexInt32[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Ticket_Encryption_Type HexInt32[Additional Information] Ticket Encryption Type.
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
Client_Address UnicodeString[Network Information] Client Address.
Client_Port UnicodeString[Network Information] Client Port.
Failure_Code HexInt32[Additional Information] Failure Code. NTSTATUS reference
Logon_GUID GUID[Account Information] Logon GUID.
Transited_Services UnicodeString[Additional Information] Transited Services.
Silo_Name UnicodeString[Authentication Policy Information] Silo Name.
Policy_Name UnicodeString[Authentication Policy Information] Policy Name.
TargetUserName UnicodeString[Account Information] Account Name
TargetDomainName UnicodeString[Account Information] Account Domain
DeviceName UnicodeString[Device Information] Device Name
ServiceName UnicodeString[Service Information] Service Name
ServiceSid SID[Service Information] Service ID
TicketOptions HexInt32[Additional Information] Ticket Options
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
TicketEncryptionType HexInt32[Additional Information] Ticket Encryption Type
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
IpAddress UnicodeString[Network Information] Client Address
IpPort UnicodeString[Network Information] Client Port
Status HexInt32[Additional Information] Failure Code NTSTATUS reference
LogonGuid GUID[Account Information] Logon GUID
TransitedServices UnicodeString[Additional Information] Transited Services
SiloName UnicodeString[Authentication Policy Information] Silo Name
PolicyName UnicodeString[Authentication Policy Information] Policy Name

References #

Event ID 4822 — NTLM authentication failed because the account was a member of the Protected User group.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Recommended (ASD)
Opcode
Info

Description

NTLM authentication failed because the account was a member of the Protected User group.

Message #

NTLM authentication failed because the account was a member of the Protected User group.

Account Name: %1
Device Name: %2
Error Code: %3

Fields #

NameDescription
Account_Name UnicodeString
Device_Name UnicodeString
Error_Code HexInt32
AccountName UnicodeStringAccount Name
DeviceName UnicodeStringDevice Name
Status HexInt32Error Code NTSTATUS reference

Community Notes #

NTLM authentication was blocked because the account is a member of the Protected Users group. Protected Users cannot authenticate via NTLM.

The Status field is an NTSTATUS code:

CodeNameDescription
0xC000006DSTATUS_LOGON_FAILUREGeneric failure
0xC000006ESTATUS_ACCOUNT_RESTRICTIONProtected User restriction prevented NTLM

References #

Event ID 4823 — NTLM authentication failed because access control restrictions are required.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

NTLM authentication failed because access control restrictions are required.

Message #

NTLM authentication failed because access control restrictions are required.

Account Name: %1
Device Name: %2
Error Code: %3

Authentication Policy Information:
	Silo Name: %4
	PolicyName: %5

Fields #

NameDescription
Account_Name UnicodeString
Device_Name UnicodeString
Error_Code HexInt32
Silo_Name UnicodeString[Authentication Policy Information] Silo Name.
PolicyName UnicodeString[Authentication Policy Information] PolicyName.
AccountName UnicodeStringAccount Name
DeviceName UnicodeStringDevice Name
Status HexInt32Error Code NTSTATUS reference
SiloName UnicodeString[Authentication Policy Information] Silo Name

Community Notes #

NTLM authentication was blocked by access control restrictions (authentication policy or silo).

The Status field is an NTSTATUS code:

CodeNameDescription
0xC000006DSTATUS_LOGON_FAILUREGeneric failure
0xC0000413STATUS_AUTHENTICATION_FIREWALL_FAILEDBlocked by authentication policy/silo

References #

Event ID 4824 — Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Recommended (ASD)
Opcode
Info

Description

Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.

Message #

Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.

Account Information:
	Security ID: %2
	Account Name: %1

Service Information:
	Service Name: %3

Network Information:
	Client Address: %7
	Client Port: %8

Additional Information:
	Ticket Options: %4
	Failure Code: %5
	Pre-Authentication Type: %6

Certificate Information:
	Certificate Issuer Name: %9
	Certificate Serial Number: %10
	Certificate Thumbprint: %11

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.

Fields #

NameDescription
Account_Name UnicodeString[Account Information] Account Name.
Security_ID SID[Account Information] Security ID.
Service_Name UnicodeString[Service Information] Service Name.
Ticket_Options HexInt32[Additional Information] Ticket Options. Was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Failure_Code HexInt32[Additional Information] Failure Code. NTSTATUS reference
PreAuthentication_Type UnicodeString[Additional Information] Pre-Authentication Type.
Known values
0
PA-NONE
2
PA-ENC-TIMESTAMP
11
PA-ETYPE-INFO
14
PA-PK-AS-REQ-OLD
15
PA-PK-AS-REQ
16
PA-PK-AS-REP
17
PA-ETYPE-INFO2
19
PA-ETYPE-INFO2
20
PA-SVR-REFERRAL-INFO
128
PA-SUPPORTED-ENCTYPES
129
PA-PAC-OPTIONS
165
PA-SPAKE
Client_Address UnicodeString[Network Information] Client Address.
Client_Port UnicodeString[Network Information] Client Port.
Certificate_Issuer_Name UnicodeString[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number UnicodeString[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint UnicodeString[Certificate Information] Certificate Thumbprint.
TargetUserName UnicodeString[Account Information] Account Name
TargetSid SID[Account Information] Security ID
ServiceName UnicodeString[Service Information] Service Name
TicketOptions HexInt32[Additional Information] Ticket Options
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Status HexInt32[Additional Information] Failure Code NTSTATUS reference
PreAuthType UnicodeString[Additional Information] Pre-Authentication Type
Known values
0
PA-NONE
2
PA-ENC-TIMESTAMP
11
PA-ETYPE-INFO
14
PA-PK-AS-REQ-OLD
15
PA-PK-AS-REQ
16
PA-PK-AS-REP
17
PA-ETYPE-INFO2
19
PA-ETYPE-INFO2
20
PA-SVR-REFERRAL-INFO
128
PA-SUPPORTED-ENCTYPES
129
PA-PAC-OPTIONS
165
PA-SPAKE
IpAddress UnicodeString[Network Information] Client Address
IpPort UnicodeString[Network Information] Client Port
CertIssuerName UnicodeString[Certificate Information] Certificate Issuer Name
CertSerialNumber UnicodeString[Certificate Information] Certificate Serial Number
CertThumbprint UnicodeString[Certificate Information] Certificate Thumbprint

References #

Event ID 4825 — A user was denied the access to Remote Desktop.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group.

Message #

A user was denied the access to Remote Desktop. By default, users are allowed to connect only if they are members of the Remote Desktop Users group or Administrators group.

Subject:
	User Name: %1
	Domain: %2
	Logon ID: %3

Additional Information:
	Client Address: %4


This event is generated when an authenticated user who is not allowed to log on remotely attempts to connect to this computer through Remote Desktop.

Fields #

NameDescription
User_Name[Subject] User Name.
Domain[Subject] Domain.
Logon_ID[Subject] Logon ID.
Client_Address[Additional Information] Client Address.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4825,
    "version": 0,
    "level": 0,
    "task": 12551,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2020-07-12T05:27:05.579704Z",
    "event_record_id": 1231498,
    "correlation": {},
    "execution": {
      "process_id": 464,
      "thread_id": 992
    },
    "channel": "Security",
    "computer": "fs02.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "AccountName": "svc6test1",
    "AccountDomain": "OFFSEC",
    "LogonID": "0x3457272",
    "ClientAddress": "10.23.23.9"
  }
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Denied Access To Remote Desktop source medium: This event is generated when an authenticated user who is not allowed to log on remotely attempts to connect to this computer through Remote Desktop. Often, this event can be generated by attackers when searching for available windows servers in the network.

References #

Event ID 4826 — Boot Configuration Data loaded.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Recommended (JSCU-NL)
Opcode
Info

Description

Boot Configuration Data loaded.

Message #

Boot Configuration Data loaded.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

General Settings:
	Load Options: %5
	Advanced Options: %6
	Configuration Access Policy: %7
	System Event Logging: %8
	Kernel Debugging: %9
	VSM Launch Type: %10

Signature Settings:
	Test Signing: %11
	Flight Signing: %12
	Disable Integrity Checks: %13

HyperVisor Settings:
	HyperVisor Load Options: %14
	HyperVisor Launch Type: %15
	HyperVisor Debugging: %16

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
LoadOptions UnicodeString[General Settings] Load Options.
AdvancedOptions UnicodeString[General Settings] Advanced Options.
ConfigAccessPolicy UnicodeString[General Settings] Configuration Access Policy.
RemoteEventLogging UnicodeString[General Settings] System Event Logging.
KernelDebug UnicodeString[General Settings] Kernel Debugging.
VsmLaunchType UnicodeString[General Settings] VSM Launch Type.
TestSigning UnicodeString[Signature Settings] Test Signing.
FlightSigning UnicodeString[Signature Settings] Flight Signing.
DisableIntegrityChecks UnicodeString[Signature Settings] Disable Integrity Checks.
HypervisorLoadOptions UnicodeString[HyperVisor Settings] HyperVisor Load Options.
HypervisorLaunchType UnicodeString[HyperVisor Settings] HyperVisor Launch Type.
HypervisorDebug UnicodeString[HyperVisor Settings] HyperVisor Debugging.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4826,
    "version": 0,
    "level": 0,
    "task": 13573,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:19.637649+00:00",
    "event_record_id": 2743,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 96
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "-",
    "SubjectDomainName": "-",
    "SubjectLogonId": "0x3e7",
    "LoadOptions": "-",
    "AdvancedOptions": "%%1843",
    "ConfigAccessPolicy": "%%1846",
    "RemoteEventLogging": "%%1843",
    "KernelDebug": "%%1843",
    "VsmLaunchType": "%%1849",
    "TestSigning": "%%1843",
    "FlightSigning": "%%1843",
    "DisableIntegrityChecks": "%%1843",
    "HypervisorLoadOptions": "-",
    "HypervisorLaunchType": "%%1849",
    "HypervisorDebug": "%%1843"
  },
  "message": ""
}

References #

Event ID 4830 — SID History was removed from an account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

SID History was removed from an account.

Message #

SID History was removed from an account.

Subject:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9

Target Account:
	Security ID: %5
	Account Name: %3
	Account Domain: %4

Additional Information:
	Privileges: %10
	SID List: %11

Fields #

NameDescription
Account_Name
Account_Domain
Security_ID[Target Account] Account Name.
Security_ID[Target Account] Account Domain.
Account_Name[Target Account] Security ID.
Account_Domain[Subject] Security ID.
Logon_ID[Subject] Account Name.
Privileges[Subject] Account Domain. Privilege constants reference
SID_List[Subject] Logon ID.
SourceUserName UnicodeString
SourceSid SID
TargetUserName UnicodeString[Target Account] Account Name
TargetDomainName UnicodeString[Target Account] Account Domain
TargetSid SID[Target Account] Security ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PrivilegeList UnicodeString[Additional Information] Privileges Privilege constants reference
SidList UnicodeString[Additional Information] SID List

References #

Event ID 4864 — A namespace collision was detected.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A namespace collision was detected.

Message #

A namespace collision was detected.

Target Type: %1
Target Name: %2
Forest Root: %3
Top Level Name: %4
DNS Name: %5
NetBIOS Name: %6
Security ID: %7
New Flags: %8

Fields #

NameDescription
Target_Type UInt32
Target_Name UnicodeString
Forest_Root UnicodeString
Top_Level_Name UnicodeString
DNS_Name UnicodeString
NetBIOS_Name UnicodeString
Security_ID SID
New_Flags UInt32
CollisionTargetType UInt32Target Type
CollisionTargetName UnicodeStringTarget Name
ForestRoot UnicodeStringForest Root
TopLevelName UnicodeStringTop Level Name
DnsName UnicodeStringDNS Name
NetbiosName UnicodeStringNetBIOS Name
DomainSid SIDSecurity ID
Flags UInt32New Flags

References #

Event ID 4865 — A trusted forest information entry was added.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A trusted forest information entry was added.

Message #

A trusted forest information entry was added.

Subject:
	Security ID: %10
	Account Name: %11
	Account Domain: %12
	Logon ID: %13

Trust Information:
	Forest Root: %1
	Forest Root SID: %2
	Operation ID: %3
	Entry Type: %4
	Flags: %5
	Top Level Name: %6
	DNS Name: %7
	NetBIOS Name: %8
	Domain SID: %9

Fields #

NameDescription
Forest_Root[Trust Information] Forest Root.
Forest_Root_SID[Trust Information] Forest Root SID.
Operation_ID[Trust Information] Operation ID.
Entry_Type[Trust Information] Entry Type.
Flags UInt32[Trust Information] Flags.
Top_Level_Name[Trust Information] Top Level Name.
DNS_Name[Trust Information] DNS Name.
NetBIOS_Name[Trust Information] NetBIOS Name.
Domain_SID[Trust Information] Domain SID.
Security_ID[Subject] Security ID.
Account_Name[Subject] Account Name.
Account_Domain[Subject] Account Domain.
Logon_ID[Subject] Logon ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4865,
    "version": 0,
    "level": 0,
    "task": 13569,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2024-06-22T14:02:41.749935Z",
    "event_record_id": 3175613,
    "correlation": {},
    "execution": {
      "process_id": 596,
      "thread_id": 3360
    },
    "channel": "Security",
    "computer": "CDCWTRDC01.mypartner.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ForestRoot": "rootblue.lan",
    "ForestRootSid": "S-1-5-21-392370121-190461309-2151315433",
    "OperationId": "0xffadf358",
    "EntryType": 0,
    "Flags": 0,
    "TopLevelName": "rootblue.lan",
    "DnsName": "-",
    "NetbiosName": "-",
    "DomainSid": "S-1-0-0",
    "SubjectUserSid": "S-1-5-21-1407145384-2259788832-4099636412-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "MYPARTNER",
    "SubjectLogonId": "0xffad8559"
  }
}

References #

Event ID 4866 — A trusted forest information entry was removed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A trusted forest information entry was removed.

Message #

A trusted forest information entry was removed.

Subject:
	Security ID: %10
	Account Name: %11
	Account Domain: %12
	Logon ID: %13

Trust Information:
	Forest Root: %1
	Forest Root SID: %2
	Operation ID: %3
	Entry Type: %4
	Flags: %5
	Top Level Name: %6
	DNS Name: %7
	NetBIOS Name: %8
	Domain SID: %9

Fields #

NameDescription
Forest_Root UnicodeString[Trust Information] Forest Root.
Forest_Root_SID SID[Trust Information] Forest Root SID.
Operation_ID HexInt64[Trust Information] Operation ID.
Entry_Type UInt32[Trust Information] Entry Type.
Flags UInt32[Trust Information] Flags.
Top_Level_Name UnicodeString[Trust Information] Top Level Name.
DNS_Name UnicodeString[Trust Information] DNS Name.
NetBIOS_Name UnicodeString[Trust Information] NetBIOS Name.
Domain_SID SID[Trust Information] Domain SID.
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
ForestRoot UnicodeString[Trust Information] Forest Root
ForestRootSid SID[Trust Information] Forest Root SID
OperationId HexInt64[Trust Information] Operation ID
EntryType UInt32[Trust Information] Entry Type
TopLevelName UnicodeString[Trust Information] Top Level Name
DnsName UnicodeString[Trust Information] DNS Name
NetbiosName UnicodeString[Trust Information] NetBIOS Name
DomainSid SID[Trust Information] Domain SID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID

References #

Event ID 4867 — A trusted forest information entry was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authentication Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A trusted forest information entry was modified.

Message #

A trusted forest information entry was modified.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Trust Information:
	Forest Root: %5
	Forest Root SID: %6
	Operation ID: %7
	Entry Type: %8
	Flags: %9
	Top Level Name: %10
	DNS Name: %11
	NetBIOS Name: %12
	Domain SID: %13

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Forest_Root UnicodeString[Trust Information] Forest Root.
Forest_Root_SID SID[Trust Information] Forest Root SID.
Operation_ID HexInt64[Trust Information] Operation ID.
Entry_Type UInt32[Trust Information] Entry Type.
Flags UInt32[Trust Information] Flags.
Top_Level_Name UnicodeString[Trust Information] Top Level Name.
DNS_Name UnicodeString[Trust Information] DNS Name.
NetBIOS_Name UnicodeString[Trust Information] NetBIOS Name.
Domain_SID SID[Trust Information] Domain SID.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ForestRoot UnicodeString[Trust Information] Forest Root
ForestRootSid SID[Trust Information] Forest Root SID
OperationId HexInt64[Trust Information] Operation ID
EntryType UInt32[Trust Information] Entry Type
TopLevelName UnicodeString[Trust Information] Top Level Name
DnsName UnicodeString[Trust Information] DNS Name
NetbiosName UnicodeString[Trust Information] NetBIOS Name
DomainSid SID[Trust Information] Domain SID

References #

Event ID 4868 — The certificate manager denied a pending certificate request.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The certificate manager denied a pending certificate request.

Message #

The certificate manager denied a pending certificate request.
	
Request ID: %1

Fields #

NameDescription
RequestId UnicodeStringRequest ID
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Request_ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4868,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:08:24.594746+00:00",
    "event_record_id": 16623084,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 7996
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "25",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4869 — Certificate Services received a resubmitted certificate request.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services received a resubmitted certificate request.

Message #

Certificate Services received a resubmitted certificate request.
	
Request ID: %1

Fields #

NameDescription
RequestId UnicodeStringRequest ID
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Request_ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4869,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:08:24.180321+00:00",
    "event_record_id": 16623046,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 7996
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "24",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4870 — Certificate Services revoked a certificate.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

Certificate Services revoked a certificate.

Message #

Certificate Services revoked a certificate.
	
Serial Number: %1
Reason: %2

Fields #

NameDescription
CertificateSerialNumber UnicodeStringSerial Number
RevocationReason UnicodeStringReason
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Serial_Number
Reason

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4870,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:33:19.492410+00:00",
    "event_record_id": 16716905,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 10484
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "CertificateSerialNumber": "610000002bdea5d59e7a0734f300000000002b",
    "RevocationReason": "1",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4871 — Certificate Services received a request to publish the certificate revocation list (CRL).

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services received a request to publish the certificate revocation list (CRL).

Message #

Certificate Services received a request to publish the certificate revocation list (CRL).
	
Next Update: %1
Publish Base: %2
Publish Delta: %3

Fields #

NameDescription
NextUpdate UnicodeStringNext Update
NextPublishForBaseCRL UnicodeStringPublish Base
NextPublishForDeltaCRL UnicodeStringPublish Delta
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Next_Update
Publish_Base
Publish_Delta

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4871,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:22.125599+00:00",
    "event_record_id": 16618007,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 10928
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "NextUpdate": "0",
    "NextPublishForBaseCRL": "Yes",
    "NextPublishForDeltaCRL": "No",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4872 — Certificate Services published the certificate revocation list (CRL).

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services published the certificate revocation list (CRL).

Message #

Certificate Services published the certificate revocation list (CRL).
	
Base CRL: %1
CRL Number: %2
Key Container: %3
Next Publish: %4
Publish URLs: %5

Fields #

NameDescription
IsBaseCRL UnicodeStringBase CRL
CRLNumber UnicodeStringCRL Number
KeyContainer UnicodeStringKey Container
NextPublish UnicodeStringNext Publish
PublishURLs UnicodeStringPublish URLs
Base_CRL UnicodeString
CRL_Number UnicodeString
Key_Container UnicodeString
Next_Publish UnicodeString
Publish_URLs UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4872,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:22.155871+00:00",
    "event_record_id": 16618025,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 11144
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "IsBaseCRL": "Yes",
    "CRLNumber": "12",
    "KeyContainer": "EvtGen-Root-CA",
    "NextPublish": "3/20/2026 11:06 PM 22.125s",
    "PublishURLs": "C:\\Windows\\system32\\CertSrv\\CertEnroll\\EvtGen-Root-CA.crl; ldap:///CN=EvtGen-Root-CA,CN=LAB-DC01,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=ludus,DC=domain; http://crl.ludus.domain/crldist/EvtGen-Root-CA.crl; "
  },
  "message": ""
}

References #

Event ID 4873 — A certificate request extension changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A certificate request extension changed.

Message #

A certificate request extension changed.
	
Request ID: %1
Name: %2
Type: %3
Flags: %4
Data: %5

Fields #

NameDescription
RequestId UnicodeStringRequest ID
ExtensionName UnicodeStringName
ExtensionDataType UnicodeStringType
ExtensionPolicyFlags UnicodeStringFlags
ExtensionData UnicodeStringData
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Request_ID
Name
Type
Flags
Data

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4873,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:33:40.140844+00:00",
    "event_record_id": 16717578,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 13880
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "44",
    "ExtensionName": "2.5.29.17",
    "ExtensionDataType": "4",
    "ExtensionPolicyFlags": "0",
    "ExtensionData": "MwAwADIAMAA4ADIAMQAyADYAZAA2AGYANgA0ADYAOQA2ADYANgA5ADYANQA2ADQA\r\nMgBlADYAYwA3ADUANgA0ADcANQA3ADMAMgBlADYANAA2AGYANgBkADYAMQA2ADkA\r\nNgBlAAAA\r\n",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4874 — One or more certificate request attributes changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

One or more certificate request attributes changed.

Message #

One or more certificate request attributes changed.
	
Request ID: %1
Attributes: %2

Fields #

NameDescription
RequestId UnicodeStringRequest ID
Attributes UnicodeStringAttributes
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Request_ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4874,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:33:40.086555+00:00",
    "event_record_id": 16717575,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 13880
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "44",
    "Attributes": "CertificateTemplate:WebServer\nSAN:dns=modified.ludus.domain",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4875 — Certificate Services received a request to shut down.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services received a request to shut down.

Message #

Certificate Services received a request to shut down.

Fields #

NameDescription
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

References #

Event ID 4876 — Certificate Services backup started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services backup started.

Message #

Certificate Services backup started.

Backup Type: %1

Fields #

NameDescription
Backup_Type

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4876,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2024-09-03T10:41:30.959534Z",
    "event_record_id": 376329,
    "correlation": {
      "#attributes": {
        "ActivityID": "D702B00C-FB0E-0000-8CB1-02D70EFBDA01"
      }
    },
    "execution": {
      "process_id": 640,
      "thread_id": 4156
    },
    "channel": "Security",
    "computer": "CDCWPKI01.rootblue.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "BackupType": "1",
    "SubjectUserSid": "S-1-5-21-392370121-190461309-2151315433-1108",
    "SubjectUserName": "domadm",
    "SubjectDomainName": "ROOTBLUE",
    "SubjectLogonId": "0x91861a6"
  }
}

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Steal Authentication Certificates CS Backup source: The following analytic identifies the backup of the Active Directory Certificate Services (AD CS) store, detected via Event ID 4876. This event is logged when a backup is performed using the CertSrv.msc UI or the CertUtil.exe -BackupDB command. Monitoring this activity is crucial as unauthorized backups can indicate an attempt to steal authentication certificates, which are critical for secure communications. If confirmed malicious, this activity could allow an attacker to impersonate users, escalate privileges, or access sensitive information, severely compromising the security of the environment.

References #

Event ID 4877 — Certificate Services backup completed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services backup completed.

Message #

Certificate Services backup completed.

Fields #

NameDescription
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4877,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2024-09-03T10:41:31.145540Z",
    "event_record_id": 376330,
    "correlation": {
      "#attributes": {
        "ActivityID": "D702B00C-FB0E-0000-8CB1-02D70EFBDA01"
      }
    },
    "execution": {
      "process_id": 640,
      "thread_id": 4156
    },
    "channel": "Security",
    "computer": "CDCWPKI01.rootblue.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-392370121-190461309-2151315433-1108",
    "SubjectUserName": "domadm",
    "SubjectDomainName": "ROOTBLUE",
    "SubjectLogonId": "0x91861a6"
  }
}

References #

Event ID 4878 — Certificate Services restore started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services restore started.

Message #

Certificate Services restore started.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4878,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:07:16.319460+00:00",
    "event_record_id": 16620403,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 7996
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 4879 — Certificate Services restore completed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services restore completed.

Message #

Certificate Services restore completed.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4879,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:07:16.488901+00:00",
    "event_record_id": 16620407,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 10556
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 4880 — Certificate Services started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

Certificate Services started.

Message #

Certificate Services started.
	
Certificate Database Hash: %1
Private Key Usage Count: %2
CA Certificate Hash: %3
CA Public Key Hash: %4

Fields #

NameDescription
CertificateDatabaseHash UnicodeStringCertificate Database Hash
PrivateKeyUsageCount UnicodeStringPrivate Key Usage Count
CACertificateHash UnicodeStringCA Certificate Hash
CAPublicKeyHash UnicodeStringCA Public Key Hash
Certificate_Database_Hash UnicodeString
Private_Key_Usage_Count UnicodeString
CA_Certificate_Hash UnicodeString
CA_Public_Key_Hash UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4880,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:16.234546+00:00",
    "event_record_id": 16617450,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 11176
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "CertificateDatabaseHash": "39 e5 71 24 c8 5b 7c 70 eb b5 fe f2 ad a7 5a 6e 86 f3 07 b7 31 99 8a b1 58 99 bd e2 05 c3 cf d8",
    "PrivateKeyUsageCount": "0",
    "CACertificateHash": "8e ae 36 d1 31 a0 5b f0 26 c6 a5 88 f9 49 6a 8a 61 7a f2 47",
    "CAPublicKeyHash": "10 fd 42 f3 9a b3 ca e2 96 a8 46 58 af 42 91 9d 14 c5 0f 27"
  },
  "message": ""
}

References #

Event ID 4881 — Certificate Services stopped.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

Certificate Services stopped.

Message #

Certificate Services stopped.
	
Certificate Database Hash: %1
Private Key Usage Count: %2
CA Certificate Hash: %3
CA Public Key Hash: %4

Fields #

NameDescription
CertificateDatabaseHash UnicodeStringCertificate Database Hash
PrivateKeyUsageCount UnicodeStringPrivate Key Usage Count
CACertificateHash UnicodeStringCA Certificate Hash
CAPublicKeyHash UnicodeStringCA Public Key Hash
Certificate_Database_Hash UnicodeString
Private_Key_Usage_Count UnicodeString
CA_Certificate_Hash UnicodeString
CA_Public_Key_Hash UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4881,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:22.990852+00:00",
    "event_record_id": 16618219,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 7996
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "CertificateDatabaseHash": "a0 ab 10 37 23 dd ba cf 3c 7d 38 4e dd 3a 27 c3 10 39 c7 cb 54 17 10 36 45 3a 7c 3d 63 42 83 55",
    "PrivateKeyUsageCount": "0",
    "CACertificateHash": "8e ae 36 d1 31 a0 5b f0 26 c6 a5 88 f9 49 6a 8a 61 7a f2 47",
    "CAPublicKeyHash": "10 fd 42 f3 9a b3 ca e2 96 a8 46 58 af 42 91 9d 14 c5 0f 27"
  },
  "message": ""
}

References #

Event ID 4882 — The security permissions for Certificate Services changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

The security permissions for Certificate Services changed.

Message #

The security permissions for Certificate Services changed.
	
%1

Fields #

NameDescription
SecuritySettings UnicodeString
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

Community Notes #

Records changes to a CA ACL, may indicate privilege escalation via addition of rogue accounts. Critical for detecting AD CS abuse.

References #

Event ID 4883 — Certificate Services retrieved an archived key.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services retrieved an archived key.

Message #

Certificate Services retrieved an archived key.
	
Request ID: %1

Fields #

NameDescription
Request_ID
RequestId UnicodeStringRequest ID
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

References #

Event ID 4884 — Certificate Services imported a certificate into its database.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services imported a certificate into its database.

Message #

Certificate Services imported a certificate into its database.
	
Certificate: %1
Request ID: %2

Fields #

NameDescription
Certificate UnicodeStringCertificate
Request_ID
RequestId UnicodeStringRequest ID
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

References #

Event ID 4885 — The audit filter for Certificate Services changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

The audit filter for Certificate Services changed.

Message #

The audit filter for Certificate Services changed.
	
Filter: %1

Fields #

NameDescription
Filter

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4885,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2024-09-03T10:42:09.373562Z",
    "event_record_id": 376331,
    "correlation": {
      "#attributes": {
        "ActivityID": "D702B00C-FB0E-0000-8CB1-02D70EFBDA01"
      }
    },
    "execution": {
      "process_id": 640,
      "thread_id": 4156
    },
    "channel": "Security",
    "computer": "CDCWPKI01.rootblue.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "AuditFilter": "111",
    "SubjectUserSid": "S-1-5-21-392370121-190461309-2151315433-1108",
    "SubjectUserName": "domadm",
    "SubjectDomainName": "ROOTBLUE",
    "SubjectLogonId": "0x91861a6"
  }
}

Community Notes #

May be a prelude to AD CS abuse, ie, ESC1/ESC5.

References #

Event ID 4886 — Certificate Services received a certificate request.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

Certificate Services received a certificate request.

Message #

Certificate Services received a certificate request.
	
Request ID: %1
Requester: %2
Attributes: %3

Fields #

NameDescription
RequestId UnicodeStringRequest ID
Requester UnicodeStringRequester
Attributes UnicodeStringAttributes
Request_ID UnicodeString
Subject UnicodeString
SubjectAlternativeName UnicodeString
CertificateTemplate UnicodeString
RequestOSVersion UnicodeString
RequestCSPProvider UnicodeString
RequestClientInfo UnicodeString
AuthenticationService UnicodeString
AuthenticationLevel UnicodeString
DCOMorRPC UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4886,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:08:24.051496+00:00",
    "event_record_id": 16623040,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 10928
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "24",
    "Requester": "ludus\\domainadmin",
    "Attributes": "\nccm:LAB-DC01.ludus.domain"
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Steal Authentication Certificates Certificate Request source: The following analytic detects when a new certificate is requested from Certificate Services - AD CS. It leverages Event ID 4886, which indicates that a certificate request has been received. This activity is significant because unauthorized certificate requests can be part of credential theft or lateral movement tactics. If confirmed malicious, an attacker could use the certificate to impersonate users, gain unauthorized access to resources, or establish persistent access within the environment. Monitoring and correlating this event with other suspicious activities is crucial for identifying potential security incidents.

References #

Event ID 4887 — Certificate Services approved a certificate request and issued a certificate.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

Certificate Services approved a certificate request and issued a certificate.

Message #

Certificate Services approved a certificate request and issued a certificate.
	
Request ID: %1
Requester: %2
Attributes: %3
Disposition: %4
SKI: %5
Subject: %6

Fields #

NameDescription
RequestId UnicodeStringRequest ID
Requester UnicodeStringRequester
Attributes UnicodeStringAttributes
Disposition UnicodeStringDisposition
SubjectKeyIdentifier UnicodeStringSKI
Subject UnicodeStringSubject
Request_ID UnicodeString
SKI UnicodeString
SubjectAlternativeName UnicodeString
CertificateTemplate UnicodeString
SerialNumber UnicodeString
AuthenticationService UnicodeString
AuthenticationLevel UnicodeString
DCOMorRPC UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4887,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:08:24.177448+00:00",
    "event_record_id": 16623045,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 7996
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "24",
    "Requester": "ludus\\domainadmin",
    "Attributes": "",
    "Disposition": "3",
    "SubjectKeyIdentifier": "9d 2a 4f df 25 5d c3 a7 d9 77 60 94 ce 67 60 01 e3 b3 d2 5a",
    "Subject": "CN=pending-test.ludus.domain"
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Steal Authentication Certificates Certificate Issued source: The following analytic identifies the issuance of a new certificate by Certificate Services - AD CS, detected via Event ID 4887. This event logs the requester user context, DNS hostname of the requesting machine, and the request time. Monitoring this activity is crucial as it can indicate potential misuse of authentication certificates. If confirmed malicious, an attacker could use the issued certificate to impersonate users, escalate privileges, or maintain persistence within the environment. This detection helps in identifying and correlating suspicious certificate-related activities for further investigation.

References #

Event ID 4888 — Certificate Services denied a certificate request.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

Certificate Services denied a certificate request.

Message #

Certificate Services denied a certificate request.
	
Request ID: %1
Requester: %2
Attributes: %3
Disposition: %4
SKI: %5
Subject: %6

Fields #

NameDescription
RequestId UnicodeStringRequest ID
Requester UnicodeStringRequester
Attributes UnicodeStringAttributes
Disposition UnicodeStringDisposition
SubjectKeyIdentifier UnicodeStringSKI
Subject UnicodeStringSubject
Request_ID UnicodeString
SKI UnicodeString
AuthenticationService UnicodeString
AuthenticationLevel UnicodeString
DCOMorRPC UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4888,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2026-03-13T23:08:24.592652+00:00",
    "event_record_id": 16623083,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 7996
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "25",
    "Requester": "ludus\\domainadmin",
    "Attributes": "",
    "Disposition": "2",
    "SubjectKeyIdentifier": "4b ac 66 32 5d 08 03 7f ab f7 57 ef c3 3d 27 1f 3b e0 3b 01",
    "Subject": ""
  },
  "message": ""
}

References #

Event ID 4889 — Certificate Services set the status of a certificate request to pending.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services set the status of a certificate request to pending.

Message #

Certificate Services set the status of a certificate request to pending.
	
Request ID: %1
Requester: %2
Attributes: %3
Disposition: %4
SKI: %5
Subject: %6

Fields #

NameDescription
RequestId UnicodeStringRequest ID
Requester UnicodeStringRequester
Attributes UnicodeStringAttributes
Disposition UnicodeStringDisposition
SubjectKeyIdentifier UnicodeStringSKI
Subject UnicodeStringSubject
Request_ID UnicodeString
SKI UnicodeString
AuthenticationService UnicodeString
AuthenticationLevel UnicodeString
DCOMorRPC UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4889,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:08:24.070591+00:00",
    "event_record_id": 16623042,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 7996
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RequestId": "24",
    "Requester": "ludus\\domainadmin",
    "Attributes": "\nccm:LAB-DC01.ludus.domain",
    "Disposition": "5",
    "SubjectKeyIdentifier": "9d 2a 4f df 25 5d c3 a7 d9 77 60 94 ce 67 60 01 e3 b3 d2 5a",
    "Subject": ""
  },
  "message": ""
}

References #

Event ID 4890 — The certificate manager settings for Certificate Services changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

The certificate manager settings for Certificate Services changed.

Message #

The certificate manager settings for Certificate Services changed.
	
Enable: %1

%2

Fields #

NameDescription
Enable
EnableRestrictedPermissions UnicodeStringEnable
RestrictedPermissions UnicodeString
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

Community Notes #

May indicate tampering with permissions to issue trusted certificates and impersonate any domain principal. Can detect AD CS abuse techniques, ie ESC1. Any Subject SID that is not NT AUTHORITY\SYSTEM or approved service identity indicates unauthorized privilege abuse.

References #

Event ID 4891 — A configuration entry changed in Certificate Services.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A configuration entry changed in Certificate Services.

Message #

A configuration entry changed in Certificate Services.
	
Node: %1
Entry: %2
Value: %3

Fields #

NameDescription
Node UnicodeStringNode
Entry UnicodeStringEntry
Value UnicodeStringValue
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

References #

Event ID 4892 — A property of Certificate Services changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A property of Certificate Services changed.

Message #

A property of Certificate Services changed.
	
Property: %1
Index: %2
Type: %3
Value: %4

Fields #

NameDescription
PropertyName UnicodeStringProperty
PropertyIndex UnicodeStringIndex
PropertyType UnicodeStringType
PropertyValue UnicodeStringValue
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Property
Index
Type
Value

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4892,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:17:14.657793+00:00",
    "event_record_id": 16671442,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 13940
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "PropertyName": "29",
    "PropertyIndex": "0",
    "PropertyType": "4",
    "PropertyValue": "EvtGen-CustomWebServer\n1.3.6.1.4.1.311.21.8.1810730.5534\nEvtGen-CustomUser\n1.3.6.1.4.1.311.21.8.7512348.7121\nDirectoryEmailReplication\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.29\nDomainControllerAuthentication\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.28\nKerberosAuthentication\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.33\nEFSRecovery\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.8\nEFS\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.6\nDomainController\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.15\nWebServer\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.16\nMachine\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.14\nUser\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.1\nSubCA\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.18\nAdministrator\n1.3.6.1.4.1.311.21.8.775220.14014963.4605844.12530099.11347655.157.1.7\nCodeSigning\n\n",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4893 — Certificate Services archived a key.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services archived a key.

Message #

Certificate Services archived a key.
	
Request ID: %1
Requester: %2
KRA Hashes: %3

Fields #

NameDescription
Request_ID UnicodeString
Requester UnicodeStringRequester
KRA_Hashes UnicodeString
RequestId UnicodeStringRequest ID
KRAHashes UnicodeStringKRA Hashes

References #

Event ID 4894 — Certificate Services imported and archived a key.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services imported and archived a key.

Message #

Certificate Services imported and archived a key.
	
Request ID: %1

Fields #

NameDescription
Request_ID
RequestId UnicodeStringRequest ID
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

References #

Event ID 4895 — Certificate Services published the CA certificate to Active Directory Domain Services.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Certificate Services published the CA certificate to Active Directory Domain Services.

Message #

Certificate Services published the CA certificate to Active Directory Domain Services.
	
Certificate Hash: %1
Valid From: %2
Valid To: %3

Fields #

NameDescription
Certificate_Hash UnicodeString
Valid_From UnicodeString
Valid_To UnicodeString
CertificateHash UnicodeStringCertificate Hash
ValidFrom UnicodeStringValid From
ValidTo UnicodeStringValid To

References #

Event ID 4896 — One or more rows have been deleted from the certificate database.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

One or more rows have been deleted from the certificate database.

Message #

One or more rows have been deleted from the certificate database.
	
Table ID: %1
Filter: %2
Rows Deleted: %3

Fields #

NameDescription
TableId UnicodeStringTable ID
Filter UnicodeStringFilter
RowsDeleted UnicodeStringRows Deleted
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
Table_ID
Rows_Deleted

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4896,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:33:29.866256+00:00",
    "event_record_id": 16717272,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 11540
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TableId": "0",
    "Filter": "2",
    "RowsDeleted": "1",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec"
  },
  "message": ""
}

References #

Event ID 4897 — Role separation enabled: RoleSeparationEnabled.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Role separation enabled: RoleSeparationEnabled.

Message #

Role separation enabled: %1

Fields #

NameDescription
RoleSeparationEnabled UnicodeStringRole separation enabled
Role_separation_enabled UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4897,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:06:16.234615+00:00",
    "event_record_id": 16617451,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 11176
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RoleSeparationEnabled": "No"
  },
  "message": ""
}

References #

Event ID 4898 — Certificate Services loaded a template.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

Certificate Services loaded a template.

Message #

Certificate Services loaded a template.

%1 v%2 (Schema V%3)
%4
%5

Template Information:
	Template Content: %7
	Security Descriptor: %8

Additional Information:
	Domain Controller: %6

Fields #

NameDescription
TemplateInternalName UnicodeString
TemplateVersion UnicodeStringv
TemplateSchemaVersion UnicodeString(Schema V
TemplateOID UnicodeString
TemplateDSObjectFQDN UnicodeString
DCDNSName UnicodeString[Additional Information] Domain Controller
TemplateContent UnicodeString[Template Information] Template Content
SecurityDescriptor UnicodeString[Template Information] Security Descriptor
Domain_Controller
Template_Content
Security_Descriptor

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4898,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:08:24.061177+00:00",
    "event_record_id": 16623041,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 10928
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TemplateInternalName": "WebServer",
    "TemplateVersion": "4.1",
    "TemplateSchemaVersion": "1",
    "TemplateOID": " ",
    "TemplateDSObjectFQDN": "CN=WebServer,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=ludus,DC=domain",
    "DCDNSName": "LAB-DC01.ludus.domain",
    "TemplateContent": "\nflags = 0x10241 (66113)\n  CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT -- 0x1\n  CT_FLAG_MACHINE_TYPE -- 0x40 (64)\n  CT_FLAG_ADD_TEMPLATE_NAME -- 0x200 (512)\n  CT_FLAG_IS_DEFAULT -- 0x10000 (65536)\n\nmsPKI-Private-Key-Flag = 0x0 (0)\n  CTPRIVATEKEY_FLAG_ATTEST_NONE -- 0x0\n  TEMPLATE_SERVER_VER_NONE<<CTPRIVATEKEY_FLAG_SERVERVERSION_SHIFT -- 0x0\n  TEMPLATE_CLIENT_VER_NONE<<CTPRIVATEKEY_FLAG_CLIENTVERSION_SHIFT -- 0x0\n\nmsPKI-Certificate-Name-Flag = 0x1 (1)\n  CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT -- 0x1\n\nmsPKI-Enrollment-Flag = 0x0 (0)\n\nmsPKI-Template-Schema-Version = 1\n\nrevision = 4\n\nmsPKI-Template-Minor-Revision = 1\n\npKIDefaultKeySpec = 1\n\npKIExpirationPeriod = 2 Years\n\npKIOverlapPeriod = 6 Weeks\n\ncn = WebServer\n\ndistinguishedName = WebServer\n\npKIKeyUsage = a0\n\ndisplayName = Web Server\n\ntemplateDescription = Computer\n\npKIExtendedKeyUsage =\n  1.3.6.1.5.5.7.3.1 Server Authentication\n\npKIDefaultCSPs =\n  Microsoft RSA SChannel Cryptographic Provider\n  Microsoft DH SChannel Cryptographic Provider\n\nmsPKI-Supersede-Templates =\n\nmsPKI-RA-Policies =\n\nmsPKI-RA-Application-Policies =\n\nmsPKI-Certificate-Policy =\n\nmsPKI-Certificate-Application-Policy =\n\npKICriticalExtensions =\n  2.5.29.15 Key Usage\n",
    "SecurityDescriptor": "O:S-1-5-21-1006758700-2167138679-1475694448-519G:S-1-5-21-1006758700-2167138679-1475694448-519D:PAI(OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;DA)(OA;;RPWPCR;0e10c968-78fb-11d2-90d4-00c04f79dc55;;S-1-5-21-1006758700-2167138679-1475694448-519)(A;;CCDCLCSWRPWPDTLOSDRCWDWO;;;DA)(A;;CCDCLCSWRPWPDTLOSDRCWDWO;;;S-1-5-21-1006758700-2167138679-1475694448-519)(A;;LCRPLORC;;;AU)\n\nAllow\tludus\\Domain Admins\n\tEnroll\nAllow\tludus\\Enterprise Admins\n\tEnroll\nAllow(0x000f00ff)\tludus\\Domain Admins\n\tFull Control\nAllow(0x000f00ff)\tludus\\Enterprise Admins\n\tFull Control\nAllow(0x00020094)\tNT AUTHORITY\\Authenticated Users\n\tRead\n"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 4899 — A Certificate Services template was updated.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A Certificate Services template was updated.

Message #

A Certificate Services template was updated.

%1 v%2 (Schema V%3)
%4
%5

Template Change Information:
	Old Template Content: %8
	New Template Content: %7

Additional Information:
	Domain Controller: %6

Fields #

NameDescription
Domain_Controller
New_Template_Content
Old_Template_Content
TemplateInternalName UnicodeString
TemplateVersion UnicodeStringv
TemplateSchemaVersion UnicodeString(Schema V
TemplateOID UnicodeString
TemplateDSObjectFQDN UnicodeString
DCDNSName UnicodeString[Additional Information] Domain Controller
NewTemplateContent UnicodeString[Template Change Information] New Template Content
OldTemplateContent UnicodeString[Template Change Information] Old Template Content

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 4900 — Certificate Services template security was updated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

Certificate Services template security was updated.

Message #

Certificate Services template security was updated.

%1 v%2 (Schema V%3)
%4
%5

Template Change Information:
	Old Template Content: %9
	New Template Content: %7
	Old Security Descriptor: %10
	New Security Descriptor: %8

Additional Information:
	Domain Controller: %6

Fields #

NameDescription
Domain_Controller
New_Template_Content
New_Security_Descriptor
Old_Template_Content
Old_Security_Descriptor
TemplateInternalName UnicodeString
TemplateVersion UnicodeStringv
TemplateSchemaVersion UnicodeString(Schema V
TemplateOID UnicodeString
TemplateDSObjectFQDN UnicodeString
DCDNSName UnicodeString[Additional Information] Domain Controller
NewTemplateContent UnicodeString[Template Change Information] New Template Content
NewSecurityDescriptor UnicodeString[Template Change Information] New Security Descriptor
OldTemplateContent UnicodeString[Template Change Information] Old Template Content
OldSecurityDescriptor UnicodeString[Template Change Information] Old Security Descriptor

References #

Event ID 4902 — The Per-user audit policy table was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Per-user audit policy table was created.

Message #

The Per-user audit policy table was created.

Number of Elements: %1
Policy ID: %2

Fields #

NameDescription
PuaCount UInt32Number of Elements.
PuaPolicyId HexInt64Policy ID.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4902,
    "version": 0,
    "level": 0,
    "task": 13568,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:28.032941+00:00",
    "event_record_id": 2756,
    "correlation": {},
    "execution": {
      "process_id": 808,
      "thread_id": 860
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "PuaCount": 0,
    "PuaPolicyId": "0xa128"
  },
  "message": ""
}

References #

Event ID 4904 — An attempt was made to register a security event source.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt was made to register a security event source.

Message #

An attempt was made to register a security event source.

Subject :
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process:
	Process ID: %7
	Process Name: %8

Event Source:
	Source Name: %5
	Event Source ID: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
AuditSourceName UnicodeString[Event Source] Source Name.
EventSourceId HexInt64[Event Source] Event Source ID.
ProcessId Pointer[Process] Process ID.
ProcessName UnicodeString[Process] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4904,
    "version": 0,
    "level": 0,
    "task": 13568,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:19.368595+00:00",
    "event_record_id": 25620,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 664
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-TKC15D7KHUR$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "AuditSourceName": "IIS-METABASE",
    "EventSourceId": "0x21062",
    "ProcessId": "0x648",
    "ProcessName": "C:\\Windows\\System32\\inetsrv\\inetinfo.exe"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 4905 — An attempt was made to unregister a security event source.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt was made to unregister a security event source.

Message #

An attempt was made to unregister a security event source.

Subject
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process:
	Process ID: %7
	Process Name: %8

Event Source:
	Source Name: %5
	Event Source ID: %6

Fields #

NameDescription
Security_ID
Account_Name
Account_Domain
Logon_ID
Source_Name[Event Source] Source Name.
Event_Source_ID[Event Source] Event Source ID.
Process_ID[Process] Process ID.
Process_Name[Process] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4905,
    "version": 0,
    "level": 0,
    "task": 13568,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2013-10-23T16:26:16.473750Z",
    "event_record_id": 135,
    "correlation": {},
    "execution": {
      "process_id": 508,
      "thread_id": 1032
    },
    "channel": "Security",
    "computer": "IE8Win7",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-QALA5Q3KJ43$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "AuditSourceName": "VSSAudit",
    "EventSourceId": "0xe5eb0",
    "ProcessId": "0x9fc",
    "ProcessName": "C:\\Windows\\System32\\VSSVC.exe"
  }
}

Detection Patterns #

References #

Event ID 4906 — The CrashOnAuditFail value has changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The CrashOnAuditFail value has changed.

Message #

The CrashOnAuditFail value has changed.

New Value of CrashOnAuditFail: %1

Fields #

NameDescription
CrashOnAuditFailValue UInt32New Value of CrashOnAuditFail

References #

Event ID 4907 — Auditing settings on object were changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Auditing settings on object were changed.

Message #

Auditing settings on object were changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %11
	Process Name: %12

Auditing Settings:
	Original Security Descriptor: %9
	New Security Descriptor: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectServer UnicodeString[Object] Object Server.
ObjectType UnicodeString[Object] Object Type.
ObjectName UnicodeString[Object] Object Name.
HandleId Pointer[Object] Handle ID.
OldSd UnicodeString[Auditing Settings] Original Security Descriptor.
NewSd UnicodeString[Auditing Settings] New Security Descriptor.
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4907,
    "version": 0,
    "level": 0,
    "task": 13568,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:39.659624+00:00",
    "event_record_id": 2879,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 228
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ObjectServer": "Security",
    "ObjectType": "File",
    "ObjectName": "C:\\Windows\\Temp\\winre\\ExtractedFromWim",
    "HandleId": "0x5e0",
    "OldSd": "",
    "NewSd": "S:ARAI(AU;SAFA;DCLCRPCRSDWDWO;;;WD)",
    "ProcessId": "0x590",
    "ProcessName": "C:\\Windows\\System32\\oobe\\msoobe.exe"
  },
  "message": ""
}

Community Notes #

Captures SACL changes to files, registry keys, and services.

References #

Event ID 4908 — Special Groups Logon table modified.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Special Groups Logon table modified.

Message #

Special Groups Logon table modified.

Special Groups: %1

This event is generated when the list of special groups is updated in the registry or through security policy. The updated list of special groups is indicated in the event.

Fields #

NameDescription
Special_Groups

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4908,
    "version": 0,
    "level": 0,
    "task": 13568,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-12T06:01:51.798027Z",
    "event_record_id": 16088364,
    "correlation": {},
    "execution": {
      "process_id": 528,
      "thread_id": 548
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SidList": "-"
  }
}

Community Notes #

Deleting privileged SIDs will prevent Event ID 4964 from firing. Also appears at every reboot, so IR can compare boot-time record against later changes.

References #

Event ID 4909 — The local policy settings for the TBS were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The local policy settings for the TBS were changed.

Message #

The local policy settings for the TBS were changed.

Old Blocked Ordinals: %1
New Blocked Ordinals: %2

Fields #

NameDescription
Old_Blocked_Ordinals UnicodeString
New_Blocked_Ordinals UnicodeString
OldBlockedOrdinals UnicodeStringOld Blocked Ordinals
NewBlockedOrdinals UnicodeStringNew Blocked Ordinals

References #

Event ID 4910 — The group policy settings for the TBS were changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The group policy settings for the TBS were changed.

Message #

The group policy settings for the TBS were changed.

Group Policy Setting:		Ignore Default Settings
	Old Value: %1
	New Value: %2

Group Policy Setting:		Ignore Local Settings
	Old Value: %3
	New Value: %4

Old Blocked Ordinals: %5
New Blocked Ordinals: %6

Fields #

NameDescription
Old_Value UInt32
New_Value UInt32
Old_Value UInt32
New_Value UInt32
Old_Blocked_Ordinals UnicodeString
New_Blocked_Ordinals UnicodeString
OldIgnoreDefaultSettings UInt32Old Value
NewIgnoreDefaultSettings UInt32New Value
OldIgnoreLocalSettings UInt32Old Value
NewIgnoreLocalSettings UInt32New Value
OldBlockedOrdinals UnicodeStringOld Blocked Ordinals
NewBlockedOrdinals UnicodeStringNew Blocked Ordinals

References #

Event ID 4911 — Resource attributes of the object were changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authorization Policy Change
Collection Priority
Low (Splunk-UBA)
Opcode
Info

Description

Resource attributes of the object were changed.

Message #

Resource attributes of the object were changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %11
	Process Name: %12

Resource Attributes:
	Original Security Descriptor: %9
	New Security Descriptor: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID.
SubjectUserName UnicodeString[Subject] Account Name.
SubjectDomainName UnicodeString[Subject] Account Domain.
SubjectLogonId HexInt64[Subject] Logon ID.
ObjectServer UnicodeString[Object] Object Server.
ObjectType UnicodeString[Object] Object Type.
ObjectName UnicodeString[Object] Object Name.
HandleId Pointer[Object] Handle ID.
OldSd UnicodeString[Resource Attributes] Original Security Descriptor.
NewSd UnicodeString[Resource Attributes] New Security Descriptor.
ProcessId Pointer[Process Information] Process ID.
ProcessName UnicodeString[Process Information] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4911,
    "version": 0,
    "level": 0,
    "task": 13570,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:51:41.950925+00:00",
    "event_record_id": 300251,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 5816
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x27844",
    "ObjectServer": "Security",
    "ObjectType": "File",
    "ObjectName": "C:\\Users\\User\\AppData\\Local\\Temp\\763cba47-20ad-4480-91e6-3dc02233f103.tmp",
    "HandleId": "0x1d6c",
    "OldSd": "",
    "NewSd": "S:ARAI(RA;;;;;WD;(\"IMAGELOAD\",TU,0x0,1))",
    "ProcessId": "0x33f0",
    "ProcessName": "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe"
  },
  "message": ""
}

References #

Event ID 4912 — Per User Audit Policy was changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Per User Audit Policy was changed.

Message #

Per User Audit Policy was changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Policy For Account:
	Security ID: %5

Policy Change Details:
	Category: %6
	Subcategory: %7
	Subcategory GUID: %8
	Changes: %9

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Security_ID SID[Policy For Account] Security ID.
Category UnicodeString[Policy Change Details] Category.
Subcategory UnicodeString[Policy Change Details] Subcategory.
Subcategory_GUID GUID[Policy Change Details] Subcategory GUID.
Changes UnicodeString[Policy Change Details] Changes.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
TargetUserSid SID[Policy For Account] Security ID
CategoryId UnicodeString[Policy Change Details] Category
Known values
%%8272
System
%%8273
Logon/Logoff
%%8274
Object Access
%%8275
Privilege Use
%%8276
Detailed Tracking
%%8277
Policy Change
%%8278
Account Management
%%8279
DS Access
%%8280
Account Logon
SubcategoryId UnicodeString[Policy Change Details] Subcategory
Known values
%%12288
Security State Change
%%12289
Security System Extension
%%12290
System Integrity
%%12291
IPsec Driver
%%12292
Other System Events
%%12544
Logon
%%12545
Logoff
%%12546
Account Lockout
%%12547
IPsec Main Mode
%%12548
Special Logon
%%12549
IPsec Quick Mode
%%12550
IPsec Extended Mode
%%12551
Other Logon/Logoff Events
%%12552
Network Policy Server
%%12553
User / Device Claims
%%12554
Group Membership
%%12800
File System
%%12801
Registry
%%12802
Kernel Object
%%12803
SAM
%%12804
Other Object Access Events
%%12805
Certification Services
%%12806
Application Generated
%%12807
Handle Manipulation
%%12808
File Share
%%12809
Filtering Platform Packet Drop
%%12810
Filtering Platform Connection
%%12811
Detailed File Share
%%12812
Removable Storage
%%12813
Central Policy Staging
%%13056
Sensitive Privilege Use
%%13057
Non Sensitive Privilege Use
%%13058
Other Privilege Use Events
%%13312
Process Creation
%%13313
Process Termination
%%13314
DPAPI Activity
%%13315
RPC Events
%%13316
Plug and Play Events
%%13317
Token Right Adjusted Events
%%13568
Audit Policy Change
%%13569
Authentication Policy Change
%%13570
Authorization Policy Change
%%13571
MPSSVC Rule-Level Policy Change
%%13572
Filtering Platform Policy Change
%%13573
Other Policy Change Events
%%13824
User Account Management
%%13825
Computer Account Management
%%13826
Security Group Management
%%13827
Distribution Group Management
%%13828
Application Group Management
%%13829
Other Account Management Events
%%14080
Directory Service Access
%%14081
Directory Service Changes
%%14082
Directory Service Replication
%%14083
Detailed Directory Service Replication
%%14336
Credential Validation
%%14337
Kerberos Service Ticket Operations
%%14338
Other Account Logon Events
%%14339
Kerberos Authentication Service
SubcategoryGuid GUID[Policy Change Details] Subcategory GUID
Known values
%%12288
Security State Change
%%12289
Security System Extension
%%12290
System Integrity
%%12291
IPsec Driver
%%12292
Other System Events
%%12544
Logon
%%12545
Logoff
%%12546
Account Lockout
%%12547
IPsec Main Mode
%%12548
Special Logon
%%12549
IPsec Quick Mode
%%12550
IPsec Extended Mode
%%12551
Other Logon/Logoff Events
%%12552
Network Policy Server
%%12553
User / Device Claims
%%12554
Group Membership
%%12800
File System
%%12801
Registry
%%12802
Kernel Object
%%12803
SAM
%%12804
Other Object Access Events
%%12805
Certification Services
%%12806
Application Generated
%%12807
Handle Manipulation
%%12808
File Share
%%12809
Filtering Platform Packet Drop
%%12810
Filtering Platform Connection
%%12811
Detailed File Share
%%12812
Removable Storage
%%12813
Central Policy Staging
%%13056
Sensitive Privilege Use
%%13057
Non Sensitive Privilege Use
%%13058
Other Privilege Use Events
%%13312
Process Creation
%%13313
Process Termination
%%13314
DPAPI Activity
%%13315
RPC Events
%%13316
Plug and Play Events
%%13317
Token Right Adjusted Events
%%13568
Audit Policy Change
%%13569
Authentication Policy Change
%%13570
Authorization Policy Change
%%13571
MPSSVC Rule-Level Policy Change
%%13572
Filtering Platform Policy Change
%%13573
Other Policy Change Events
%%13824
User Account Management
%%13825
Computer Account Management
%%13826
Security Group Management
%%13827
Distribution Group Management
%%13828
Application Group Management
%%13829
Other Account Management Events
%%14080
Directory Service Access
%%14081
Directory Service Changes
%%14082
Directory Service Replication
%%14083
Detailed Directory Service Replication
%%14336
Credential Validation
%%14337
Kerberos Service Ticket Operations
%%14338
Other Account Logon Events
%%14339
Kerberos Authentication Service
AuditPolicyChanges UnicodeString[Policy Change Details] Changes
Known values
%%8448
Success removed
%%8449
Success Added
%%8450
Failure removed
%%8451
Failure added
%%8452
Success include removed
%%8453
Success include added
%%8454
Success exclude removed
%%8455
Success exclude added
%%8456
Failure include removed
%%8457
Failure include added
%%8458
Failure exclude removed
%%8459
Failure exclude added

Community Notes #

If Changes is set to None or Failure include removed, this may be an attempt to hide activity. Pair with 4719, 4902, and 4624 to reconstruct a timeline.

References #

Event ID 4913 — Central Access Policy on the object was changed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Authorization Policy Change
Opcode
Info

Description

Central Access Policy on the object was changed.

Message #

Central Access Policy on the object was changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Object Server: %5
	Object Type: %6
	Object Name: %7
	Handle ID: %8

Process Information:
	Process ID: %11
	Process Name: %12

Central Policy ID:
	Original Security Descriptor: %9
	New Security Descriptor: %10

Fields #

NameDescription
Security_ID SID[Subject] Security ID.
Account_Name UnicodeString[Subject] Account Name.
Account_Domain UnicodeString[Subject] Account Domain.
Logon_ID HexInt64[Subject] Logon ID.
Object_Server UnicodeString[Object] Object Server.
Object_Type UnicodeString[Object] Object Type.
Object_Name UnicodeString[Object] Object Name.
Handle_ID Pointer[Object] Handle ID.
Original_Security_Descriptor UnicodeString[Central Policy ID] Original Security Descriptor.
New_Security_Descriptor UnicodeString[Central Policy ID] New Security Descriptor.
Process_ID Pointer[Process Information] Process ID.
Process_Name UnicodeString[Process Information] Process Name.
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectServer UnicodeString[Object] Object Server
ObjectType UnicodeString[Object] Object Type
ObjectName UnicodeString[Object] Object Name
HandleId Pointer[Object] Handle ID
OldSd UnicodeString[Central Policy ID] Original Security Descriptor
NewSd UnicodeString[Central Policy ID] New Security Descriptor
ProcessId Pointer[Process Information] Process ID
ProcessName UnicodeString[Process Information] Process Name

References #

Event ID 4928 — An Active Directory replica source naming context was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Recommended (mdecrevoisier, others)
Opcode
Info

Description

An Active Directory replica source naming context was established.

Message #

An Active Directory replica source naming context was established.

Destination DRA: %1
Source DRA: %2
Source Address: %3
Naming Context: %4
Options: %5
Status Code: %6

Fields #

NameDescription
Destination_DRA UnicodeString
Source_DRA UnicodeString
Source_Address UnicodeString
Naming_Context UnicodeString
Options UInt64Options
Status_Code UInt32
DestinationDRA UnicodeStringDestination DRA
SourceDRA UnicodeStringSource DRA
SourceAddr UnicodeStringSource Address
NamingContext UnicodeStringNaming Context
StatusCode UInt32Status Code

References #

Event ID 4929 — An Active Directory replica source naming context was removed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Recommended (ASD, others)
Opcode
Info

Description

An Active Directory replica source naming context was removed.

Message #

An Active Directory replica source naming context was removed.

Destination DRA: %1
Source DRA: %2
Source Address: %3
Naming Context: %4
Options: %5
Status Code: %6

Fields #

NameDescription
Destination_DRA
Source_DRA
Source_Address
Naming_Context
Options UInt64Options
Status_Code

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4929,
    "version": 1,
    "level": 0,
    "task": 14083,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2021-04-27T11:04:45.557748Z",
    "event_record_id": 138520244,
    "correlation": {
      "#attributes": {
        "ActivityID": "9816F041-2BBE-0000-53F0-1698BE2BD701"
      }
    },
    "execution": {
      "process_id": 548,
      "thread_id": 5276
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "DestinationDRA": "CN=NTDS Settings,CN=ROOTDC1,CN=Servers,CN=OFFSEC-PREMISE,CN=Sites,CN=Configuration,DC=offsec,DC=lan",
    "SourceDRA": "-",
    "SourceAddr": "jump01.offsec.lan",
    "NamingContext": "DC=offsec,DC=lan",
    "Options": 16,
    "StatusCode": 8452
  }
}

References #

Event ID 4930 — An Active Directory replica source naming context was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An Active Directory replica source naming context was modified.

Message #

An Active Directory replica source naming context was modified.

Destination DRA: %1
Source DRA: %2
Source Address: %3
Naming Context: %4
Options: %5
Status Code: %6

Fields #

NameDescription
Destination_DRA UnicodeString
Source_DRA UnicodeString
Source_Address UnicodeString
Naming_Context UnicodeString
Options UInt64Options
Status_Code UInt32
DestinationDRA UnicodeStringDestination DRA
SourceDRA UnicodeStringSource DRA
SourceAddr UnicodeStringSource Address
NamingContext UnicodeStringNaming Context
StatusCode UInt32Status Code

References #

Event ID 4931 — An Active Directory replica destination naming context was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An Active Directory replica destination naming context was modified.

Message #

An Active Directory replica destination naming context was modified.

Destination DRA: %1
Source DRA: %2
Destination Address: %3
Naming Context: %4
Options: %5
Status Code: %6

Fields #

NameDescription
Destination_DRA UnicodeString
Source_DRA UnicodeString
Destination_Address UnicodeString
Naming_Context UnicodeString
Options UInt64Options
Status_Code UInt32
DestinationDRA UnicodeStringDestination DRA
SourceDRA UnicodeStringSource DRA
SourceAddr UnicodeStringDestination Address
NamingContext UnicodeStringNaming Context
StatusCode UInt32Status Code

References #

Event ID 4932 — Synchronization of a replica of an Active Directory naming context has begun.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Synchronization of a replica of an Active Directory naming context has begun.

Message #

Synchronization of a replica of an Active Directory naming context has begun.

Destination DRA: %1
Source DRA: %2
Naming Context: %3
Options: %4
Session ID: %5
Start USN: %6

Fields #

NameDescription
Destination_DRA UnicodeString
Source_DRA UnicodeString
Naming_Context UnicodeString
Options UInt64Options
Session_ID UInt32
Start_USN UnicodeString
DestinationDRA UnicodeStringDestination DRA
SourceDRA UnicodeStringSource DRA
NamingContext UnicodeStringNaming Context
SessionID UInt32Session ID
StartUSN UnicodeStringStart USN

References #

Event ID 4933 — Synchronization of a replica of an Active Directory naming context has ended.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Synchronization of a replica of an Active Directory naming context has ended.

Message #

Synchronization of a replica of an Active Directory naming context has ended.

Destination DRA: %1
Source DRA: %2
Naming Context: %3
Options: %4
Session ID: %5
End USN: %6
Status Code: %7

Fields #

NameDescription
Destination_DRA UnicodeString
Source_DRA UnicodeString
Naming_Context UnicodeString
Options UInt64Options
Session_ID UInt32
End_USN UnicodeString
Status_Code UInt32
DestinationDRA UnicodeStringDestination DRA
SourceDRA UnicodeStringSource DRA
NamingContext UnicodeStringNaming Context
SessionID UInt32Session ID
EndUSN UnicodeStringEnd USN
StatusCode UInt32Status Code

References #

Event ID 4934 — Attributes of an Active Directory object were replicated.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Attributes of an Active Directory object were replicated.

Message #

Attributes of an Active Directory object were replicated.

Session ID: %1
Object: %2
Attribute: %3
Type of change: %4
New Value: %5
USN: %6
Status Code: %7

Fields #

NameDescription
SessionID UInt32Session ID
Object UnicodeStringObject
Attribute UnicodeStringAttribute
TypeOfChange UInt32Type of change
NewValue UnicodeStringNew Value
USN UnicodeStringUSN
StatusCode UInt32Status Code

References #

Event ID 4935 — Replication failure begins.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Replication failure begins.

Message #

Replication failure begins.

Replication Event: %1
Audit Status Code: %2

Fields #

NameDescription
Replication_Event
Audit_Status_Code

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4935,
    "version": 0,
    "level": 0,
    "task": 14083,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2021-04-27T11:04:03.510255Z",
    "event_record_id": 138520219,
    "correlation": {
      "#attributes": {
        "ActivityID": "9816F041-2BBE-0000-53F0-1698BE2BD701"
      }
    },
    "execution": {
      "process_id": 548,
      "thread_id": 5276
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ReplicationEvent": 1,
    "AuditStatusCode": 8419
  }
}

References #

Event ID 4936 — Replication failure ends.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Replication failure ends.

Message #

Replication failure ends.

Replication Event: %1
Audit Status Code: %2
Replication Status Code: %3

Fields #

NameDescription
Replication_Event
Audit_Status_Code
Replication_Status_Code

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4936,
    "version": 0,
    "level": 0,
    "task": 14083,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2021-04-27T11:04:45.556800Z",
    "event_record_id": 138520242,
    "correlation": {
      "#attributes": {
        "ActivityID": "9816F041-2BBE-0000-53F0-1698BE2BD701"
      }
    },
    "execution": {
      "process_id": 548,
      "thread_id": 5276
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ReplicationEvent": 1,
    "AuditStatusCode": 8419,
    "ReplicationStatusCode": 1722
  }
}

References #

Event ID 4937 — A lingering object was removed from a replica.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Detailed Directory Service Replication
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A lingering object was removed from a replica.

Message #

A lingering object was removed from a replica.

Destination DRA: %1
Source DRA: %2
Object: %3
Options: %4
Status Code: %5

Fields #

NameDescription
Destination_DRA UnicodeString
Source_DRA UnicodeString
Object UnicodeStringObject
Options UInt64Options
Status_Code UInt32
DestinationDRA UnicodeStringDestination DRA
SourceDRA UnicodeStringSource DRA
StatusCode UInt32Status Code

References #

Event ID 4944 — The following policy was active when the Windows Firewall started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Recommended (mdecrevoisier, others)
Opcode
Info

Description

The following policy was active when the Windows Firewall started.

Message #

The following policy was active when the Windows Firewall started.

Group Policy Applied: %1
Profile Used: %2
Operational mode: %3
Allow Remote Administration: %4
Allow Unicast Responses to Multicast/Broadcast Traffic: %5
Security Logging:
	Log Dropped Packets: %6
	Log Successful Connections: %7

Fields #

NameDescription
GroupPolicyApplied UnicodeStringGroup Policy Applied
Profile UnicodeStringProfile Used
OperationMode UnicodeStringOperational mode
RemoteAdminEnabled UnicodeStringAllow Remote Administration
MulticastFlowsEnabled UnicodeStringAllow Unicast Responses to Multicast/Broadcast Traffic
LogDroppedPacketsEnabled UnicodeString[Security Logging] Log Dropped Packets
LogSuccessfulConnectionsEnabled UnicodeString[Security Logging] Log Successful Connections

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4944,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:21.036853+00:00",
    "event_record_id": 26014,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 664
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "GroupPolicyApplied": "No",
    "Profile": "(null)",
    "OperationMode": "On",
    "RemoteAdminEnabled": "Disabled",
    "MulticastFlowsEnabled": "Enabled",
    "LogDroppedPacketsEnabled": "Disabled",
    "LogSuccessfulConnectionsEnabled": "Disabled"
  },
  "message": ""
}

References #

Event ID 4945 — A rule was listed when the Windows Firewall started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A rule was listed when the Windows Firewall started.

Message #

A rule was listed when the Windows Firewall started.
	
Profile used: %1

Rule:
	Rule ID: %2
	Rule Name: %3

Fields #

NameDescription
ProfileUsed UnicodeStringProfile used
RuleId UnicodeString[Rule] Rule ID
RuleName UnicodeString[Rule] Rule Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4945,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:21.045018+00:00",
    "event_record_id": 26315,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 664
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProfileUsed": "(null)",
    "RuleId": "IIS-WebServerRole-FTP-Passive-In-TCP",
    "RuleName": "FTP Server Passive (FTP Passive Traffic-In)"
  },
  "message": ""
}

References #

Event ID 4946 — A change has been made to Windows Firewall exception list. A rule was added.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A change was made to the Windows Firewall exception list. A rule was added.

Message #

A change was made to the Windows Firewall exception list. A rule was added.
	
Profile Changed: %1

Added Rule:
	Rule ID: %2
	Rule Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
RuleId UnicodeString[Added Rule] Rule ID
RuleName UnicodeString[Added Rule] Rule Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4946,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T19:32:55.589972+00:00",
    "event_record_id": 2601879,
    "correlation": {
      "ActivityID": "83C0A038-97BF-4A37-B9EE-DBA4C42967DF"
    },
    "execution": {
      "process_id": 720,
      "thread_id": 1048
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProfileChanged": "(null),(null)",
    "RuleId": "{DC92C56C-4138-4D46-B25D-97D3C349B695}",
    "RuleName": "@{Microsoft.DesktopAppInstaller_1.28.220.0_x64__8wekyb3d8bbwe?ms-resource://Microsoft.DesktopAppInstaller/Resources/appDisplayName}"
  },
  "message": ""
}

Community Notes #

Logs rules that open ports or disable filtering. Attackers may add rules to enable implants to communicate with external servers.

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Firewall Rule Added source: This detection identifies instances where a Windows Firewall rule is added by monitoring Event ID 4946 in the Windows Security Event Log. Firewall rule modifications can indicate legitimate administrative actions, but they may also signal unauthorized changes, misconfigurations, or malicious activity such as attackers allowing traffic for backdoors or persistence mechanisms. By analyzing fields like RuleName, RuleId, Computer, and ProfileChanged, security teams can determine whether the change aligns with expected behavior. Correlating with user activity and process execution can help distinguish false positives from real threats, ensuring better visibility into potential security risks.

References #

Event ID 4947 — A change has been made to Windows Firewall exception list. A rule was modified.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A change was made to the Windows Firewall exception list. A rule was modified.

Message #

A change was made to the Windows Firewall exception list. A rule was modified.
	
Profile Changed: %1

Modified Rule:
	Rule ID: %2
	Rule Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
RuleId UnicodeString[Modified Rule] Rule ID
RuleName UnicodeString[Modified Rule] Rule Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4947,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T06:32:02.846637+00:00",
    "event_record_id": 2461332,
    "correlation": {
      "ActivityID": "25EC58BA-8E8B-49D4-8250-F380547FF3D0"
    },
    "execution": {
      "process_id": 720,
      "thread_id": 1048
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProfileChanged": "All",
    "RuleId": "WSLCore-SharedAccess-Allow-Rule",
    "RuleName": "WSLCore SharedAccess Allow Rule"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Firewall Rule Modification source: This detection identifies instances where a Windows Firewall rule has been modified, which may indicate an attempt to alter security policies. Unauthorized modifications can weaken firewall protections, allowing malicious traffic or preventing legitimate communications. The event logs details such as the modified rule name, protocol, ports, application path, and the user responsible for the change. Security teams should monitor unexpected modifications, correlate them with related events, and investigate anomalies to prevent unauthorized access and maintain network security integrity.

References #

Event ID 4948 — A change has been made to Windows Firewall exception list. A rule was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A change was made to the Windows Firewall exception list. A rule was deleted.

Message #

A change was made to the Windows Firewall exception list. A rule was deleted.
	
Profile Changed: %1

Deleted Rule:
	Rule ID: %2
	Rule Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
RuleId UnicodeString[Deleted Rule] Rule ID
RuleName UnicodeString[Deleted Rule] Rule Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4948,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T19:32:55.554379+00:00",
    "event_record_id": 2601866,
    "correlation": {
      "ActivityID": "426D61B7-B34A-40F7-B81E-D2D13DCDAEDA"
    },
    "execution": {
      "process_id": 720,
      "thread_id": 1048
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProfileChanged": "(null),(null),(null)",
    "RuleId": "{760971F9-D380-483D-AEA7-31795C69819A}",
    "RuleName": "@{Microsoft.DesktopAppInstaller_1.27.470.0_x64__8wekyb3d8bbwe?ms-resource://Microsoft.DesktopAppInstaller/Resources/appDisplayName}"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Splunk # view in reference

  • Windows Firewall Rule Deletion source: This detection identifies instances where a Windows Firewall rule has been deleted, potentially exposing the system to security risks. Unauthorized removal of firewall rules can indicate an attacker attempting to bypass security controls or malware disabling protections for persistence and command-and-control communication. The event logs details such as the deleted rule name, protocol, port, and the user responsible for the action. Security teams should monitor for unexpected deletions, correlate with related events, and investigate anomalies to prevent unauthorized access and maintain network security posture.

References #

Event ID 4949 — Windows Firewall settings were restored to the default values.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall settings were restored to the default values.

Message #

Windows Firewall settings were restored to the default values.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4949,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:28:37.812998+00:00",
    "event_record_id": 16710980,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 10484
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 4950 — A Windows Firewall setting has changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Splunk-UBA, others)
Opcode
Info

Description

A Windows Firewall setting was changed.

Message #

A Windows Firewall setting was changed.
	
Changed Profile: %1

New Setting:
	Type: %2
	Value: %3

Fields #

NameDescription
ProfileChanged UnicodeStringChanged Profile
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
SettingType UnicodeString[New Setting] Type
SettingValue UnicodeString[New Setting] Value

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "{54849625-5478-4994-A5BA-3E3B0328C30D}",
    "event_source_name": "",
    "event_id": 4950,
    "version": "0",
    "level": "0",
    "task": "13571",
    "opcode": "0",
    "keywords": 9232379236109516800,
    "time_created": "2021-06-03T19:39:52.893115500Z",
    "event_record_id": "1974770",
    "correlation": {
      "#attributes": {
        "ActivityID": "{38068009-512D-0000-1D80-06382D51D701}"
      }
    },
    "execution": {
      "process_id": "556",
      "thread_id": "2532"
    },
    "channel": "Security",
    "computer": "fs01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProfileChanged": "Domain",
    "SettingType": "Enable Windows Firewall",
    "SettingValue": "Yes"
  }
}

Community Notes #

Tracks changes to core settings such as disabling a profile (domain, private, public), or default block/allow behavior.

References #

Event ID 4951 — A rule has been ignored because its major version number was not recognized by Windows Firewall.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall ignored a rule because its major version number is not recognized.

Message #

Windows Firewall ignored a rule because its major version number is not recognized.
	
Profile: %1

Ignored Rule:
	ID: %2
	Name: %3

Fields #

NameDescription
Profile UnicodeStringProfile
RuleId UnicodeString[Ignored Rule] ID
RuleName UnicodeString[Ignored Rule] Name

References #

Event ID 4952 — Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall ignored parts of a rule because its minor version number is not recognized. Other parts of the rule will be enforced.

Message #

Windows Firewall ignored parts of a rule because its minor version number is not recognized. Other parts of the rule will be enforced.
	
Profile: %1

Partially Ignored Rule:
	ID: %2
	Name: %3

Fields #

NameDescription
Profile UnicodeStringProfile
RuleId UnicodeString[Partially Ignored Rule] ID
RuleName UnicodeString[Partially Ignored Rule] Name

References #

Event ID 4953 — A rule has been ignored by Windows Firewall because it could not parse the rule.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall ignored a rule because it could not be parsed.

Message #

Windows Firewall ignored a rule because it could not be parsed.
	
Profile: %1

Reason for Rejection: %2

Rule:
	ID: %3
	Name: %4

Fields #

NameDescription
Profile UnicodeStringProfile
ReasonForRejection UnicodeStringReason for Rejection
RuleId UnicodeString[Rule] ID
RuleName UnicodeString[Rule] Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4953,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2022-04-04T13:11:19.737706+00:00",
    "event_record_id": 25625,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 668
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "Profile": "All",
    "ReasonForRejection": "An error occurred.",
    "RuleId": "MDEServer-1",
    "RuleName": "-"
  },
  "message": ""
}

References #

Event ID 4954 — Windows Firewall Group Policy settings has changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Group Policy settings for Windows Firewall were changed, and the new settings were applied.

Message #

Group Policy settings for Windows Firewall were changed, and the new settings were applied.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4954,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-09T00:56:52.595949+00:00",
    "event_record_id": 1628305,
    "correlation": {
      "ActivityID": "96A9D96E-AF5F-0001-F1D9-A9965FAFDC01"
    },
    "execution": {
      "process_id": 828,
      "thread_id": 844
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 4956 — Windows Firewall has changed the active profile.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall changed the active profile.

Message #

Windows Firewall changed the active profile.

New Active Profile: %1

Fields #

NameDescription
ActiveProfile UnicodeStringNew Active Profile

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4956,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T06:27:32.278889+00:00",
    "event_record_id": 2454199,
    "correlation": {
      "ActivityID": "164E10E5-B120-0003-FC10-4E1620B1DC01"
    },
    "execution": {
      "process_id": 720,
      "thread_id": 6464
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ActiveProfile": "(null)"
  },
  "message": ""
}

References #

Event ID 4957 — Windows Firewall did not apply the following rule.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall did not apply the following rule.

Message #

Windows Firewall did not apply the following rule:

Rule Information:
	ID: %1
	Name: %2

Error Information:
	Reason: %3 resolved to an empty set.

Fields #

NameDescription
RuleId UnicodeString[Rule Information] ID
RuleName UnicodeString[Rule Information] Name
RuleAttr UnicodeString[Error Information] Reason

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4957,
    "version": 0,
    "level": 0,
    "task": 13571,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2022-04-04T13:13:38.719617+00:00",
    "event_record_id": 29324,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 664
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "RuleId": "CoreNet-IPHTTPS-In",
    "RuleName": "Core Networking - IPHTTPS (TCP-In)",
    "RuleAttr": "Local Port"
  },
  "message": ""
}

References #

Event ID 4958 — Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → MPSSVC Rule-Level Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.

Message #

Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:

Rule Information:
	ID: %1
	Name: %2

Error Information:
	Error: %3
	Reason: %4

Fields #

NameDescription
RuleId UnicodeString[Rule Information] ID
RuleName UnicodeString[Rule Information] Name
Error UnicodeString[Error Information] Error
Reason UnicodeString[Error Information] Reason

References #

Event ID 4960 — IPsec dropped an inbound packet that failed an integrity check.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Message #

IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue or that packets are being modified in transit to this computer. Verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations.

Remote Network Address: %1
Inbound SA SPI: %2

Fields #

NameDescription
RemoteAddress UnicodeStringRemote Network Address
SPI UInt32Inbound SA SPI

References #

Event ID 4961 — IPsec dropped an inbound packet that failed a replay check.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer.

Message #

IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against this computer.

Remote Network Address: %1
Inbound SA SPI: %2

Fields #

NameDescription
RemoteAddress UnicodeStringRemote Network Address
SPI UInt32Inbound SA SPI

References #

Event ID 4962 — IPsec dropped an inbound packet that failed a replay check.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay.

Message #

IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it was not a replay.

Remote Network Address: %1
Inbound SA SPI: %2

Fields #

NameDescription
RemoteAddress UnicodeStringRemote Network Address
SPI UInt32Inbound SA SPI

References #

Event ID 4963 — IPsec dropped an inbound clear text packet that should have been secured.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Message #

IPsec dropped an inbound clear text packet that should have been secured. If the remote computer is configured with a Request Outbound IPsec policy, this might be benign and expected.  This can also be caused by the remote computer changing its IPsec policy without informing this computer. This could also be a spoofing attack attempt.

Remote Network Address: %1
Inbound SA SPI: %2

Fields #

NameDescription
RemoteAddress UnicodeStringRemote Network Address
SPI UInt32Inbound SA SPI

References #

Event ID 4964 — Special groups have been assigned to a new logon.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Special Logon
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

Special groups have been assigned to a new logon.

Message #

Special groups have been assigned to a new logon.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Logon GUID: %5

New Logon:
	Security ID: %6
	Account Name: %7
	Account Domain: %8
	Logon ID: %9
	Logon GUID: %10
	Special Groups Assigned: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
LogonGuid GUID[Subject] Logon GUID
TargetUserSid SID[New Logon] Security ID
TargetUserName UnicodeString[New Logon] Account Name
TargetDomainName UnicodeString[New Logon] Account Domain
TargetLogonId HexInt64[New Logon] Logon ID
TargetLogonGuid GUID[New Logon] Logon GUID
SidList UnicodeString[New Logon] Special Groups Assigned

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4964,
    "version": 0,
    "level": 0,
    "task": 12548,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-04-22T08:51:04.686763Z",
    "event_record_id": 435111,
    "correlation": {},
    "execution": {
      "process_id": 480,
      "thread_id": 2416
    },
    "channel": "Security",
    "computer": "fs03vuln.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "FS03VULN$",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x3e7",
    "LogonGuid": "00000000-0000-0000-0000-000000000000",
    "TargetUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "TargetUserName": "admmig",
    "TargetDomainName": "OFFSEC",
    "TargetLogonId": "0x74872",
    "TargetLogonGuid": "00000000-0000-0000-0000-000000000000",
    "SidList": "\r\n\t\t%{S-1-5-21-4230534742-2542757381-3142984815-1613}"
  }
}

Community Notes #

Detects Domain Admins or other high-value SIDs logging onto non-DC hosts.

References #

Event ID 4965 — IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI).

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Message #

IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by malfunctioning hardware that is corrupting packets. If these errors persist, verify that the packets sent from the remote computer are the same as those received by this computer. This error might also indicate interoperability problems with other IPsec implementations. In that case, if connectivity is not impeded, then these events can be ignored.

Remote Network Address: %1
Inbound SA SPI: %2

Fields #

NameDescription
RemoteAddress UnicodeStringRemote Network Address
SPI UInt32Inbound SA SPI

References #

Event ID 4976 — During Main Mode negotiation, IPsec received an invalid negotiation packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

During main mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Message #

During main mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Local Network Address: %1
Remote Network Address: %2
Keying Module Name: %3

Fields #

NameDescription
LocalAddress UnicodeStringLocal Network Address
RemoteAddress UnicodeStringRemote Network Address
KeyModName UnicodeStringKeying Module Name

References #

Event ID 4977 — During Quick Mode negotiation, IPsec received an invalid negotiation packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Quick Mode
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

During quick mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Message #

During quick mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Local Network Address: %1
Remote Network Address: %2
Keying Module Name: %3

Fields #

NameDescription
LocalAddress UnicodeStringLocal Network Address
RemoteAddress UnicodeStringRemote Network Address
KeyModName UnicodeStringKeying Module Name

References #

Event ID 4978 — During Extended Mode negotiation, IPsec received an invalid negotiation packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Extended Mode
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

During extended mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Message #

During extended mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

Local Network Address: %1
Remote Network Address: %2
Keying Module Name: %3

Fields #

NameDescription
LocalAddress UnicodeStringLocal Network Address
RemoteAddress UnicodeStringRemote Network Address
KeyModName UnicodeStringKeying Module Name

References #

Event ID 4979 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Extended Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec main mode and extended mode security associations were established.

Message #

IPsec main mode and extended mode security associations were established.

Main Mode Local Endpoint:
	Principal Name: %1
	Network Address: %3
	Keying Module Port: %4

Main Mode Remote Endpoint:
	Principal Name: %2
	Network Address: %5
	Keying Module Port: %6

Main Mode Cryptographic Information:
	Cipher Algorithm: %8
	Integrity Algorithm: %9
	Diffie-Hellman Group: %10

Main Mode Security Association:
	Lifetime (minutes): %11
	Quick Mode Limit: %12
	Main Mode SA ID: %16
	
Main Mode Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method: %7
	Role: %13
	Impersonation State: %14
	Main Mode Filter ID: %15

Extended Mode Information:
	Local Principal Name: %17
	Remote Principal Name: %18
	Authentication Method: %19
	Impersonation State: %20
	Quick Mode Filter ID: %21

Fields #

NameDescription
LocalMMPrincipalName UnicodeString[Main Mode Local Endpoint] Principal Name
RemoteMMPrincipalName UnicodeString[Main Mode Remote Endpoint] Principal Name
LocalAddress UnicodeString[Main Mode Local Endpoint] Network Address
LocalKeyModPort UInt32[Main Mode Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Main Mode Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Main Mode Remote Endpoint] Keying Module Port
MMAuthMethod UnicodeString[Main Mode Additional Information] Authentication Method
MMCipherAlg UnicodeString[Main Mode Cryptographic Information] Cipher Algorithm
MMIntegrityAlg UnicodeString[Main Mode Cryptographic Information] Integrity Algorithm
DHGroup UnicodeString[Main Mode Cryptographic Information] Diffie-Hellman Group
MMLifetime UInt32[Main Mode Security Association] Lifetime (minutes)
QMLimit UInt32[Main Mode Security Association] Quick Mode Limit
Role UnicodeString[Main Mode Additional Information] Role
MMImpersonationState UnicodeString[Main Mode Additional Information] Impersonation State
MMFilterID UInt64[Main Mode Additional Information] Main Mode Filter ID
MMSAID UInt64[Main Mode Security Association] Main Mode SA ID
LocalEMPrincipalName UnicodeString[Extended Mode Information] Local Principal Name
RemoteEMPrincipalName UnicodeString[Extended Mode Information] Remote Principal Name
EMAuthMethod UnicodeString[Extended Mode Information] Authentication Method
EMImpersonationState UnicodeString[Extended Mode Information] Impersonation State
QMFilterID UInt64[Extended Mode Information] Quick Mode Filter ID

References #

Event ID 4980 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Extended Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec main mode and extended mode security associations were established.

Message #

IPsec main mode and extended mode security associations were established.

Main Mode Local Endpoint:
	Principal Name: %1
	Network Address: %3
	Keying Module Port: %4

Main Mode Remote Endpoint:
	Principal Name: %2
	Network Address: %5
	Keying Module Port: %6

Main Mode Cryptographic Information:
	Cipher Algorithm: %8
	Integrity Algorithm: %9
	Diffie-Hellman Group: %10

Main Mode Security Association:
	Lifetime (minutes): %11
	Quick Mode Limit: %12
	Main Mode SA ID: %16
	
Main Mode Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method: %7
	Role: %13
	Impersonation State: %14
	Main Mode Filter ID: %15

Extended Mode Local Endpoint:
	Principal Name: %17
	Certificate SHA Thumbprint: %18
	Certificate Issuing CA: %19
	Certificate Root CA: %20

Extended Mode Remote Endpoint:
	Principal Name: %21
	Certificate SHA Thumbprint: %22
	Certificate Issuing CA: %23
	Certificate Root CA: %24

Extended Mode Additional Information:
	Authentication Method:	SSL
	Impersonation State: %25
	Quick Mode Filter ID: %26

Fields #

NameDescription
LocalMMPrincipalName UnicodeString[Main Mode Local Endpoint] Principal Name
RemoteMMPrincipalName UnicodeString[Main Mode Remote Endpoint] Principal Name
LocalAddress UnicodeString[Main Mode Local Endpoint] Network Address
LocalKeyModPort UInt32[Main Mode Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Main Mode Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Main Mode Remote Endpoint] Keying Module Port
MMAuthMethod UnicodeString[Main Mode Additional Information] Authentication Method
MMCipherAlg UnicodeString[Main Mode Cryptographic Information] Cipher Algorithm
MMIntegrityAlg UnicodeString[Main Mode Cryptographic Information] Integrity Algorithm
DHGroup UnicodeString[Main Mode Cryptographic Information] Diffie-Hellman Group
MMLifetime UInt32[Main Mode Security Association] Lifetime (minutes)
QMLimit UInt32[Main Mode Security Association] Quick Mode Limit
Role UnicodeString[Main Mode Additional Information] Role
MMImpersonationState UnicodeString[Main Mode Additional Information] Impersonation State
MMFilterID UInt64[Main Mode Additional Information] Main Mode Filter ID
MMSAID UInt64[Main Mode Security Association] Main Mode SA ID
LocalEMPrincipalName UnicodeString[Extended Mode Local Endpoint] Principal Name
LocalEMCertHash UnicodeString[Extended Mode Local Endpoint] Certificate SHA Thumbprint
LocalEMIssuingCA UnicodeString[Extended Mode Local Endpoint] Certificate Issuing CA
LocalEMRootCA UnicodeString[Extended Mode Local Endpoint] Certificate Root CA
RemoteEMPrincipalName UnicodeString[Extended Mode Remote Endpoint] Principal Name
RemoteEMCertHash UnicodeString[Extended Mode Remote Endpoint] Certificate SHA Thumbprint
RemoteEMIssuingCA UnicodeString[Extended Mode Remote Endpoint] Certificate Issuing CA
RemoteEMRootCA UnicodeString[Extended Mode Remote Endpoint] Certificate Root CA
EMImpersonationState UnicodeString[Extended Mode Additional Information] Impersonation State
QMFilterID UInt64[Extended Mode Additional Information] Quick Mode Filter ID

References #

Event ID 4981 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Extended Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec main mode and extended mode security associations were established.

Message #

IPsec main mode and extended mode security associations were established.

Local Endpoint:
	Principal Name: %1
	Network Address: %9
	Keying Module Port: %10

Local Certificate:
	SHA Thumbprint: %2
	Issuing CA: %3
	Root CA: %4

Remote Endpoint:
	Principal Name: %5
	Network Address: %11
	Keying Module Port: %12

Remote Certificate:
	SHA Thumbprint: %6
	Issuing CA: %7
	Root CA: %8

Cryptographic Information:
	Cipher Algorithm: %13
	Integrity Algorithm: %14
	Diffie-Hellman Group: %15

Security Association Information:
	Lifetime (minutes): %16
	Quick Mode Limit: %17
	Main Mode SA ID: %21

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	SSL
	Role: %18
	Impersonation State: %19
	Main Mode Filter ID: %20
	
Extended Mode Information:
	Local Principal Name: %22
	Remote Principal Name: %23
	Authentication Method: %24
	Impersonation State: %25
	Quick Mode Filter ID: %26

Fields #

NameDescription
LocalMMPrincipalName UnicodeString[Local Endpoint] Principal Name
LocalMMCertHash UnicodeString[Local Certificate] SHA Thumbprint
LocalMMIssuingCA UnicodeString[Local Certificate] Issuing CA
LocalMMRootCA UnicodeString[Local Certificate] Root CA
RemoteMMPrincipalName UnicodeString[Remote Endpoint] Principal Name
RemoteMMCertHash UnicodeString[Remote Certificate] SHA Thumbprint
RemoteMMIssuingCA UnicodeString[Remote Certificate] Issuing CA
RemoteMMRootCA UnicodeString[Remote Certificate] Root CA
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalKeyModPort UInt32[Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
MMCipherAlg UnicodeString[Cryptographic Information] Cipher Algorithm
MMIntegrityAlg UnicodeString[Cryptographic Information] Integrity Algorithm
DHGroup UnicodeString[Cryptographic Information] Diffie-Hellman Group
MMLifetime UInt32[Security Association Information] Lifetime (minutes)
QMLimit UInt32[Security Association Information] Quick Mode Limit
Role UnicodeString[Additional Information] Role
MMImpersonationState UnicodeString[Additional Information] Impersonation State
MMFilterID UInt64[Additional Information] Main Mode Filter ID
MMSAID UInt64[Security Association Information] Main Mode SA ID
LocalEMPrincipalName UnicodeString[Extended Mode Information] Local Principal Name
RemoteEMPrincipalName UnicodeString[Extended Mode Information] Remote Principal Name
EMAuthMethod UnicodeString[Extended Mode Information] Authentication Method
EMImpersonationState UnicodeString[Extended Mode Information] Impersonation State
QMFilterID UInt64[Extended Mode Information] Quick Mode Filter ID

References #

Event ID 4982 — IPsec Main Mode and Extended Mode security associations were established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Extended Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec main mode and extended mode security associations were established.

Message #

IPsec main mode and extended mode security associations were established.

Local Endpoint:
	Principal Name: %1
	Network Address:	
	Keying Module Port: %9

Local Certificate:
	SHA Thumbprint: %2
	Issuing CA: %3
	Root CA: %4

Remote Endpoint:
	Principal Name: %5
	Network Address: %10
	Keying Module Port: %11

Remote Certificate:
	SHA Thumbprint: %6
	Issuing CA: %7
	Root CA: %8

Cryptographic Information:
	Cipher Algorithm: %12
	Integrity Algorithm: %13
	Diffie-Hellman Group: %14

Security Association Information:
	Lifetime (minutes): %15
	Quick Mode Limit: %16
	Main Mode SA ID: %20

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	SSL
	Role: %17
	Impersonation State: %18
	Main Mode Filter ID: %19
	
Extended Mode Local Endpoint:
	Principal Name: %21
	Certificate SHA Thumbprint: %22
	Certificate Issuing CA: %23
	Certificate Root CA: %24

Extended Mode Remote Endpoint:
	Principal Name: %25
	Certificate SHA Thumbprint: %26
	Certificate Issuing CA: %27
	Certificate Root CA: %28
Extended Mode Additional Information:
	Authentication Method:	SSL
	Impersonation State: %29
	Quick Mode Filter ID: %30

Fields #

NameDescription
LocalMMPrincipalName UnicodeString[Local Endpoint] Principal Name
LocalMMCertHash UnicodeString[Local Certificate] SHA Thumbprint
LocalMMIssuingCA UnicodeString[Local Certificate] Issuing CA
LocalMMRootCA UnicodeString[Local Certificate] Root CA
RemoteMMPrincipalName UnicodeString[Remote Endpoint] Principal Name
RemoteMMCertHash UnicodeString[Remote Certificate] SHA Thumbprint
RemoteMMIssuingCA UnicodeString[Remote Certificate] Issuing CA
RemoteMMRootCA UnicodeString[Remote Certificate] Root CA
LocalKeyModPort UInt32[Network Address] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
MMCipherAlg UnicodeString[Cryptographic Information] Cipher Algorithm
MMIntegrityAlg UnicodeString[Cryptographic Information] Integrity Algorithm
DHGroup UnicodeString[Cryptographic Information] Diffie-Hellman Group
MMLifetime UInt32[Security Association Information] Lifetime (minutes)
QMLimit UInt32[Security Association Information] Quick Mode Limit
Role UnicodeString[Additional Information] Role
MMImpersonationState UnicodeString[Additional Information] Impersonation State
MMFilterID UInt64[Additional Information] Main Mode Filter ID
MMSAID UInt64[Security Association Information] Main Mode SA ID
LocalEMPrincipalName UnicodeString[Extended Mode Local Endpoint] Principal Name
LocalEMCertHash UnicodeString[Extended Mode Local Endpoint] Certificate SHA Thumbprint
LocalEMIssuingCA UnicodeString[Extended Mode Local Endpoint] Certificate Issuing CA
LocalEMRootCA UnicodeString[Extended Mode Local Endpoint] Certificate Root CA
RemoteEMPrincipalName UnicodeString[Extended Mode Remote Endpoint] Principal Name
RemoteEMCertHash UnicodeString[Extended Mode Remote Endpoint] Certificate SHA Thumbprint
RemoteEMIssuingCA UnicodeString[Extended Mode Remote Endpoint] Certificate Issuing CA
RemoteEMRootCA UnicodeString[Extended Mode Remote Endpoint] Certificate Root CA
EMImpersonationState UnicodeString[Extended Mode Additional Information] Impersonation State
QMFilterID UInt64[Extended Mode Additional Information] Quick Mode Filter ID

References #

Event ID 4983 — An IPsec Extended Mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Extended Mode
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted.

Message #

An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted.


Local Endpoint:
	Principal Name: %1
	Network Address: %9
	Keying Module Port: %10

Local Certificate:
	SHA Thumbprint: %2
	Issuing CA: %3
	Root CA: %4

Remote Endpoint:
	Principal Name: %5
	Network Address: %11
	Keying Module Port: %12

Remote Certificate:
	SHA Thumbprint: %6
	Issuing CA: %7
	Root CA: %8

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method:	SSL
	Role: %16
	Impersonation State: %17
	Quick Mode Filter ID: %18

Failure Information:
	Failure Point: %13
	Failure Reason: %14
	State: %15

Fields #

NameDescription
LocalEMPrincipalName UnicodeString[Local Endpoint] Principal Name
LocalEMCertHash UnicodeString[Local Certificate] SHA Thumbprint
LocalEMIssuingCA UnicodeString[Local Certificate] Issuing CA
LocalEMRootCA UnicodeString[Local Certificate] Root CA
RemoteEMPrincipalName UnicodeString[Remote Endpoint] Principal Name
RemoteEMCertHash UnicodeString[Remote Certificate] SHA Thumbprint
RemoteEMIssuingCA UnicodeString[Remote Certificate] Issuing CA
RemoteEMRootCA UnicodeString[Remote Certificate] Root CA
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalKeyModPort UInt32[Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
FailurePoint UnicodeString[Failure Information] Failure Point
FailureReason UnicodeString[Failure Information] Failure Reason
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
State UnicodeString[Failure Information] State
Role UnicodeString[Additional Information] Role
EMImpersonationState UnicodeString[Additional Information] Impersonation State
QMFilterID UInt64[Additional Information] Quick Mode Filter ID

References #

Event ID 4984 — An IPsec Extended Mode negotiation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Extended Mode
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted.

Message #

An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted.

Local Endpoint:
	Principal Name: %1
	Network Address: %3
	Keying Module Port: %4

Remote Endpoint:
	Principal Name: %2
	Network Address: %5
	Keying Module Port: %6

Additional Information:
	Keying Module Name:	AuthIP
	Authentication Method: %9
	Role: %11
	Impersonation State: %12
	Quick Mode Filter ID: %13

Failure Information:
	Failure Point: %7
	Failure Reason: %8
	State: %10

Fields #

NameDescription
LocalEMPrincipalName UnicodeString[Local Endpoint] Principal Name
RemoteEMPrincipalName UnicodeString[Remote Endpoint] Principal Name
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalKeyModPort UInt32[Local Endpoint] Keying Module Port
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteKeyModPort UInt32[Remote Endpoint] Keying Module Port
FailurePoint UnicodeString[Failure Information] Failure Point
FailureReason UnicodeString[Failure Information] Failure Reason
Known values
%%2304
An Error occured during Logon.
%%2305
The specified user account has expired.
%%2306
The NetLogon component is not active.
%%2307
Account locked out.
%%2308
The user has not been granted the requested logon type at this machine.
%%2309
The specified account's password has expired.
%%2310
Account currently disabled.
%%2311
Account logon time restriction violation.
%%2312
User not allowed to logon at this computer.
%%2313
Unknown user name or bad password.
%%2314
Domain sid inconsistent.
%%2315
Smartcard logon is required and was not used.
EMAuthMethod UnicodeString[Additional Information] Authentication Method
State UnicodeString[Failure Information] State
Role UnicodeString[Additional Information] Role
EMImpersonationState UnicodeString[Additional Information] Impersonation State
QMFilterID UInt64[Additional Information] Quick Mode Filter ID

References #

Event ID 4985 — The state of a transaction has changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File System
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The state of a transaction has changed.

Message #

The state of a transaction has changed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Transaction Information:
	RM Transaction ID: %5
	New State: %6
	Resource Manager: %7

Process Information:
	Process ID: %8
	Process Name: %9

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
TransactionId GUID[Transaction Information] RM Transaction ID
NewState UInt32[Transaction Information] New State
ResourceManager GUID[Transaction Information] Resource Manager
ProcessId Pointer[Process Information] Process ID
ProcessName UnicodeString[Process Information] Process Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4985,
    "version": 0,
    "level": 0,
    "task": 12800,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T14:08:17.810656+00:00",
    "event_record_id": 34392,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 3104
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1958040314-2592322477-2606035944-500",
    "SubjectUserName": "Administrator",
    "SubjectDomainName": "WIN-TKC15D7KHUR",
    "SubjectLogonId": "0x33bf51",
    "TransactionId": "B1B0A54B-B418-11EC-8F27-080027EAB5C7",
    "NewState": 52,
    "ResourceManager": "64ED659C-9BDD-11EC-AFD4-9083472C0AE8",
    "ProcessId": "0x12c8",
    "ProcessName": "C:\\Windows\\System32\\inetsrv\\InetMgr.exe"
  },
  "message": ""
}

References #

Event ID 5024 — The Windows Firewall Service has started successfully.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall service started successfully.

Message #

The Windows Firewall service started successfully.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5024,
    "version": 0,
    "level": 0,
    "task": 12292,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:51.345615+00:00",
    "event_record_id": 2947,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 5025 — The Windows Firewall Service has been stopped.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall service was stopped.

Message #

The Windows Firewall service was stopped.

References #

Event ID 5027 — The Windows Firewall Service was unable to retrieve the security policy from the local storage.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall service was unable to retrieve the security policy from the local storage. Windows Firewall will continue to enforce the current policy.

Message #

The Windows Firewall service was unable to retrieve the security policy from the local storage. Windows Firewall will continue to enforce the current policy.

Error Code: %1

Fields #

NameDescription
ErrorCode UInt32Error Code

References #

Event ID 5028 — The Windows Firewall Service was unable to parse the new security policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall was unable to parse the new security policy. Windows Firewall will continue to enforce the current policy.

Message #

Windows Firewall was unable to parse the new security policy. Windows Firewall will continue to enforce the current policy.

Error Code: %1

Fields #

NameDescription
ErrorCode UInt32Error Code

References #

Event ID 5029 — The Windows Firewall Service failed to initialize the driver.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall service failed to initialize the driver. Windows Firewall will continue to enforce the current policy.

Message #

The Windows Firewall service failed to initialize the driver. Windows Firewall will continue to enforce the current policy.

Error Code: %1

Fields #

NameDescription
ErrorCode UInt32Error Code

References #

Event ID 5030 — The Windows Firewall Service failed to start.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall service failed to start.

Message #

The Windows Firewall service failed to start.

Error Code: %1

Fields #

NameDescription
ErrorCode UInt32Error Code

References #

Event ID 5031 — The Windows Firewall Service blocked an application from accepting incoming connections on the network.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Windows Firewall blocked an application from accepting incoming connections on the network.

Message #

Windows Firewall blocked an application from accepting incoming connections on the network.

Profiles: %1
Application: %2

Fields #

NameDescription
Profiles UnicodeStringProfiles
Bitmask flags
0x00000001
Domain
0x00000002
Private
0x00000004
Public
Application UnicodeStringApplication

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5031,
    "version": 0,
    "level": 0,
    "task": 12810,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2026-03-13T22:02:00.253205+00:00",
    "event_record_id": 16477825,
    "correlation": {
      "ActivityID": "0D26E79C-B333-0001-07E8-260D33B3DC01"
    },
    "execution": {
      "process_id": 936,
      "thread_id": 5688
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "Profiles": "(null)",
    "Application": "C:\\windows\\system32\\wbem\\wmiprvse.exe"
  },
  "message": ""
}

References #

Event ID 5032 — Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.

Message #

Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.

Error Code: %1

Fields #

NameDescription
ErrorCode UInt32Error Code

References #

Event ID 5033 — The Windows Firewall Driver has started successfully.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall Driver started successfully.

Message #

The Windows Firewall Driver started successfully.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5033,
    "version": 0,
    "level": 0,
    "task": 12292,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:42.319074+00:00",
    "event_record_id": 2907,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 224
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {},
  "message": ""
}

References #

Event ID 5034 — The Windows Firewall Driver has been stopped.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall Driver was stopped.

Message #

The Windows Firewall Driver was stopped.

References #

Event ID 5035 — The Windows Firewall Driver failed to start.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall Driver failed to start.

Message #

The Windows Firewall Driver failed to start.

Error Code: %1

Fields #

NameDescription
ErrorCode UInt32Error Code

References #

Event ID 5037 — The Windows Firewall Driver detected critical runtime error.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Firewall Driver detected a critical runtime error, terminating.

Message #

The Windows Firewall Driver detected a critical runtime error, terminating.

Error Code: %1

Fields #

NameDescription
ErrorCode UInt32Error Code

References #

Event ID 5038 — Code integrity determined that the image hash of a file is not valid.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.

Message #

Code integrity determined that the image hash of a file is not valid.  The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.

File Name: %1

Fields #

NameDescription
FileName UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5038,
    "version": 0,
    "level": 0,
    "task": 12290,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2026-03-08T23:22:33.111223+00:00",
    "event_record_id": 1559738,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 4964
    },
    "channel": "Security",
    "computer": "LAB-WIN11.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "param1": "\\Device\\HarddiskVolume4\\Program Files (x86)\\Microsoft\\EdgeWebView\\Application\\145.0.3800.97\\prefs_enclave_x64.dll"
  },
  "message": ""
}

Community Notes #

May indicate that malware attempted to load an unsigned or tampered driver/system file.

References #

Event ID 5039 — A registry key was virtualized.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Registry
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A registry key was virtualized.

Message #

A registry key was virtualized.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	Key Name: %5
	Virtual Key Name: %6

Process Information:
	Process ID: %7
	Process Name: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectPath UnicodeString[Object] Key Name
ObjectVirtualPath UnicodeString[Object] Virtual Key Name
ProcessId Pointer[Process Information] Process ID
ProcessName UnicodeString[Process Information] Process Name

References #

Event ID 5040 — A change has been made to IPsec settings. An Authentication Set was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. An authentication set was added.

Message #

A change was made to IPsec settings. An authentication set was added.
	
Profile Changed: %1

Added Authentication Set:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
AuthenticationSetId UnicodeString[Added Authentication Set] ID
AuthenticationSetName UnicodeString[Added Authentication Set] Name

References #

Event ID 5041 — A change has been made to IPsec settings. An Authentication Set was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. An authentication set was modified.

Message #

A change was made to IPsec settings. An authentication set was modified.
	
Profile Changed: %1

Modified Authentication Set:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
AuthenticationSetId UnicodeString[Modified Authentication Set] ID
AuthenticationSetName UnicodeString[Modified Authentication Set] Name

References #

Event ID 5042 — A change has been made to IPsec settings. An Authentication Set was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. An authentication set was deleted.

Message #

A change was made to IPsec settings. An authentication set was deleted.
	
Profile Changed: %1

Deleted Authentication Set:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
AuthenticationSetId UnicodeString[Deleted Authentication Set] ID
AuthenticationSetName UnicodeString[Deleted Authentication Set] Name

References #

Event ID 5043 — A change has been made to IPsec settings. A Connection Security Rule was added.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. A connection security rule was added.

Message #

A change was made to IPsec settings. A connection security rule was added.
	
Profile Changed: %1

Added Connection Security Rule:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
ConnectionSecurityRuleId UnicodeString[Added Connection Security Rule] ID
ConnectionSecurityRuleName UnicodeString[Added Connection Security Rule] Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5043,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:18:50.849068+00:00",
    "event_record_id": 16258903,
    "correlation": {
      "ActivityID": "8B83AF9E-B321-0001-1AB0-838B21B3DC01"
    },
    "execution": {
      "process_id": 968,
      "thread_id": 8880
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProfileChanged": "All",
    "ConnectionSecurityRuleId": "{381d54cc-2531-403f-a16e-a1703049dcb4}",
    "ConnectionSecurityRuleName": "EvtGen-IPsec-Test"
  },
  "message": ""
}

References #

Event ID 5044 — A change has been made to IPsec settings. A Connection Security Rule was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. A connection security rule was modified.

Message #

A change was made to IPsec settings. A connection security rule was modified.
	
Profile Changed: %1

Modified Connection Security Rule:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
ConnectionSecurityRuleId UnicodeString[Modified Connection Security Rule] ID
ConnectionSecurityRuleName UnicodeString[Modified Connection Security Rule] Name

References #

Event ID 5045 — A change has been made to IPsec settings. A Connection Security Rule was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. A connection security rule was deleted.

Message #

A change was made to IPsec settings. A connection security rule was deleted.
	
Profile Changed: %1

Deleted Connection Security Rule:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
ConnectionSecurityRuleId UnicodeString[Deleted Connection Security Rule] ID
ConnectionSecurityRuleName UnicodeString[Deleted Connection Security Rule] Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5045,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:19:58.877712+00:00",
    "event_record_id": 16285930,
    "correlation": {
      "ActivityID": "8B83AF9E-B321-0001-1AB0-838B21B3DC01"
    },
    "execution": {
      "process_id": 968,
      "thread_id": 1100
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProfileChanged": "All",
    "ConnectionSecurityRuleId": "{381d54cc-2531-403f-a16e-a1703049dcb4}",
    "ConnectionSecurityRuleName": "EvtGen-IPsec-Test"
  },
  "message": ""
}

References #

Event ID 5046 — A change has been made to IPsec settings. A Crypto Set was added.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. A crypto set was added.

Message #

A change was made to IPsec settings. A crypto set was added.
	
Profile Changed: %1

Added Crypto Set:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
CryptographicSetId UnicodeString[Added Crypto Set] ID
CryptographicSetName UnicodeString[Added Crypto Set] Name

References #

Event ID 5047 — A change has been made to IPsec settings. A Crypto Set was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. A crypto set was modified.

Message #

A change was made to IPsec settings. A crypto set was modified.
	
Profile Changed: %1

Modified Crypto Set:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
CryptographicSetId UnicodeString[Modified Crypto Set] ID
CryptographicSetName UnicodeString[Modified Crypto Set] Name

References #

Event ID 5048 — A change has been made to IPsec settings. A Crypto Set was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A change was made to IPsec settings. A crypto set was deleted.

Message #

A change was made to IPsec settings. A crypto set was deleted.
	
Profile Changed: %1

Deleted Crypto Set:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
CryptographicSetId UnicodeString[Deleted Crypto Set] ID
CryptographicSetName UnicodeString[Deleted Crypto Set] Name

References #

Event ID 5049 — An IPsec Security Association was deleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec security association was deleted.

Message #

An IPsec security association was deleted.
	
Profile Changed: %1

Deleted SA:
	ID: %2
	Name: %3

Fields #

NameDescription
ProfileChanged UnicodeStringProfile Changed
Known values
%%14644
Public
%%14645
Private
%%14646
Domain
IpSecSecurityAssociationId UnicodeString[Deleted SA] ID
IpSecSecurityAssociationName UnicodeString[Deleted SA] Name

References #

Event ID 5050 — An attempt to programmatically disable the Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE) interface was rejected.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Message #

An attempt to programmatically disable Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE) interface was rejected because this API is not supported on this version of Windows. This is most likely due to a program that is incompatible with this version of Windows. Please contact the program's manufacturer to make sure you have a compatible program version.

Error Code:		E_NOTIMPL
Caller Process Name: %1
Process Id: %2
Publisher: %3

Fields #

NameDescription
CallerProcessName UnicodeStringCaller Process Name
ProcessId UInt32Process Id
Publisher UnicodeStringPublisher

References #

Event ID 5051 — A file was virtualized.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File System
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A file was virtualized.

Message #

A file was virtualized.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	File Name: %5
	Virtual File Name: %6

Process Information:
	Process ID: %7
	Process Name: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
FileName UnicodeString[Object] File Name
VirtualFileName UnicodeString[Object] Virtual File Name
ProcessId Pointer[Process Information] Process ID
ProcessName UnicodeString[Process Information] Process Name

References #

Event ID 5056 — A cryptographic self test was performed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A cryptographic self test was performed.

Message #

A cryptographic self test was performed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Module: %5

Return Code: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
Module UnicodeStringModule
ReturnCode HexInt32Return Code

References #

Event ID 5057 — A cryptographic primitive operation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A cryptographic primitive operation failed.

Message #

A cryptographic primitive operation failed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Cryptographic Parameters:
	Provider Name: %5
	Algorithm Name: %6

Failure Information:
	Reason: %7
	Return Code: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ProviderName UnicodeString[Cryptographic Parameters] Provider Name
AlgorithmName UnicodeString[Cryptographic Parameters] Algorithm Name
Reason UnicodeString[Failure Information] Reason
ReturnCode HexInt32[Failure Information] Return Code

References #

Event ID 5058 — Key file operation.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Key file operation.

Message #

Key file operation.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Cryptographic Parameters:
	Provider Name: %5
	Algorithm Name: %6
	Key Name: %7
	Key Type: %8

Key File Operation Information:
	File Path: %9
	Operation: %10
	Return Code: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ClientProcessId UInt32[Process Information] Process ID
ClientCreationTime FILETIME[Process Information] Process Creation Time
ProviderName UnicodeString[Cryptographic Parameters] Provider Name
AlgorithmName UnicodeString[Cryptographic Parameters] Algorithm Name
KeyName UnicodeString[Cryptographic Parameters] Key Name
KeyType UnicodeString[Cryptographic Parameters] Key Type
Known values
%%2499
Machine key
%%2500
User key
KeyFilePath UnicodeString[Key File Operation Information] File Path
Operation UnicodeString[Key File Operation Information] Operation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ReturnCode HexInt32[Key File Operation Information] Return Code

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5058,
    "version": 1,
    "level": 0,
    "task": 12292,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:39.883187+00:00",
    "event_record_id": 2882,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ClientProcessId": 1612,
    "ClientCreationTime": "2023-11-06T06:25:38.635483Z",
    "ProviderName": "Microsoft Software Key Storage Provider",
    "AlgorithmName": "UNKNOWN",
    "KeyName": "b87f845a-3278-6909-ee85-d3025f077fea",
    "KeyType": "%%2500",
    "KeyFilePath": "C:\\ProgramData\\Microsoft\\Crypto\\SystemKeys\\fb28f36d176f9b9a964a506f1b386c99_31383106-803d-411b-9763-a28cdc0f0c3f",
    "Operation": "%%2458",
    "ReturnCode": "0x0"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Kusto Query Language # view in reference

References #

Event ID 5059 — Key migration operation.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Key migration operation.

Message #

Key migration operation.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Cryptographic Parameters:
	Provider Name: %5
	Algorithm Name: %6
	Key Name: %7
	Key Type: %8

Additional Information:
	Operation: %9
	Return Code: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ClientProcessId UInt32[Process Information] Process ID
ClientCreationTime FILETIME[Process Information] Process Creation Time
ProviderName UnicodeString[Cryptographic Parameters] Provider Name
AlgorithmName UnicodeString[Cryptographic Parameters] Algorithm Name
KeyName UnicodeString[Cryptographic Parameters] Key Name
KeyType UnicodeString[Cryptographic Parameters] Key Type
Known values
%%2499
Machine key
%%2500
User key
Operation UnicodeString[Additional Information] Operation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ReturnCode HexInt32[Additional Information] Return Code

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5059,
    "version": 1,
    "level": 0,
    "task": 12292,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:39.884224+00:00",
    "event_record_id": 2884,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ClientProcessId": 1612,
    "ClientCreationTime": "2023-11-06T06:25:38.635483Z",
    "ProviderName": "Microsoft Software Key Storage Provider",
    "AlgorithmName": "RSA",
    "KeyName": "b87f845a-3278-6909-ee85-d3025f077fea",
    "KeyType": "%%2500",
    "Operation": "%%2464",
    "ReturnCode": "0x0"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Kusto Query Language # view in reference

References #

Event ID 5060 — Verification operation failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Verification operation failed.

Message #

Verification operation failed.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Cryptographic Parameters:
	Provider Name: %5
	Algorithm Name: %6
	Key Name: %7
	Key Type: %8

Failure Information:
	Reason: %9
	Return Code: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ProviderName UnicodeString[Cryptographic Parameters] Provider Name
AlgorithmName UnicodeString[Cryptographic Parameters] Algorithm Name
KeyName UnicodeString[Cryptographic Parameters] Key Name
KeyType UnicodeString[Cryptographic Parameters] Key Type
Known values
%%2499
Machine key
%%2500
User key
Reason UnicodeString[Failure Information] Reason
ReturnCode HexInt32[Failure Information] Return Code

References #

Event ID 5061 — Cryptographic operation.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Cryptographic operation.

Message #

Cryptographic operation.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Cryptographic Parameters:
	Provider Name: %5
	Algorithm Name: %6
	Key Name: %7
	Key Type: %8

Cryptographic Operation:
	Operation: %9
	Return Code: %10

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ProviderName UnicodeString[Cryptographic Parameters] Provider Name
AlgorithmName UnicodeString[Cryptographic Parameters] Algorithm Name
KeyName UnicodeString[Cryptographic Parameters] Key Name
KeyType UnicodeString[Cryptographic Parameters] Key Type
Known values
%%2499
Machine key
%%2500
User key
Operation UnicodeString[Cryptographic Operation] Operation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ReturnCode HexInt32[Cryptographic Operation] Return Code

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5061,
    "version": 0,
    "level": 0,
    "task": 12290,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:39.884031+00:00",
    "event_record_id": 2883,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 856
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "ProviderName": "Microsoft Software Key Storage Provider",
    "AlgorithmName": "RSA",
    "KeyName": "b87f845a-3278-6909-ee85-d3025f077fea",
    "KeyType": "%%2500",
    "Operation": "%%2480",
    "ReturnCode": "0x0"
  },
  "message": ""
}

References #

Event ID 5062 — A kernel-mode cryptographic self test was performed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A kernel-mode cryptographic self test was performed.

Message #

A kernel-mode cryptographic self test was performed.

Module: %1

Return Code: %2

Fields #

NameDescription
Module UnicodeStringModule
ReturnCode UInt32Return Code

References #

Event ID 5063 — A cryptographic provider operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic provider operation was attempted.

Message #

A cryptographic provider operation was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Cryptographic Provider:
	Name: %5
	Module: %6

Operation: %7

Return Code: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
ProviderName UnicodeString[Cryptographic Provider] Name
ModuleName UnicodeString[Cryptographic Provider] Module
Operation UnicodeStringOperation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ReturnCode UInt32Return Code

References #

Event ID 5064 — A cryptographic context operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic context operation was attempted.

Message #

A cryptographic context operation was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Configuration Parameters:
	Scope: %5
	Context: %6

Operation: %7

Return Code: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
Scope UnicodeString[Configuration Parameters] Scope
ContextName UnicodeString[Configuration Parameters] Context
Operation UnicodeStringOperation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ReturnCode UInt32Return Code

References #

Event ID 5065 — A cryptographic context modification was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic context modification was attempted.

Message #

A cryptographic context modification was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Configuration Parameters:
	Scope: %5
	Context: %6

Change Information:
	Old Value: %7
	New Value: %8

Return Code: %9

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
Scope UnicodeString[Configuration Parameters] Scope
ContextName UnicodeString[Configuration Parameters] Context
OldValue UInt32[Change Information] Old Value
NewValue UInt32[Change Information] New Value
ReturnCode UInt32Return Code

References #

Event ID 5066 — A cryptographic function operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic function operation was attempted.

Message #

A cryptographic function operation was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Configuration Parameters:
	Scope: %5
	Context: %6
	Interface: %7
	Function: %8
	Position: %9

Operation: %10

Return Code: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
Scope UnicodeString[Configuration Parameters] Scope
ContextName UnicodeString[Configuration Parameters] Context
InterfaceId UnicodeString[Configuration Parameters] Interface
FunctionName UnicodeString[Configuration Parameters] Function
Position UInt32[Configuration Parameters] Position
Operation UnicodeStringOperation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ReturnCode UInt32Return Code

References #

Event ID 5067 — A cryptographic function modification was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic function modification was attempted.

Message #

A cryptographic function modification was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Configuration Parameters:
	Scope: %5
	Context: %6
	Interface: %7
	Function: %8

Change Information:
	Old Value: %9
	New Value: %10

Return Code: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
Scope UnicodeString[Configuration Parameters] Scope
ContextName UnicodeString[Configuration Parameters] Context
InterfaceId UnicodeString[Configuration Parameters] Interface
FunctionName UnicodeString[Configuration Parameters] Function
OldValue UInt32[Change Information] Old Value
NewValue UInt32[Change Information] New Value
ReturnCode UInt32Return Code

References #

Event ID 5068 — A cryptographic function provider operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic function provider operation was attempted.

Message #

A cryptographic function provider operation was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Configuration Parameters:
	Scope: %5
	Context: %6
	Interface: %7
	Function: %8
	Provider: %9
	Position: %10

Operation: %11

Return Code: %12

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
Scope UnicodeString[Configuration Parameters] Scope
ContextName UnicodeString[Configuration Parameters] Context
InterfaceId UnicodeString[Configuration Parameters] Interface
FunctionName UnicodeString[Configuration Parameters] Function
ProviderName UnicodeString[Configuration Parameters] Provider
Position UInt32[Configuration Parameters] Position
Operation UnicodeStringOperation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
ReturnCode UInt32Return Code

References #

Event ID 5069 — A cryptographic function property operation was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic function property operation was attempted.

Message #

A cryptographic function property operation was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Configuration Parameters:
	Scope: %5
	Context: %6
	Interface: %7
	Function: %8
	Property: %9

Operation: %10

Value: %11

Return Code: %12

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
Scope UnicodeString[Configuration Parameters] Scope
ContextName UnicodeString[Configuration Parameters] Context
InterfaceId UnicodeString[Configuration Parameters] Interface
FunctionName UnicodeString[Configuration Parameters] Function
PropertyName UnicodeString[Configuration Parameters] Property
Operation UnicodeStringOperation
Known values
%%2456
Open key file.
%%2457
Delete key file.
%%2458
Read persisted key from file.
%%2459
Write persisted key to file.
%%2464
Export of persistent cryptographic key.
%%2465
Import of persistent cryptographic key.
%%2480
Open Key.
%%2481
Create Key.
%%2482
Delete Key.
%%2483
Encrypt.
%%2484
Decrypt.
%%2485
Sign hash.
%%2486
Secret agreement.
%%2487
Domain settings.
%%2488
Local settings.
%%2489
Add provider.
%%2490
Remove provider.
%%2491
Add context.
%%2492
Remove context.
%%2493
Add function.
%%2494
Remove function.
%%2495
Add function provider.
%%2496
Remove function provider.
%%2497
Add function property.
%%2498
Remove function property.
%%2499
Machine key.
%%2500
User key.
%%2501
Key Derivation.
%%2502
Claim Creation.
%%2503
Claim Verification.
Value UnicodeStringValue
ReturnCode UInt32Return Code

References #

Event ID 5070 — A cryptographic function property modification was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A cryptographic function property modification was attempted.

Message #

A cryptographic function property modification was attempted.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Configuration Parameters:
	Scope: %5
	Context: %6
	Interface: %7
	Function: %8
	Property: %9

Change Information:
	Old Value: %10
	New Value: %11

Return Code: %12

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
Scope UnicodeString[Configuration Parameters] Scope
ContextName UnicodeString[Configuration Parameters] Context
InterfaceId UnicodeString[Configuration Parameters] Interface
FunctionName UnicodeString[Configuration Parameters] Function
PropertyName UnicodeString[Configuration Parameters] Property
OldValue UnicodeString[Change Information] Old Value
NewValue UnicodeString[Change Information] New Value
ReturnCode UInt32Return Code

References #

Event ID 5071 — Key access denied by Microsoft key distribution service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

Key access denied by Microsoft key distribution service.

Message #

Key access denied by Microsoft key distribution service.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Security Descriptor: %5

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
SecurityDescriptor UnicodeStringSecurity Descriptor

Event ID 5120 — OCSP Responder Service Started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

OCSP Responder Service Started.

Message #

OCSP Responder Service Started.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5120,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-11T09:20:46.158376Z",
    "event_record_id": 1207920,
    "correlation": {
      "#attributes": {
        "ActivityID": "2FEE2C3A-4F79-0001-502C-EE2F794FD601"
      }
    },
    "execution": {
      "process_id": 576,
      "thread_id": 3212
    },
    "channel": "Security",
    "computer": "pki01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {}
}

References #

Event ID 5121 — OCSP Responder Service Stopped.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

OCSP Responder Service Stopped.

Message #

OCSP Responder Service Stopped.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5121,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-11T09:20:43.401378Z",
    "event_record_id": 1207901,
    "correlation": {
      "#attributes": {
        "ActivityID": "2FEE2C3A-4F79-0001-502C-EE2F794FD601"
      }
    },
    "execution": {
      "process_id": 576,
      "thread_id": 3212
    },
    "channel": "Security",
    "computer": "pki01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {}
}

References #

Event ID 5122 — A Configuration entry changed in the OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

A Configuration entry changed in the OCSP Responder Service.

Message #

A Configuration entry changed in the OCSP Responder Service.

CA Configuration ID: %1
New Value: %2

Fields #

NameDescription
CAConfigurationId UnicodeStringCA Configuration ID
NewValue UnicodeStringNew Value
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

References #

Event ID 5123 — A configuration entry changed in the OCSP Responder Service.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

A configuration entry changed in the OCSP Responder Service.

Message #

A configuration entry changed in the OCSP Responder Service.

Property Name: %1
New Value: %2

Fields #

NameDescription
PropertyName UnicodeStringProperty Name
NewValue UnicodeStringNew Value
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5123,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-11T09:21:24.702958Z",
    "event_record_id": 1207931,
    "correlation": {
      "#attributes": {
        "ActivityID": "2FEE2C3A-4F79-0001-502C-EE2F794FD601"
      }
    },
    "execution": {
      "process_id": 576,
      "thread_id": 3544
    },
    "channel": "Security",
    "computer": "pki01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "PropertyName": "MaxNumOfCacheEntries",
    "NewValue": "5000",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x477ac56"
  }
}

References #

Event ID 5124 — A security setting was updated on OCSP Responder Service.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Certification Services
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A security setting was updated on OCSP Responder Service.

Message #

A security setting was updated on OCSP Responder Service.

New Value: %1

Fields #

NameDescription
NewSecuritySettings UnicodeStringNew Value
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5124,
    "version": 0,
    "level": 0,
    "task": 12805,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-11T09:21:50.109681Z",
    "event_record_id": 1207947,
    "correlation": {
      "#attributes": {
        "ActivityID": "2FEE2C3A-4F79-0001-502C-EE2F794FD601"
      }
    },
    "execution": {
      "process_id": 576,
      "thread_id": 3544
    },
    "channel": "Security",
    "computer": "pki01.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "NewSecuritySettings": "\nAllow(0x00000101)\tBUILTIN\\Administrators\n\tOCSP Administrator\n\tRead\nAllow(0x00000300)\tIIS APPPOOL\\OCSPISAPIAppPool\n\tRead\n\tOCSP Requestor\n",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x477ac56"
  }
}

References #

Event ID 5125 — A request was submitted to OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A request was submitted to OCSP Responder Service.

Message #

A request was submitted to OCSP Responder Service.

Fields #

NameDescription
SerialNumber UnicodeStringCertificate Serial Number
CAName UnicodeStringIssuer CA Name
Status UnicodeStringRevocation Status NTSTATUS reference
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64

Event ID 5126 — Signing Certificate was automatically updated by the OCSP Responder Service.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Signing Certificate was automatically updated by the OCSP Responder Service.

Message #

Signing Certificate was automatically updated by the OCSP Responder Service.

CA Configuration ID: %1
New Signing Certificate Hash: %2

Fields #

NameDescription
CAConfigurationId UnicodeStringCA Configuration ID
NewSigningCertificateHash UnicodeStringNew Signing Certificate Hash

References #

Event ID 5127 — The OCSP Revocation Provider successfully updated the revocation information.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The OCSP Revocation Provider successfully updated the revocation information.

Message #

The OCSP Revocation Provider successfully updated the revocation information.

CA Configuration ID: %1
Base CRL Number: %2
Base CRL This Update: %3
Base CRL Hash: %4
Delta CRL Number: %5
Delta CRL Indicator: %6
Delta CRL This Update: %7
Delta CRL Hash: %8

Fields #

NameDescription
CAConfigurationId UnicodeStringCA Configuration ID
BaseCRLNumber UnicodeStringBase CRL Number
BaseCRLThisUpdate UnicodeStringBase CRL This Update
BaseCRLHash UnicodeStringBase CRL Hash
DeltaCRLNumber UnicodeStringDelta CRL Number
DeltaCRLIndicator UnicodeStringDelta CRL Indicator
DeltaCRLThisUpdate UnicodeStringDelta CRL This Update
DeltaCRLHash UnicodeStringDelta CRL Hash

References #

Event ID 5136 — A directory service object was modified.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Changes
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A directory service object was modified.

Message #

A directory service object was modified.
	
Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6

Directory Service:
	Name: %7
	Type: %8
	
Object:
	DN: %9
	GUID: %10
	Class: %11
	
Attribute:
	LDAP Display Name: %12
	Syntax (OID): %13
	Value: %14
	
Operation:
	Type: %15
	Correlation ID: %1
	Application Correlation ID: %2

Fields #

NameDescription
OpCorrelationID GUID[Operation] Correlation ID
AppCorrelationID UnicodeString[Operation] Application Correlation ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DSName UnicodeString[Directory Service] Name
DSType UnicodeString[Directory Service] Type
Known values
%%14676
Active Directory Domain Services
%%14677
Active Directory Lightweight Directory Services
ObjectDN UnicodeString[Object] DN
ObjectGUID GUID[Object] GUID
ObjectClass UnicodeString[Object] Class
AttributeLDAPDisplayName UnicodeString[Attribute] LDAP Display Name
AttributeSyntaxOID UnicodeString[Attribute] Syntax (OID)
AttributeValue UnicodeString[Attribute] Value
OperationType UnicodeString[Operation] Type
Known values
%%1904
New registry value created
%%1905
Existing registry value modified
%%1906
Registry value deleted
%%14674
Value Added
%%14675
Value Deleted
%%14680
Value Added With Expiration Time
%%14681
Value Deleted With Expiration Time
%%14688
Value Auto Deleted With Expiration Time

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5136,
    "version": 0,
    "level": 0,
    "task": 14081,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-25T10:33:56.457629Z",
    "event_record_id": 198238043,
    "correlation": {},
    "execution": {
      "process_id": 444,
      "thread_id": 3488
    },
    "channel": "Security",
    "computer": "DC1.insecurebank.local",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "OpCorrelationID": "780EA6E1-6307-48D6-8B0D-8C45CC7534AE",
    "AppCorrelationID": "-",
    "SubjectUserSid": "S-1-5-21-738609754-2819869699-4189121830-1108",
    "SubjectUserName": "bob",
    "SubjectDomainName": "insecurebank",
    "SubjectLogonId": "0x8d7099",
    "DSName": "insecurebank.local",
    "DSType": "%%14676",
    "ObjectDN": "CN={6AC1786C-016F-11D2-945F-00C04FB984F9},CN=POLICIES,CN=SYSTEM,DC=INSECUREBANK,DC=LOCAL",
    "ObjectGUID": "6CDECDB5-7515-4511-8141-C34A7C3D4A0A",
    "ObjectClass": "groupPolicyContainer",
    "AttributeLDAPDisplayName": "versionNumber",
    "AttributeSyntaxOID": "2.5.5.9",
    "AttributeValue": "5",
    "OperationType": "%%14675"
  }
}

Detection Patterns #

Defense Evasion: Rogue Domain Controller

1 rule

Sigma

Ilyas Ochkov, oscd.community, Chakib Gzenayi (@Chak092), Hosni Mribah

Community Notes #

May indicate high-impact changes in AD, like adding SID history or malicious GPOs. Attribute change to msDS-AllowedToActOnBehalfOfOtherIdentity is usually suspicious and indicates a Kerberos relay attack.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Powerview Add-DomainObjectAcl DCSync AD Extend Right source high: Backdooring domain object to grant the rights associated with DCSync to a regular user or machine account using Powerview\Add-DomainObjectAcl DCSync Extended Right cmdlet, will allow to re-obtain the pwd hashes of any user/computer
  • Windows Default Domain GPO Modification source medium: Detects modifications to Default Domain or Default Domain Controllers Group Policy Objects (GPOs). Adversaries may modify these default GPOs to deploy malicious configurations across the domain.
  • Group Policy Abuse for Privilege Addition source medium: Detects the first occurrence of a modification to Group Policy Object Attributes to add privileges to user accounts or use them to add users as local admins.
Show 2 more (5 total)

Elastic # view in reference

  • Potential Active Directory Replication Account Backdoor source medium: Identifies the modification of the nTSecurityDescriptor attribute in a domain object with rights related to DCSync to a user/computer account. Attackers can use this backdoor to re-obtain access to hashes of any user/computer.
  • Potential Shadow Credentials added to AD Object source high: Identify the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object. Attackers can abuse control over the object and create a key pair, append to raw public key in the attribute, and obtain persistent and stealthy access to the target user or computer object.
  • User account exposed to Kerberoasting source medium: Detects when a user account has the servicePrincipalName attribute modified. Attackers can abuse write privileges over a user to configure Service Principle Names (SPNs) so that they can perform Kerberoasting. Administrators can also configure this for legitimate purposes, exposing the account to Kerberoasting.
Show 4 more (7 total)
  • AdminSDHolder Backdoor source high: Detects modifications in the AdminSDHolder object. Attackers can abuse the SDProp process to implement a persistent backdoor in Active Directory. SDProp compares the permissions on protected objects with those defined on the AdminSDHolder object. If the permissions on any of the protected accounts and groups do not match, the permissions on the protected accounts and groups are reset to match those of the domain's AdminSDHolder object, regaining their Administrative Privileges.
  • AdminSDHolder SDProp Exclusion Added source high: Identifies a modification on the dsHeuristics attribute on the bit that holds the configuration of groups excluded from the SDProp process. The SDProp compares the permissions on protected objects with those defined on the AdminSDHolder object. If the permissions on any of the protected accounts and groups do not match, the permissions on the protected accounts and groups are reset to match those of the domain's AdminSDHolder object, meaning that groups excluded will remain unchanged. Attackers can abuse this misconfiguration to maintain long-term access to privileged accounts in these groups.
  • Delegated Managed Service Account Modification by an Unusual User source high: Detects modifications in the msDS-ManagedAccountPrecededByLink attribute of a delegated managed service account by an unusual subject account. Attackers can abuse this attribute to take over the permission of a target account and inherit it's permissions allowing them to further elevate privileges.
  • Modification of the msPKIAccountCredentials source medium: Identify the modification of the msPKIAccountCredentials attribute in an Active Directory User Object. Attackers can abuse the credentials roaming feature to overwrite an arbitrary file for privilege escalation. ms-PKI-AccountCredentials contains binary large objects (BLOBs) of encrypted credential objects from the credential manager store, private keys, certificates, and certificate requests.

Splunk # view in reference

  • Windows AD AdminSDHolder ACL Modified source: The following analytic detects modifications to the Access Control List (ACL) of the AdminSDHolder object in a Windows domain, specifically the addition of new rules. It leverages EventCode 5136 from the Security Event Log, focusing on changes to the nTSecurityDescriptor attribute. This activity is significant because the AdminSDHolder object secures privileged group members, and unauthorized changes can allow attackers to establish persistence and escalate privileges. If confirmed malicious, this could enable an attacker to control domain-level permissions, compromising the entire Active Directory environment.
  • Windows AD Dangerous Deny ACL Modification source: This detection identifies an Active Directory access-control list (ACL) modification event, which applies permissions that deny the ability to enumerate permissions of the object.
  • Windows AD Dangerous Group ACL Modification source: This detection monitors the addition of the following ACLs to an Active Directory group object: "Full control", "All extended rights", "All validated writes", "Create all child objects", "Delete all child objects", "Delete subtree", "Delete", "Modify permissions", "Modify owner", and "Write all properties". Such modifications can indicate potential privilege escalation or malicious activity. Immediate investigation is recommended upon alert.
Show 17 more (20 total)
  • Windows AD Dangerous User ACL Modification source: This detection monitors the addition of the following ACLs to an Active Directory user object: "Full control","All extended rights","All validated writes", "Create all child objects","Delete all child objects","Delete subtree","Delete","Modify permissions","Modify owner","Write all properties". Such modifications can indicate potential privilege escalation or malicious activity. Immediate investigation is recommended upon alert.
  • Windows AD DCShadow Privileges ACL Addition source: This detection identifies an Active Directory access-control list (ACL) modification event, which applies the minimum required extended rights to perform the DCShadow attack.
  • Windows AD Domain Replication ACL Addition source: The following analytic detects the addition of permissions required for a DCSync attack, specifically DS-Replication-Get-Changes, DS-Replication-Get-Changes-All, and DS-Replication-Get-Changes-In-Filtered-Set. It leverages EventCode 5136 from the Windows Security Event Log to identify when these permissions are granted. This activity is significant because it indicates potential preparation for a DCSync attack, which can be used to replicate AD objects and exfiltrate sensitive data. If confirmed malicious, an attacker could gain extensive access to Active Directory, leading to severe data breaches and privilege escalation.
  • Windows AD Domain Root ACL Deletion source: ACL deletion performed on the domain root object, significant AD change with high impact. Following MS guidance all changes at this level should be reviewed. Drill into the logonID within EventCode 4624 for information on the source device during triage.
  • Windows AD Domain Root ACL Modification source: ACL modification performed on the domain root object, significant AD change with high impact. Following MS guidance all changes at this level should be reviewed. Drill into the logonID within EventCode 4624 for information on the source device during triage.
  • Windows AD GPO Deleted source: This detection identifies when an Active Directory Group Policy is deleted using the Group Policy Management Console.
  • Windows AD GPO Disabled source: This detection identifies when an Active Directory Group Policy is disabled using the Group Policy Management Console.
  • Windows AD GPO New CSE Addition source: This detection identifies when a a new client side extension is added to an Active Directory Group Policy using the Group Policy Management Console.
  • Windows AD Hidden OU Creation source: This analytic is looking for when an ACL is applied to an OU which denies listing the objects residing in the OU. This activity combined with modifying the owner of the OU will hide AD objects even from domain administrators.
  • Windows AD Object Owner Updated source: AD Object Owner Updated. The owner provides Full control level privileges over the target AD Object. This event has significant impact alone and is also a precursor activity for hiding an AD object.
  • Windows AD Self DACL Assignment source: Detect when a user creates a new DACL in AD for their own AD object.
  • Windows AD ServicePrincipalName Added To Domain Account source: The following analytic detects the addition of a Service Principal Name (SPN) to a domain account. It leverages Windows Event Code 5136 and monitors changes to the servicePrincipalName attribute. This activity is significant because it may indicate an attempt to perform Kerberoasting, a technique where attackers extract and crack service account passwords offline. If confirmed malicious, this could allow an attacker to obtain cleartext passwords, leading to unauthorized access and potential lateral movement within the domain environment.
  • Windows AD Short Lived Domain Account ServicePrincipalName source: The following analytic identifies the addition and quick deletion of a Service Principal Name (SPN) to a domain account within 5 minutes. This detection leverages EventCode 5136 from the Windows Security Event Log, focusing on changes to the servicePrincipalName attribute. This activity is significant as it may indicate an attempt to perform Kerberoasting, a technique used to crack the cleartext password of a domain account offline. If confirmed malicious, this could allow an attacker to gain unauthorized access to sensitive information or escalate privileges within the domain environment.
  • Windows AD Short Lived Domain Controller SPN Attribute source: The following analytic detects the temporary addition of a global catalog SPN or a DRS RPC SPN to an Active Directory computer object, indicative of a potential DCShadow attack. This detection leverages EventCode 5136 from the `wineventlog_security` data source, focusing on specific SPN attribute changes. This activity is significant as DCShadow attacks allow attackers with privileged access to register rogue Domain Controllers, enabling unauthorized changes to the AD infrastructure. If confirmed malicious, this could lead to unauthorized replication of changes, including credentials and keys, compromising the entire domain's security.↳ also matches:Event ID 4624: An account was successfully logged on.
  • Windows AD SID History Attribute Modified source: The following analytic detects modifications to the SID History attribute in Active Directory by leveraging event code 5136. This detection uses logs from the `wineventlog_security` data source to identify changes to the sIDHistory attribute. Monitoring this activity is crucial as the SID History attribute can be exploited by adversaries to inherit permissions from other accounts, potentially granting unauthorized access. If confirmed malicious, this activity could allow attackers to maintain persistent access and escalate privileges within the domain, posing a significant security risk.
  • Windows AD Suspicious Attribute Modification source: This detection monitors changes to the following Active Directory attributes: "msDS-AllowedToDelegateTo", "msDS-AllowedToActOnBehalfOfOtherIdentity", "msDS-KeyCredentialLink", "scriptPath", and "msTSInitialProgram". Modifications to these attributes can indicate potential malicious activity or privilege escalation attempts. Immediate investigation is recommended upon alert.
  • Windows Default Group Policy Object Modified source: The following analytic detects modifications to default Group Policy Objects (GPOs) using Event ID 5136. It monitors changes to the `Default Domain Controllers Policy` and `Default Domain Policy`, which are critical for enforcing security settings across domain controllers and all users/computers, respectively. This activity is significant because unauthorized changes to these GPOs can indicate an adversary with privileged access attempting to deploy persistence mechanisms or execute malware across the network. If confirmed malicious, such modifications could lead to widespread compromise, allowing attackers to maintain control and execute arbitrary code on numerous hosts.

Kusto Query Language # view in reference

  • AdminSDHolder Modifications source high: 'This query detects modification in the AdminSDHolder in the Active Directory which could indicate an attempt for persistence. AdminSDHolder Modification is a persistence technique in which an attacker abuses the SDProp process in Active Directory to establish a persistent backdoor to Active Directory. This query searches for the event id 5136 where the Object DN is AdminSDHolder. Ref: https://netwrix.com/en/cybersecurity-glossary/cyber-security-attacks/adminsdholder-attack/'
  • Possible Resource-Based Constrained Delegation Abuse source medium: 'This query identifies Active Directory computer objects modifications that allow an adversary to abuse the Resource-based constrained delegation. This query checks for event id 5136 that the Object Class field is "computer" and the LDAP Display Name is "msDS-AllowedToActOnBehalfOfOtherIdentity" which is an indicator of Resource-based constrained delegation. Ref: https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html'
  • Service Principal Name (SPN) Assigned to User Account source medium: 'This query identifies whether an Active Directory user object was assigned a service principal name which could indicate that an adversary is preparing for performing Kerberoasting. This query checks for event id 5136, that the Object Class field is "user" and the LDAP Display Name is "servicePrincipalName". Ref: https://thevivi.net/assets/docs/2019/theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf'
Show 1 more (4 total)
  • Exchange OAB Virtual Directory Attribute Containing Potential Webshell source high: 'This query uses Windows Event ID 5136 in order to detect potential webshell deployment by exploitation of CVE-2021-27065. This query looks for changes to the InternalHostName or ExternalHostName properties of Exchange OAB Virtual Directory objects in AD Directory Services where the new objects contain potential webshell objects.'

References #

Event ID 5137 — A directory service object was created.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Changes
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A directory service object was created.

Message #

A directory service object was created.
	
Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6
	
Directory Service:
	Name: %7
	Type: %8
	
Object:
	DN: %9
	GUID: %10
	Class: %11
	
Operation:
	Correlation ID: %1
	Application Correlation ID: %2

Fields #

NameDescription
OpCorrelationID GUID[Operation] Correlation ID
AppCorrelationID UnicodeString[Operation] Application Correlation ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DSName UnicodeString[Directory Service] Name
DSType UnicodeString[Directory Service] Type
Known values
%%14676
Active Directory Domain Services
%%14677
Active Directory Lightweight Directory Services
ObjectDN UnicodeString[Object] DN
ObjectGUID GUID[Object] GUID
ObjectClass UnicodeString[Object] Class

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5137,
    "version": 0,
    "level": 0,
    "task": 14081,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2021-04-27T11:04:13.291038Z",
    "event_record_id": 138520223,
    "correlation": {
      "#attributes": {
        "ActivityID": "9816F041-2BBE-0000-53F0-1698BE2BD701"
      }
    },
    "execution": {
      "process_id": 548,
      "thread_id": 4324
    },
    "channel": "Security",
    "computer": "rootdc1.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "OpCorrelationID": "B960A203-A3DF-4586-A2ED-740024D6C42A",
    "AppCorrelationID": "-",
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x31a24611",
    "DSName": "offsec.lan",
    "DSType": "%%14676",
    "ObjectDN": "CN=JUMP01,CN=Servers,CN=OFFSEC-PREMISE,CN=Sites,CN=Configuration,DC=offsec,DC=lan",
    "ObjectGUID": "590B1EF4-6143-4C18-B554-1EE0A59BB7F8",
    "ObjectClass": "server"
  }
}

Detection Patterns #

Community Notes #

May indicate high-impact changes in AD.

Detection Rules #

View all rules referencing this event →

Elastic # view in reference

  • Potential ADIDNS Poisoning via Wildcard Record Creation source high: Active Directory Integrated DNS (ADIDNS) is one of the core components of AD DS, leveraging AD's access control and replication to maintain domain consistency. It stores DNS zones as AD objects, a feature that, while robust, introduces some security issues, such as wildcard records, mainly because of the default permission (Any authenticated users) to create DNS-named records. Attackers can create wildcard records to redirect traffic that doesn't explicitly match records contained in the zone, becoming the Man-in-the-Middle and being able to abuse DNS similarly to LLMNR/NBNS spoofing.
  • Potential WPAD Spoofing via DNS Record Creation source medium: Identifies the creation of a DNS record that is potentially meant to enable WPAD spoofing. Attackers can disable the Global Query Block List (GQBL) and create a "wpad" record to exploit hosts running WPAD with default settings for privilege escalation and lateral movement.
  • Creation of a DNS-Named Record source low: Active Directory Integrated DNS (ADIDNS) is one of the core components of AD DS, leveraging AD's access control and replication to maintain domain consistency. It stores DNS zones as AD objects, a feature that, while robust, introduces some security issues because of the default permission (Any authenticated users) to create DNS-named records. Attackers can perform Dynamic Spoofing attacks, where they monitor LLMNR/NBT-NS requests and create DNS-named records to target systems that are requested from multiple systems. They can also create specific records to target specific services, such as wpad, for spoofing attacks.
Show 1 more (4 total)
  • dMSA Account Creation by an Unusual User source high: Detects the creation of a delegated Managed Service Account by an unusual subject account. Attackers can abuse the dMSA account migration feature to elevate privileges abusing weak persmission allowing users child objects rights or msDS-DelegatedManagedServiceAccount rights.

References #

Event ID 5138 — A directory service object was undeleted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Changes
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A directory service object was undeleted.

Message #

A directory service object was undeleted.
	
Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6
	
Directory Service:
	Name: %7
	Type: %8
	
Object:
	Old DN: %9
	New DN: %10
	GUID: %11
	Class: %12
	
Operation:
	Correlation ID: %1
	Application Correlation ID: %2

Fields #

NameDescription
OpCorrelationID GUID[Operation] Correlation ID
AppCorrelationID UnicodeString[Operation] Application Correlation ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DSName UnicodeString[Directory Service] Name
DSType UnicodeString[Directory Service] Type
Known values
%%14676
Active Directory Domain Services
%%14677
Active Directory Lightweight Directory Services
OldObjectDN UnicodeString[Object] Old DN
NewObjectDN UnicodeString[Object] New DN
ObjectGUID GUID[Object] GUID
ObjectClass UnicodeString[Object] Class

References #

Event ID 5139 — A directory service object was moved.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Changes
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A directory service object was moved.

Message #

A directory service object was moved.
	
Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6
	
Directory Service:
	Name: %7
	Type: %8
	
Object:
	Old DN: %9
	New DN: %10
	GUID: %11
	Class: %12
	
Operation:
	Correlation ID: %1
	Application Correlation ID: %2

Fields #

NameDescription
OpCorrelationID GUID[Operation] Correlation ID
AppCorrelationID UnicodeString[Operation] Application Correlation ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DSName UnicodeString[Directory Service] Name
DSType UnicodeString[Directory Service] Type
Known values
%%14676
Active Directory Domain Services
%%14677
Active Directory Lightweight Directory Services
OldObjectDN UnicodeString[Object] Old DN
NewObjectDN UnicodeString[Object] New DN
ObjectGUID GUID[Object] GUID
ObjectClass UnicodeString[Object] Class

Community Notes #

May indicate high-impact changes in AD.

References #

Event ID 5140 — A network share object was accessed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File Share
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A network share object was accessed.

Message #

A network share object was accessed.
	
Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Network Information:	
	Source Address: %5
	Source Port: %6
	
Share Name: %7

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectType UnicodeString[Network Information] Object Type
IpAddress UnicodeString[Network Information] Source Address
IpPort UnicodeString[Network Information] Source Port
ShareName UnicodeString[Share Information] Share Name
ShareLocalPath UnicodeString[Share Information] Share Path
AccessMask HexInt32[Access Request Information] Access Mask Access mask reference
AccessList UnicodeString[Access Request Information] Accesses

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5140,
    "version": 1,
    "level": 0,
    "task": 12808,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:51:58.721534+00:00",
    "event_record_id": 300935,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 17692
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x27844",
    "ObjectType": "File",
    "IpAddress": "::1",
    "IpPort": "62726",
    "ShareName": "\\\\*\\C$",
    "ShareLocalPath": "\\??\\C:\\",
    "AccessMask": "0x1",
    "AccessList": "%%4416\r\n\t\t\t\t"
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Tracks who is accessing shared folders on the network. Very noisy.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Splunk # view in reference

  • Network Share Discovery Via Dir Command source: The following analytic detects access to Windows administrative SMB shares (Admin$, IPC$, C$) using the 'dir' command. It leverages Windows Security Event Logs with EventCode 5140 to identify this activity. This behavior is significant as it is commonly used by tools like PsExec/PaExec for staging binaries before creating and starting services on remote endpoints, a technique often employed by adversaries for lateral movement and remote code execution. If confirmed malicious, this activity could allow attackers to propagate malware, such as IcedID, across the network, leading to widespread infection and potential data breaches.

References #

Event ID 5141 — A directory service object was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
DS Access → Directory Service Changes
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

A directory service object was deleted.

Message #

A directory service object was deleted.
	
Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6
	
Directory Service:
	Name: %7
	Type: %8
	
Object:
	DN: %9
	GUID: %10
	Class: %11
	
Operation:
	Tree Delete: %12
	Correlation ID: %1
	Application Correlation ID: %2

Fields #

NameDescription
OpCorrelationID GUID[Operation] Correlation ID
AppCorrelationID UnicodeString[Operation] Application Correlation ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DSName UnicodeString[Directory Service] Name
DSType UnicodeString[Directory Service] Type
Known values
%%14676
Active Directory Domain Services
%%14677
Active Directory Lightweight Directory Services
ObjectDN UnicodeString[Object] DN
ObjectGUID GUID[Object] GUID
ObjectClass UnicodeString[Object] Class
TreeDelete UnicodeString[Operation] Tree Delete

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5141,
    "version": 0,
    "level": 0,
    "task": 14081,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T23:09:16.430494+00:00",
    "event_record_id": 16632112,
    "correlation": {},
    "execution": {
      "process_id": 936,
      "thread_id": 724
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "OpCorrelationID": "B2C1C1B5-B65D-4E48-B5C7-AD55815CDF5D",
    "AppCorrelationID": "-",
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xbefec",
    "DSName": "ludus.domain",
    "DSType": "%%14676",
    "ObjectDN": "CN=testaudit2,CN=Users,DC=ludus,DC=domain",
    "ObjectGUID": "E352E021-AD2D-40D3-B617-37AEF7687FFD",
    "ObjectClass": "user",
    "TreeDelete": "%%14679"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 5142 — A network share object was added.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File Share
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

A network share object was added.

Message #

A network share object was added.
	
Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Share Information:	
	Share Name: %5
	Share Path: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ShareName UnicodeString[Share Information] Share Name
ShareLocalPath UnicodeString[Share Information] Share Path

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5142,
    "version": 0,
    "level": 0,
    "task": 12808,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-03-17T19:30:30.324836Z",
    "event_record_id": 6273,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 64
    },
    "channel": "Security",
    "computer": "PC04.example.corp",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-3583694148-1414552638-2922671848-1000",
    "SubjectUserName": "IEUser",
    "SubjectDomainName": "PC04",
    "SubjectLogonId": "0x128a9",
    "ShareName": "\\\\*\\PRINT",
    "ShareLocalPath": "c:\\windows\\system32"
  }
}

Community Notes #

May be a prelude to data exfiltration. Includes named pipes and IPC$ (confirm if the client address is external/unexpected). May indicate share enumeration and directory walking prior to exfiltration. The RelativeTargetName field may show the original file name and path on the attacker's machine.

References #

Event ID 5143 — A network share object was modified.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File Share
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

A network share object was modified.

Message #

A network share object was modified.
	
Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Share Information:
	Object Type: %5
	Share Name: %6
	Share Path: %7
	Old Remark: %8
	New Remark: %9
	Old MaxUsers: %10
	New Maxusers: %11
	Old ShareFlags: %12
	New ShareFlags: %13
	Old SD: %14
	New SD: %15

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectType UnicodeString[Share Information] Object Type
ShareName UnicodeString[Share Information] Share Name
ShareLocalPath UnicodeString[Share Information] Share Path
OldRemark UnicodeString[Share Information] Old Remark
NewRemark UnicodeString[Share Information] New Remark
OldMaxUsers HexInt32[Share Information] Old MaxUsers
NewMaxUsers HexInt32[Share Information] New Maxusers
OldShareFlags HexInt32[Share Information] Old ShareFlags
NewShareFlags HexInt32[Share Information] New ShareFlags
OldSD UnicodeString[Share Information] Old SD
NewSD UnicodeString[Share Information] New SD

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5143,
    "version": 0,
    "level": 0,
    "task": 12808,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2020-07-11T17:17:32.128132Z",
    "event_record_id": 1228290,
    "correlation": {},
    "execution": {
      "process_id": 464,
      "thread_id": 472
    },
    "channel": "Security",
    "computer": "fs02.offsec.lan",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-4230534742-2542757381-3142984815-1111",
    "SubjectUserName": "admmig",
    "SubjectDomainName": "OFFSEC",
    "SubjectLogonId": "0x202dac8",
    "ObjectType": "Directory",
    "ShareName": "\\\\*\\hidden-share$",
    "ShareLocalPath": "C:\\TOOLS\\hidden-share$",
    "OldRemark": "N/A",
    "NewRemark": "N/A",
    "OldMaxUsers": "0xffffffff",
    "NewMaxUsers": "0xffffffff",
    "OldShareFlags": "0x0",
    "NewShareFlags": "0x0",
    "OldSD": "O:BAG:DUD:(A;;0x1200a9;;;WD)",
    "NewSD": "O:BAG:DUD:(A;;FA;;;S-1-5-21-4230534742-2542757381-3142984815-1107)(A;;0x1301bf;;;WD)"
  }
}

Detection Rules #

View all rules referencing this event →

Kusto Query Language # view in reference

  • Excessive share permissions source medium: The query searches for event 5143, which is triggered when a share is created or changed and includes de share permissions. First it checks to see if this is a whitelisted share for the system (e.g. domaincontroller netlogon, printserver print$ etc.). The share permissions are then checked against 'allow' rule (A) for a number of well known overly permissive groups, like all users, guests, authenticated users etc. If these are found, an alert is raised so the share creation may be audited. Note: this rule only checks for changed permissions, to prevent repeat alerts if for example a comment is changed, but the permissions are not altered.

References #

Event ID 5144 — A network share object was deleted.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File Share
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

A network share object was deleted.

Message #

A network share object was deleted.
	
Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Share Information:	
	Share Name: %5
	Share Path: %6

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ShareName UnicodeString[Share Information] Share Name
ShareLocalPath UnicodeString[Share Information] Share Path

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5144,
    "version": 0,
    "level": 0,
    "task": 12808,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:18:20.582403+00:00",
    "event_record_id": 16257540,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 2396
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "ShareName": "\\\\*\\EvtGenShare",
    "ShareLocalPath": "C:\\EvtGenFileTest\\Shared"
  },
  "message": ""
}

References #

Event ID 5145 — A network share object was checked to see whether client can be granted desired access.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Detailed File Share
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A network share object was checked to see whether client can be granted desired access.

Message #

A network share object was checked to see whether client can be granted desired access.
	
Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Network Information:	
	Object Type: %5
	Source Address: %6
	Source Port: %7
	
Share Information:
	Share Name: %8
	Share Path: %9
	Relative Target Name: %10

Access Request Information:
	Access Mask: %11
	Accesses: %12
Access Check Results:
	%13

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ObjectType UnicodeString[Network Information] Object Type
IpAddress UnicodeString[Network Information] Source Address
IpPort UnicodeString[Network Information] Source Port
ShareName UnicodeString[Share Information] Share Name
ShareLocalPath UnicodeString[Share Information] Share Path
RelativeTargetName UnicodeString[Share Information] Relative Target Name
AccessMask HexInt32[Access Request Information] Access Mask Access mask reference
AccessList UnicodeString[Access Request Information] Accesses
AccessReason UnicodeString
Known values
%%1801
Granted by
%%1802
Denied by
%%1803
Denied by Integrity Policy check
%%1804
Granted by Ownership
%%1805
Not granted
%%1806
Granted by NULL DACL
%%1807
Denied by Empty DACL
%%1808
Granted by NULL Security Descriptor
%%1809
Unknown or unchecked
%%1810
Not granted due to missing
%%1811
Granted by ACE on parent folder
%%1812
Denied by ACE on parent folder
%%1813
Granted by Central Access Rule
%%1814
NOT Granted by Central Access Rule
%%1815
Granted by parent folder's Central Access Rule
%%1816
NOT Granted by parent folder's Central Access Rule
%%1830
Not granted to AppContainers
%%1841
Denied by Process Trust Label ACE
%%1856
Denied by Access Filter Ace

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5145,
    "version": 0,
    "level": 0,
    "task": 12811,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:51:58.765174+00:00",
    "event_record_id": 300953,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 20724
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1992711665-1655669231-58201500-1000",
    "SubjectUserName": "User",
    "SubjectDomainName": "WINDEV2310EVAL",
    "SubjectLogonId": "0x27844",
    "ObjectType": "File",
    "IpAddress": "::1",
    "IpPort": "62726",
    "ShareName": "\\\\*\\C$",
    "ShareLocalPath": "\\??\\C:\\",
    "RelativeTargetName": "Users\\User\\Downloads",
    "AccessMask": "0x100081",
    "AccessList": "%%1541\r\n\t\t\t\t%%4416\r\n\t\t\t\t%%4423\r\n\t\t\t\t",
    "AccessReason": "-"
  },
  "message": ""
}

Detection Patterns #

Named Pipe

13 rules

Sigma

Florian Roth (Nextron Systems), Wojciech Lesicki
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems)
Show 3 more (6 total)
Florian Roth (Nextron Systems), blueteam0ps, elhoim

Splunk

Teoderick Contreras, Splunk
Show 2 more (5 total)

Kusto Query Language

Microsoft Security Research

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 12 more (15 total)

Elastic # view in reference

  • Potential Machine Account Relay Attack via SMB source high: Identifies potential relay attacks against a machine account by identifying network share access events coming from a remote source.ip but using the target server computer account. This may indicate a successful SMB relay attack.

Splunk # view in reference

  • Executable File Written in Administrative SMB Share source: The following analytic detects executable files (.exe or .dll) being written to Windows administrative SMB shares (Admin$, IPC$, C$). It leverages Windows Security Event Logs with EventCode 5145 to identify this activity. This behavior is significant as it is commonly used by tools like PsExec/PaExec for staging binaries before creating and starting services on remote endpoints, a technique often employed for lateral movement and remote code execution. If confirmed malicious, this activity could allow an attacker to execute arbitrary code remotely, potentially compromising additional systems within the network.
  • High Frequency Copy Of Files In Network Share source: The following analytic detects a high frequency of file copying or moving within network shares, which may indicate potential data sabotage or exfiltration attempts. It leverages Windows Security Event Logs (EventCode 5145) to monitor access to specific file types and network shares. This activity is significant as it can reveal insider threats attempting to transfer classified or internal files, potentially leading to data breaches or evidence tampering. If confirmed malicious, this behavior could result in unauthorized data access, data loss, or compromised sensitive information.
  • PetitPotam Network Share Access Request source: The following analytic detects network share access requests indicative of the PetitPotam attack (CVE-2021-36942). It leverages Windows Event Code 5145, which logs attempts to access network share objects. This detection is significant as PetitPotam can coerce authentication from domain controllers, potentially leading to unauthorized access. If confirmed malicious, this activity could allow attackers to escalate privileges or move laterally within the network, posing a severe security risk. Ensure Event Code 5145 is enabled via Group Policy to utilize this analytic effectively.

References #

Event ID 5146 — The Windows Filtering Platform has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

The Windows Filtering Platform has blocked a packet.

Message #

The Windows Filtering Platform has blocked a packet.

Network Information:
	Direction: %1
	Source Address: %2
	Destination Address: %3
	EtherType: %4
	VlanTag: %5
	vSwitchId: %6
	Source vSwitch Port: %7
	Destination vSwitch Port: %8

Filter Information:
	Filter Run-Time ID: %9
	Layer Name: %10
	Layer Run-Time ID: %11

Fields #

NameDescription
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
DestAddress UnicodeString[Network Information] Destination Address
EtherType HexInt32[Network Information] EtherType
VlanTag HexInt32[Network Information] VlanTag
vSwitch ID UnicodeString
SourcevSwitchPort UInt32[Network Information] Source vSwitch Port
DestinationvSwitchPort UInt32[Network Information] Destination vSwitch Port
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID
vSwitchID UnicodeString[Network Information] vSwitchId

Event ID 5147 — A more restrictive Windows Filtering Platform filter has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

A more restrictive Windows Filtering Platform filter has blocked a packet.

Message #

A more restrictive Windows Filtering Platform filter has blocked a packet.

Network Information:
	Direction: %1
	Source Address: %2
	Destination Address: %3
	EtherType: %4
	VlanTag: %5
	vSwitchId: %6
	Source vSwitch Port: %7
	Destination vSwitch Port: %8

Filter Information:
	Filter Run-Time ID: %9
	Layer Name: %10
	Layer Run-Time ID: %11

Fields #

NameDescription
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
DestAddress UnicodeString[Network Information] Destination Address
EtherType HexInt32[Network Information] EtherType
VlanTag HexInt32[Network Information] VlanTag
vSwitch ID UnicodeString
SourcevSwitchPort UInt32[Network Information] Source vSwitch Port
DestinationvSwitchPort UInt32[Network Information] Destination vSwitch Port
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID
vSwitchID UnicodeString[Network Information] vSwitchId

Event ID 5148 — The Windows Filtering Platform has detected a DoS attack and entered a defensive mode.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.

Message #

The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.

Network Information:
	Type: %1

Fields #

NameDescription
Type UnicodeString[Network Information] Type

References #

Event ID 5149 — The DoS attack has subsided and normal processing is being resumed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

The DoS attack has subsided and normal processing is being resumed.

Message #

The DoS attack has subsided and normal processing is being resumed.

Network Information:
	Type: %1
	Packets Discarded: %2

Fields #

NameDescription
Type UnicodeString[Network Information] Type
PacketsDiscarded UInt64[Network Information] Packets Discarded

References #

Event ID 5150 — The Windows Filtering Platform has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

The Windows Filtering Platform has blocked a packet.

Message #

The Windows Filtering Platform has blocked a packet.

Network Information:
	Direction: %1
	Source Address: %2
	Destination Address: %3
	EtherType: %4
	MediaType: %5
	InterfaceType: %6
	VlanTag: %7

Filter Information:
	Filter Run-Time ID: %8
	Layer Name: %9
	Layer Run-Time ID: %10

Fields #

NameDescription
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
DestAddress UnicodeString[Network Information] Destination Address
EtherType HexInt32[Network Information] EtherType
MediaType UInt32[Network Information] MediaType
InterfaceType UInt32[Network Information] InterfaceType
VlanTag HexInt32[Network Information] VlanTag
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

References #

Event ID 5151 — A more restrictive Windows Filtering Platform filter has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

A more restrictive Windows Filtering Platform filter has blocked a packet.

Message #

A more restrictive Windows Filtering Platform filter has blocked a packet.

Network Information:
	Direction: %1
	Source Address: %2
	Destination Address: %3
	EtherType: %4
	MediaType: %5
	InterfaceType: %6
	VlanTag: %7

Filter Information:
	Filter Run-Time ID: %8
	Layer Name: %9
	Layer Run-Time ID: %10

Fields #

NameDescription
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
DestAddress UnicodeString[Network Information] Destination Address
EtherType HexInt32[Network Information] EtherType
MediaType UInt32[Network Information] MediaType
InterfaceType UInt32[Network Information] InterfaceType
VlanTag HexInt32[Network Information] VlanTag
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

References #

Event ID 5152 — The Windows Filtering Platform blocked a packet.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Packet Drop
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The Windows Filtering Platform has blocked a packet.

Message #

The Windows Filtering Platform has blocked a packet.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Direction: %3
	Source Address: %4
	Source Port: %5
	Destination Address: %6
	Destination Port: %7
	Protocol: %8

Filter Information:
	Filter Run-Time ID: %9
	Layer Name: %10
	Layer Run-Time ID: %11

Fields #

NameDescription
ProcessId UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
DestAddress UnicodeString[Network Information] Destination Address
DestPort UnicodeString[Network Information] Destination Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterOrigin UnicodeString[Filter Information] Filter Origin
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5152,
    "version": 1,
    "level": 0,
    "task": 12809,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2026-03-13T20:18:50.483625+00:00",
    "event_record_id": 16258577,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 3152
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 0,
    "Application": "-",
    "Direction": "%%14592",
    "SourceAddress": "10.2.10.21",
    "SourcePort": "5355",
    "DestAddress": "10.2.10.11",
    "DestPort": "53173",
    "Protocol": 17,
    "FilterOrigin": "Stealth",
    "FilterRTID": 70356,
    "LayerName": "%%14597",
    "LayerRTID": 13
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Prefer 5157 when both are available as it is per-connection.

References #

Event ID 5153 — A more restrictive Windows Filtering Platform filter has blocked a packet.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Packet Drop
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A more restrictive Windows Filtering Platform filter has blocked a packet.

Message #

A more restrictive Windows Filtering Platform filter has blocked a packet.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Direction: %3
	Source Address: %4
	Source Port: %5
	Destination Address: %6
	Destination Port: %7
	Protocol: %8

Filter Information:
	Filter Run-Time ID: %9
	Layer Name: %10
	Layer Run-Time ID: %11

Fields #

NameDescription
ProcessId UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
DestAddress UnicodeString[Network Information] Destination Address
DestPort UnicodeString[Network Information] Destination Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterOrigin UnicodeString[Filter Information] Filter Origin
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

References #

Event ID 5154 — The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.

Message #

The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Source Address: %3
	Source Port: %4
	Protocol: %5

Filter Information:
	Filter Run-Time ID: %6
	Layer Name: %7
	Layer Run-Time ID: %8

Fields #

NameDescription
ProcessId UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5154,
    "version": 0,
    "level": 0,
    "task": 12810,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-12T01:42:03.150814+00:00",
    "event_record_id": 2727618,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 8992
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 764,
    "Application": "\\device\\harddiskvolume4\\users\\localuser\\appdata\\local\\microsoft\\onedrive\\26.026.0209.0004\\onedrive.sync.service.exe",
    "SourceAddress": "::1",
    "SourcePort": "42050",
    "Protocol": 6,
    "FilterRTID": 0,
    "LayerName": "%%14609",
    "LayerRTID": 42
  },
  "message": ""
}

Detection Patterns #

Community Notes #

Detects unexpected services binding, often precedes C2 beaconing.

References #

Event ID 5155 — The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.

Message #

The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Source Address: %3
	Source Port: %4
	Protocol: %5

Filter Information:
	Filter Run-Time ID: %6
	Layer Name: %7
	Layer Run-Time ID: %8

Fields #

NameDescription
ProcessId UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

Detection Patterns #

References #

Event ID 5156 — The Windows Filtering Platform has permitted a connection.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has permitted a connection.

Message #

The Windows Filtering Platform has permitted a connection.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Direction: %3
	Source Address: %4
	Source Port: %5
	Destination Address: %6
	Destination Port: %7
	Protocol: %8

Filter Information:
	Filter Run-Time ID: %9
	Layer Name: %10
	Layer Run-Time ID: %11

Fields #

NameDescription
ProcessID UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
DestAddress UnicodeString[Network Information] Destination Address
DestPort UnicodeString[Network Information] Destination Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID
RemoteUserID SID[Filter Information] Remote User ID
RemoteMachineID SID[Filter Information] Remote Machine ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5156,
    "version": 1,
    "level": 0,
    "task": 12810,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-02-13T18:01:47.512340Z",
    "event_record_id": 227694,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 56
    },
    "channel": "Security",
    "computer": "PC01.example.corp",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessID": 820,
    "Application": "\\device\\harddiskvolume1\\windows\\system32\\svchost.exe",
    "Direction": "%%14593",
    "SourceAddress": "fe80::80ac:4126:fa58:1b81",
    "SourcePort": "546",
    "DestAddress": "ff02::1:2",
    "DestPort": "547",
    "Protocol": 17,
    "FilterRTID": 65865,
    "LayerName": "%%14611",
    "LayerRTID": 50,
    "RemoteUserID": "S-1-0-0",
    "RemoteMachineID": "S-1-0-0"
  }
}

Detection Patterns #

Community Notes #

Indicates what process (application path) on the local machine made an outbound connection to a specific destination IP and port. Helpful for reviewing connections made by a suspect process.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Kusto Query Language # view in reference

  • Zinc Actor IOCs files - October 2022 source high: 'Identifies a match across filename and commandline IOC's related to an actor tracked by Microsoft as Zinc. Reference: https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/'

References #

Event ID 5157 — The Windows Filtering Platform has blocked a connection.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has blocked a connection.

Message #

The Windows Filtering Platform has blocked a connection.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Direction: %3
	Source Address: %4
	Source Port: %5
	Destination Address: %6
	Destination Port: %7
	Protocol: %8

Filter Information:
	Filter Run-Time ID: %9
	Layer Name: %10
	Layer Run-Time ID: %11

Fields #

NameDescription
ProcessID UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
Direction UnicodeString[Network Information] Direction
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
DestAddress UnicodeString[Network Information] Destination Address
DestPort UnicodeString[Network Information] Destination Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
InterfaceIndex UInt32[Network Information] Interface Index
FilterOrigin UnicodeString[Filter Information] Filter Origin
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID
RemoteUserID SID[Filter Information] Remote User ID
RemoteMachineID SID[Filter Information] Remote Machine ID
OriginalProfile UnicodeString[Filter Information] Original Profile
CurrentProfile UnicodeString[Filter Information] Current Profile
IsLoopback UnicodeString[Filter Information] Is Loopback
HasRemoteDynamicKeywordAddress UnicodeString[Filter Information] Has Remote Dynamic Keyword Address

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5157,
    "version": 3,
    "level": 0,
    "task": 12810,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2026-03-11T06:32:07.887002+00:00",
    "event_record_id": 2461636,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 352
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessID": 6872,
    "Application": "\\device\\harddiskvolume4\\windows\\system32\\svchost.exe",
    "Direction": "%%14592",
    "SourceAddress": "172.18.253.78",
    "SourcePort": "37359",
    "DestAddress": "172.18.240.1",
    "DestPort": "53",
    "Protocol": 17,
    "InterfaceIndex": 12,
    "FilterOrigin": "Quarantine Default",
    "FilterRTID": 66241,
    "LayerName": "%%14610",
    "LayerRTID": 44,
    "RemoteUserID": "S-1-0-0",
    "RemoteMachineID": "S-1-0-0",
    "OriginalProfile": "%%14643",
    "CurrentProfile": "%%14643",
    "IsLoopback": "%%1826",
    "HasRemoteDynamicKeywordAddress": "%%1826"
  },
  "message": ""
}

Detection Patterns #

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 5158 — The Windows Filtering Platform has permitted a bind to a local port.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has permitted a bind to a local port.

Message #

The Windows Filtering Platform has permitted a bind to a local port.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Source Address: %3
	Source Port: %4
	Protocol: %5

Filter Information:
	Filter Run-Time ID: %6
	Layer Name: %7
	Layer Run-Time ID: %8

Fields #

NameDescription
ProcessId UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5158,
    "version": 0,
    "level": 0,
    "task": 12810,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2019-02-13T18:04:01.722250Z",
    "event_record_id": 227731,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 56
    },
    "channel": "Security",
    "computer": "PC01.example.corp",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 1280,
    "Application": "\\device\\harddiskvolume1\\windows\\system32\\svchost.exe",
    "SourceAddress": "0.0.0.0",
    "SourcePort": "55355",
    "Protocol": 17,
    "FilterRTID": 0,
    "LayerName": "%%14608",
    "LayerRTID": 36
  }
}

Detection Patterns #

Community Notes #

Unexpected binds on high ports may be a prelude to data exfiltration.

References #

Event ID 5159 — The Windows Filtering Platform has blocked a bind to a local port.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Filtering Platform Connection
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

The Windows Filtering Platform has blocked a bind to a local port.

Message #

The Windows Filtering Platform has blocked a bind to a local port.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Source Address: %3
	Source Port: %4
	Protocol: %5

Filter Information:
	Filter Run-Time ID: %6
	Layer Name: %7
	Layer Run-Time ID: %8

Fields #

NameDescription
ProcessId UInt64[Application Information] Process ID
Application UnicodeString[Application Information] Application Name
SourceAddress UnicodeString[Network Information] Source Address
SourcePort UnicodeString[Network Information] Source Port
Protocol UInt32[Network Information] Protocol
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
FilterRTID UInt64[Filter Information] Filter Run-Time ID
LayerName UnicodeString[Filter Information] Layer Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64[Filter Information] Layer Run-Time ID

Detection Patterns #

References #

Event ID 5160 — The Windows Filtering Platform Audit Mode has allowed a connection or packet that would have been blocked.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

The Windows Filtering Platform Audit Mode has allowed a connection or packet that would have been blocked.

Message #

The Windows Filtering Platform Audit Mode has allowed a connection or packet that would have been blocked.

Application Information:
	Process ID: %1
	Application Name: %2

Network Information:
	Direction: %3
	Source Address: %4
	Source Port: %5
	Destination Address: %6
	Destination Port: %7
	Protocol: %8
	Interface Index: %9

Filter Information:
	Filter Origin: %10
	Filter Run-Time ID: %11
	Layer Name: %12
	Layer Run-Time ID: %13
	Remote User ID: %14
	Remote Machine ID: %15
	Original Profile: %16
	Current Profile: %17
	Is Loopback: %18
	Has Remote Dynamic Keyword Address: %19

Firewall Information:

	Policy Store: %20
	Modifiable: %21
	Callout Involved: %22
	Callout ID: %23

Fields #

NameDescription
ProcessID UInt64
Application UnicodeString
Direction UnicodeString
Known values
%%14592
Inbound
%%14593
Outbound
%%14594
Forward
%%14595
Bidirectional
SourceAddress UnicodeString
SourcePort UnicodeString
DestAddress UnicodeString
DestPort UnicodeString
Protocol UInt32
Known values
0
HOPOPT
1
ICMP
2
IGMP
6
TCP
17
UDP
41
IPv6
43
IPv6-Route
44
IPv6-Frag
47
GRE
50
ESP
51
AH
58
ICMPv6
89
OSPF
103
PIM
132
SCTP
InterfaceIndex UInt32
FilterOrigin UnicodeString
FilterRTID UInt64
LayerName UnicodeString
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerRTID UInt64
RemoteUserID SID
RemoteMachineID SID
OriginalProfile UnicodeString
CurrentProfile UnicodeString
IsLoopback UnicodeString
HasRemoteDynamicKeywordAddress UnicodeString
FirewallPolicyStore UnicodeString
Modifiable UnicodeString
CalloutInvolved UnicodeString
CalloutID UInt32

Event ID 5168 — SPN check for SMB/SMB2 fails.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → File Share
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

Spn check for SMB/SMB2 fails.

Message #

Spn check for SMB/SMB2 fails.
	
Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

SPN:	
	SPN Name: %5
	Error Code: %6

Server Information:
	Server Names: %7
	Configured Names: %8
	IP Addresses: %9

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
SpnName UnicodeString[SPN] SPN Name
ErrorCode HexInt32[SPN] Error Code
ServerNames UnicodeString[Server Information] Server Names
ConfiguredNames UnicodeString[Server Information] Configured Names
IpAddresses UnicodeString[Server Information] IP Addresses

References #

Event ID 5169 — A directory service object was modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

A directory service object was modified.

Message #

A directory service object was modified.
	
Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6

Directory Service:
	Name: %7
	Type: %8
	
Object:
	DN: %9
	GUID: %10
	Class: %11
	
Attribute:
	LDAP Display Name: %12
	Syntax (OID): %13
	Value: %14
	Expiration Time: %15
	
Operation:
	Type: %16
	Correlation ID: %1
	Application Correlation ID: %2

Fields #

NameDescription
OpCorrelationID GUID[Operation] Correlation ID
AppCorrelationID UnicodeString[Operation] Application Correlation ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DSName UnicodeString[Directory Service] Name
DSType UnicodeString[Directory Service] Type
Known values
%%14676
Active Directory Domain Services
%%14677
Active Directory Lightweight Directory Services
ObjectDN UnicodeString[Object] DN
ObjectGUID GUID[Object] GUID
ObjectClass UnicodeString[Object] Class
AttributeLDAPDisplayName UnicodeString[Attribute] LDAP Display Name
AttributeSyntaxOID UnicodeString[Attribute] Syntax (OID)
AttributeValue UnicodeString[Attribute] Value
ExpirationTime FILETIME[Attribute] Expiration Time
OperationType UnicodeString[Operation] Type
Known values
%%1904
New registry value created
%%1905
Existing registry value modified
%%1906
Registry value deleted
%%14674
Value Added
%%14675
Value Deleted
%%14680
Value Added With Expiration Time
%%14681
Value Deleted With Expiration Time
%%14688
Value Auto Deleted With Expiration Time

Event ID 5170 — A directory service object was modified during a background cleanup task.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

A directory service object was modified during a background cleanup task.

Message #

A directory service object was modified during a background cleanup task.
	
Subject:
	Security ID: %3
	Account Name: %4
	Account Domain: %5
	Logon ID: %6

Directory Service:
	Name: %7
	Type: %8
	
Object:
	DN: %9
	GUID: %10
	Class: %11
	
Attribute:
	LDAP Display Name: %12
	Syntax (OID): %13
	Value: %14
	Expiration Time: %15
	
Operation:
	Type: %16
	Correlation ID: %1
	Application Correlation ID: %2

Fields #

NameDescription
OpCorrelationID GUID[Operation] Correlation ID
AppCorrelationID UnicodeString[Operation] Application Correlation ID
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DSName UnicodeString[Directory Service] Name
DSType UnicodeString[Directory Service] Type
Known values
%%14676
Active Directory Domain Services
%%14677
Active Directory Lightweight Directory Services
ObjectDN UnicodeString[Object] DN
ObjectGUID GUID[Object] GUID
ObjectClass UnicodeString[Object] Class
AttributeLDAPDisplayName UnicodeString[Attribute] LDAP Display Name
AttributeSyntaxOID UnicodeString[Attribute] Syntax (OID)
AttributeValue UnicodeString[Attribute] Value
ExpirationTime FILETIME[Attribute] Expiration Time
OperationType UnicodeString[Operation] Type
Known values
%%1904
New registry value created
%%1905
Existing registry value modified
%%1906
Registry value deleted
%%14674
Value Added
%%14675
Value Deleted
%%14680
Value Added With Expiration Time
%%14681
Value Deleted With Expiration Time
%%14688
Value Auto Deleted With Expiration Time

Event ID 5376 — Credential Manager credentials were backed up.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

Credential Manager credentials were backed up.

Message #

Credential Manager credentials were backed up.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

This event occurs when a user backs up their own Credential Manager credentials. A user (even an Administrator) cannot back up the credentials of an account other than his own.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
BackupFileName UnicodeString[Subject] BackupFileName
ProcessCreationTime FILETIME
ClientProcessId UInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5376,
    "version": 1,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-09-24T19:57:32.266266+00:00",
    "event_record_id": 150002,
    "correlation": {
      "ActivityID": "B2946CF1-CF76-0001-5C6D-94B276CFD801"
    },
    "execution": {
      "process_id": 804,
      "thread_id": 5832
    },
    "channel": "Security",
    "computer": "GUAPOS-PC",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-3960598978-2723104146-531989891-1001",
    "SubjectUserName": "FOXTWO",
    "SubjectDomainName": "GUAPOS-PC",
    "SubjectLogonId": 894283,
    "BackupFileName": "C:\\Windows\\TEMP\\CRD46C3.tmp",
    "ProcessCreationTime": 1664049447.1706607,
    "ClientProcessId": 5400
  },
  "message": "Credential Manager credentials were backed up.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-3960598978-2723104146-531989891-1001\n\tAccount Name:\t\tFOXTWO\n\tAccount Domain:\t\tGUAPOS-PC\n\tLogon ID:\t\t894283\n\tBackupFileName:\t\tC:\\Windows\\TEMP\\CRD46C3.tmp\n\nThis event occurs when a user backs up their own Credential Manager credentials. A user (even an Administrator) cannot back up the credentials of an account other than his own."
}

Community Notes #

Backup of Credential Manager vault, shows a user exporting stored passwords and keys. Often precedes lateral movement or exfiltration.

References #

Event ID 5377 — Credential Manager credentials were restored from a backup.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (NSA, others)
Opcode
Info

Description

Credential Manager credentials were restored from a backup.

Message #

Credential Manager credentials were restored from a backup.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

This event occurs when a user restores his Credential Manager credentials from a backup. A user (even an Administrator) cannot restore the credentials of an account other than his own.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
BackupFileName UnicodeString[Subject] BackupFileName
ProcessCreationTime FILETIME
ClientProcessId UInt32

Community Notes #

Credential Manager credentials were restored from a backup, may indicate import of stolen vaults from another host.

References #

Event ID 5378 — The requested credentials delegation was disallowed by policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

The requested credentials delegation was disallowed by policy.

Message #

The requested credentials delegation was disallowed by policy.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Credential Delegation Information:
	Security Package: %5
	User's UPN: %6
	Target Server: %7
	Credential Type: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
Package UnicodeString[Credential Delegation Information] Security Package
UserUPN UnicodeString[Credential Delegation Information] User's UPN
TargetServer UnicodeString[Credential Delegation Information] Target Server
CredType UnicodeString[Credential Delegation Information] Credential Type

References #

Event ID 5379 — Credential Manager credentials were read.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Credential Manager credentials were read.

Message #

Credential Manager credentials were read.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4
	Read Operation: %8

This event occurs when a user performs a read operation on stored credentials in Credential Manager.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
TargetName UnicodeString
Type UInt32
CountOfCredentialsReturned UInt32
ReadOperation UnicodeString[Subject] Read Operation
Known values
%%8099
Read Credential
%%8100
Enumerate Credentials
%%8101
Read Domain Credentials
%%8102
Find Best Credential
%%8103
Read By Token Handle
ReturnCode UInt32
ProcessCreationTime FILETIME
ClientProcessId UInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5379,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T06:25:40.049147+00:00",
    "event_record_id": 2888,
    "correlation": {
      "ActivityID": "F590C418-1079-0001-5BC5-90F57910DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "TargetName": "WindowsLive:target=virtualapp/didlogical",
    "Type": 0,
    "CountOfCredentialsReturned": 0,
    "ReadOperation": "%%8100",
    "ReturnCode": 3221226021,
    "ProcessCreationTime": "2023-11-06T06:25:38.635483Z",
    "ClientProcessId": 1612
  },
  "message": ""
}

Community Notes #

Credential Manager credentials were read. Large numbers of reads may indicate automated credential theft.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 5380 — Vault Find Credential.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

Vault Find Credential.

Message #

Vault Find Credential.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

This event occurs when a user finds stored vault credentials.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
SearchString UnicodeString
SchemaFriendlyName UnicodeString
Schema GUID
CountOfCredentialsReturned UInt32
ProcessCreationTime FILETIME
ClientProcessId UInt32

Event ID 5381 — Vault credentials were read.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

Vault credentials were read.

Message #

Vault credentials were read.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

This event occurs when a user enumerates stored vault credentials.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
Flags UInt32
CountOfCredentialsReturned UInt32
ProcessCreationTime FILETIME
ClientProcessId UInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5381,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-09-24T20:05:50.571779+00:00",
    "event_record_id": 150026,
    "correlation": {},
    "execution": {
      "process_id": 804,
      "thread_id": 5636
    },
    "channel": "Security",
    "computer": "GUAPOS-PC",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-3960598978-2723104146-531989891-1001",
    "SubjectUserName": "FOXTWO",
    "SubjectDomainName": "GUAPOS-PC",
    "SubjectLogonId": 894283,
    "Flags": 0,
    "CountOfCredentialsReturned": 1,
    "ProcessCreationTime": 1664049942.3177185,
    "ClientProcessId": 10620
  },
  "message": "Vault credentials were read.\n\nSubject:\n\tSecurity ID:\t\tS-1-5-21-3960598978-2723104146-531989891-1001\n\tAccount Name:\t\tFOXTWO\n\tAccount Domain:\t\tGUAPOS-PC\n\tLogon ID:\t\t894283\n\nThis event occurs when a user enumerates stored vault credentials."
}

References #

Event ID 5382 — Vault credentials were read.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Management → User Account Management
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

Vault credentials were read.

Message #

Vault credentials were read.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

This event occurs when a user reads a stored vault credential.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
SchemaFriendlyName UnicodeString
Schema GUID
Resource UnicodeString
Identity UnicodeString
PackageSid UnicodeString
Flags UInt32
ReturnCode UInt32
ProcessCreationTime FILETIME
ClientProcessId UInt32

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5382,
    "version": 0,
    "level": 0,
    "task": 13824,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T22:28:52.690626+00:00",
    "event_record_id": 3184,
    "correlation": {},
    "execution": {
      "process_id": 808,
      "thread_id": 888
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WINDEV2310EVAL$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "SchemaFriendlyName": "NGC Local Accoount Logon Vault Resource Schema",
    "Schema": "1D4350A3-330D-4AF9-B3FF-A927A45998AC",
    "Resource": "NGC Local Accoount Logon Vault Resource",
    "Identity": "010500000000000515000000F15DC676EF81AF629C157803E8030000",
    "PackageSid": "",
    "Flags": 0,
    "ReturnCode": 1168,
    "ProcessCreationTime": "2023-11-05T22:28:52.050339Z",
    "ClientProcessId": 4612
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Elastic # view in reference

  • Multiple Vault Web Credentials Read source medium: Windows Credential Manager allows you to create, view, or delete saved credentials for signing into websites, connected applications, and networks. An adversary may abuse this to list or dump credentials stored in the Credential Manager for saved usernames and passwords. This may also be performed in preparation of lateral movement.

References #

Event ID 5440 — The following callout was present when the Windows Filtering Platform Base Filtering Engine started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The following callout was present when the Windows Filtering Platform Base Filtering Engine started.

Message #

The following callout was present when the Windows Filtering Platform Base Filtering Engine started.

Provider Information:	
	ID: %1
	Name: %2

Callout Information:
	ID: %3
	Name: %4
	Type: %5
	Run-Time ID: %6

Layer Information:
	ID: %7
	Name: %8
	Run-Time ID: %9

Fields #

NameDescription
ProviderKey GUID[Provider Information] ID
ProviderName UnicodeString[Provider Information] Name
CalloutKey GUID[Callout Information] ID
CalloutName UnicodeString[Callout Information] Name
CalloutType UnicodeString[Callout Information] Type
CalloutId UInt32[Callout Information] Run-Time ID
LayerKey GUID[Layer Information] ID
LayerName UnicodeString[Layer Information] Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerId UInt32[Layer Information] Run-Time ID

References #

Event ID 5441 — The following filter was present when the Windows Filtering Platform Base Filtering Engine started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The following filter was present when the Windows Filtering Platform Base Filtering Engine started.

Message #

The following filter was present when the Windows Filtering Platform Base Filtering Engine started.

Provider Information:	
	ID: %1
	Name: %2

Filter Information:
	ID: %3
	Name: %4
	Type: %5
	Run-Time ID: %6

Layer Information:
	ID: %7
	Name: %8
	Run-Time ID: %9
	Weight: %10
	
Additional Information:
	Conditions: %11
	Filter Action: %12
	Callout ID: %13
	Callout Name: %14

Fields #

NameDescription
ProviderKey GUID[Provider Information] ID
ProviderName UnicodeString[Provider Information] Name
FilterKey GUID[Filter Information] ID
FilterName UnicodeString[Filter Information] Name
FilterType UnicodeString[Filter Information] Type
FilterId UInt64[Filter Information] Run-Time ID
LayerKey GUID[Layer Information] ID
LayerName UnicodeString[Layer Information] Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerId UInt32[Layer Information] Run-Time ID
Weight UInt64[Layer Information] Weight
Conditions UnicodeString[Additional Information] Conditions
Action UnicodeString[Additional Information] Filter Action
CalloutKey GUID[Additional Information] Callout ID
CalloutName UnicodeString[Additional Information] Callout Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5441,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:16.631722+00:00",
    "event_record_id": 25499,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 668
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProviderKey": "DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62",
    "ProviderName": "Microsoft Corporation",
    "FilterKey": "B98B75DC-17C0-4E84-BD4E-2080527CA6A6",
    "FilterName": "AppContainerBoottimeFilter",
    "FilterType": "%%16387",
    "FilterId": 67430,
    "LayerKey": "A3B42C97-9F04-4672-B87E-CEE9C483257F",
    "LayerName": "ALE Receive/Accept v6 Layer",
    "LayerId": 46,
    "Weight": 18446744073709551615,
    "Conditions": "\n\tCondition ID:\t{632ce23b-5167-435c-86d7-e903684aa80c}\n\tMatch value:\tAll flags set\n\tCondition value:\t0x00400000\n",
    "Action": "%%16390",
    "CalloutKey": "00000000-0000-0000-0000-000000000000",
    "CalloutName": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 5442 — The following provider was present when the Windows Filtering Platform Base Filtering Engine started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The following provider was present when the Windows Filtering Platform Base Filtering Engine started.

Message #

The following provider was present when the Windows Filtering Platform Base Filtering Engine started.
	
Provider ID: %1
Provider Name: %2
Provider Type: %3

Fields #

NameDescription
ProviderKey GUIDProvider ID
ProviderName UnicodeStringProvider Name
ProviderType UnicodeStringProvider Type

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5442,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:16.631829+00:00",
    "event_record_id": 25503,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 668
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProviderKey": "1BEBC969-61A5-4732-A177-847A0817862A",
    "ProviderName": "Microsoft Corporation",
    "ProviderType": "%%16387"
  },
  "message": ""
}

References #

Event ID 5443 — The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.

Message #

The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.
	
Provider ID: %1
Provider Name: %2
Provider Context ID: %3
Provider Context Name: %4
Provider Context Type: %5

Fields #

NameDescription
ProviderKey GUIDProvider ID
ProviderName UnicodeStringProvider Name
ProviderContextKey GUIDProvider Context ID
ProviderContextName UnicodeStringProvider Context Name
ProviderContextType UnicodeStringProvider Context Type

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5443,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:16.631811+00:00",
    "event_record_id": 25502,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 668
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProviderKey": "DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62",
    "ProviderName": "Microsoft Corporation",
    "ProviderContextKey": "93132C36-6E06-4E6F-A10B-218787CD49CF",
    "ProviderContextName": "MPSSVC",
    "ProviderContextType": "%%16387"
  },
  "message": ""
}

References #

Event ID 5444 — The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.

Message #

The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.
	
Provider ID: %1
Provider Name: %2
Sub-layer ID: %3
Sub-layer Name: %4
Sub-layer Type: %5
Weight: %6

Fields #

NameDescription
ProviderKey GUIDProvider ID
ProviderName UnicodeStringProvider Name
SubLayerKey GUIDSub-layer ID
SubLayerName UnicodeStringSub-layer Name
SubLayerType UnicodeStringSub-layer Type
Weight UInt32Weight

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5444,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:16.631773+00:00",
    "event_record_id": 25500,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 668
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProviderKey": "1BEBC969-61A5-4732-A177-847A0817862A",
    "ProviderName": "Microsoft Corporation",
    "SubLayerKey": "9BA30013-C84E-47E5-AC6E-1E1AED72FA69",
    "SubLayerName": "Microsoft Corporation",
    "SubLayerType": "%%16387",
    "Weight": 40961
  },
  "message": ""
}

References #

Event ID 5446 — A Windows Filtering Platform callout has been changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A Windows Filtering Platform callout has been changed.

Message #

A Windows Filtering Platform callout has been changed.
	
Subject:
	Security ID: %2
	Account Name: %3

Process Information:
	Process ID: %1

Provider Information:
	ID: %4
	Name: %5

Change Information:
	Change Type: %6

Callout Information:
	ID: %7
	Name: %8
	Type: %9
	Run-Time ID: %10

Layer Information:
	ID: %11
	Name: %12
	Run-Time ID: %13

Fields #

NameDescription
ProcessId UInt32[Process Information] Process ID
UserSid SID[Subject] Security ID
UserName UnicodeString[Subject] Account Name
ProviderKey GUID[Provider Information] ID
ProviderName UnicodeString[Provider Information] Name
ChangeType UnicodeString[Change Information] Change Type
CalloutKey GUID[Callout Information] ID
CalloutName UnicodeString[Callout Information] Name
CalloutType UnicodeString[Callout Information] Type
CalloutId UInt32[Callout Information] Run-Time ID
LayerKey GUID[Layer Information] ID
LayerName UnicodeString[Layer Information] Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerId UInt32[Layer Information] Run-Time ID

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5446,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:12:54.760281+00:00",
    "event_record_id": 29300,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 664
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 2088,
    "UserSid": "S-1-5-19",
    "UserName": "NT AUTHORITY\\LOCAL SERVICE",
    "ProviderKey": "00000000-0000-0000-0000-000000000000",
    "ProviderName": "-",
    "ChangeType": "%%16384",
    "CalloutKey": "31114833-2891-4EDD-A8EC-2FF8549AA491",
    "CalloutName": "windefend_flow_established_v6",
    "CalloutType": "%%16388",
    "CalloutId": 289,
    "LayerKey": "7021D2B3-DFA4-406E-AFEB-6AFAF7E70EFD",
    "LayerName": "ALE Flow Established v6 Layer",
    "LayerId": 54
  },
  "message": ""
}

References #

Event ID 5447 — A Windows Filtering Platform filter has been changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A Windows Filtering Platform filter has been changed.

Message #

A Windows Filtering Platform filter has been changed.
	
Subject:
	Security ID: %2
	Account Name: %3

Process Information:
	Process ID: %1

Provider Information:
	ID: %4
	Name: %5

Change Information:
	Change Type: %6

Filter Information:
	ID: %7
	Name: %8
	Type: %9
	Run-Time ID: %10

Layer Information:
	ID: %11
	Name: %12
	Run-Time ID: %13

Callout Information:
	ID: %17
	Name: %18

Additional Information:
	Weight: %14	
	Conditions: %15
	Filter Action: %16

Fields #

NameDescription
ProcessId UInt32[Process Information] Process ID
UserSid SID[Subject] Security ID
UserName UnicodeString[Subject] Account Name
ProviderKey GUID[Provider Information] ID
ProviderName UnicodeString[Provider Information] Name
ChangeType UnicodeString[Change Information] Change Type
FilterKey GUID[Filter Information] ID
FilterName UnicodeString[Filter Information] Name
FilterType UnicodeString[Filter Information] Type
FilterId UInt64[Filter Information] Run-Time ID
LayerKey GUID[Layer Information] ID
LayerName UnicodeString[Layer Information] Name
Known values
%%14596
IP Packet
%%14597
Transport
%%14598
Forward
%%14599
Stream
%%14600
Datagram Data
%%14601
ICMP Error
%%14602
MAC 802.3
%%14603
MAC Native
%%14604
vSwitch
%%14608
Resource Assignment
%%14609
Listen
%%14610
Receive/Accept
%%14611
Connect
%%14612
Flow Established
%%14614
Resource Release
%%14615
Endpoint Closure
%%14616
Connect Redirect
%%14617
Bind Redirect
%%14624
Stream Packet
%%14625
Accept Redirect
%%14626
Accept Redirect
%%14640
ICMP Echo-Request
%%14641
vSwitch Ingress
%%14642
vSwitch Egress
%%14643
Unknown
LayerId UInt32[Layer Information] Run-Time ID
Weight UInt64[Additional Information] Weight
Conditions UnicodeString[Additional Information] Conditions
Action UnicodeString[Additional Information] Filter Action
CalloutKey GUID[Callout Information] ID
CalloutName UnicodeString[Callout Information] Name

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5447,
    "version": 0,
    "level": 0,
    "task": 13573,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-06T01:44:15.910142+00:00",
    "event_record_id": 289924,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0001-0C49-DBE43710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 12032
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 2896,
    "UserSid": "S-1-5-19",
    "UserName": "NT AUTHORITY\\LOCAL SERVICE",
    "ProviderKey": "DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62",
    "ProviderName": "Microsoft Corporation",
    "ChangeType": "%%16384",
    "FilterKey": "E170DBAA-294E-40F7-A2BE-E0DEE7DF9E43",
    "FilterName": "Microsoft Teams",
    "FilterType": "%%16388",
    "FilterId": 78819,
    "LayerKey": "A3B42C97-9F04-4672-B87E-CEE9C483257F",
    "LayerName": "ALE Receive/Accept v6 Layer",
    "LayerId": 46,
    "Weight": 10376504785133109248,
    "Conditions": "\n\tCondition ID:\t{d78e1e87-8644-4ea5-9437-d809ecefc971}\n\tMatch value:\tEqual to\n\tCondition value:\t\n    00000000  5c 00 64 00 65 00 76 00-69 00 63 00 65 00 5c 00  \\.d.e.v.i.c.e.\\.\n    00000010  68 00 61 00 72 00 64 00-64 00 69 00 73 00 6b 00  h.a.r.d.d.i.s.k.\n    00000020  76 00 6f 00 6c 00 75 00-6d 00 65 00 34 00 5c 00  v.o.l.u.m.e.4.\\.\n    00000030  70 00 72 00 6f 00 67 00-72 00 61 00 6d 00 20 00  p.r.o.g.r.a.m. .\n    00000040  66 00 69 00 6c 00 65 00-73 00 5c 00 77 00 69 00  f.i.l.e.s.\\.w.i.\n    00000050  6e 00 64 00 6f 00 77 00-73 00 61 00 70 00 70 00  n.d.o.w.s.a.p.p.\n    00000060  73 00 5c 00 6d 00 69 00-63 00 72 00 6f 00 73 00  s.\\.m.i.c.r.o.s.\n    00000070  6f 00 66 00 74 00 74 00-65 00 61 00 6d 00 73 00  o.f.t.t.e.a.m.s.\n    00000080  5f 00 32 00 33 00 32 00-37 00 35 00 2e 00 37 00  _.2.3.2.7.5...7.\n    00000090  30 00 32 00 2e 00 32 00-34 00 32 00 31 00 2e 00  0.2...2.4.2.1...\n    000000a0  32 00 34 00 30 00 36 00-5f 00 78 00 36 00 34 00  2.4.0.6._.x.6.4.\n    000000b0  5f 00 5f 00 38 00 77 00-65 00 6b 00 79 00 62 00  _._.8.w.e.k.y.b.\n    000000c0  33 00 64 00 38 00 62 00-62 00 77 00 65 00 5c 00  3.d.8.b.b.w.e.\\.\n    000000d0  6d 00 73 00 74 00 65 00-61 00 6d 00 73 00 2e 00  m.s.t.e.a.m.s...\n    000000e0  65 00 78 00 65 00 00 00                          e.x.e...\n\n\n\tCondition ID:\t{3971ef2b-623e-4f9a-8cb1-6e79b806b9a7}\n\tMatch value:\tEqual to\n\tCondition value:\t0x11\n",
    "Action": "%%16390",
    "CalloutKey": "00000000-0000-0000-0000-000000000000",
    "CalloutName": "-"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 5448 — A Windows Filtering Platform provider has been changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A Windows Filtering Platform provider has been changed.

Message #

A Windows Filtering Platform provider has been changed.
	
Subject:
	Security ID: %2
	Account Name: %3

Process Information:
	Process ID: %1

Change Information:
	Change Type: %4

Provider Information:
	ID: %5
	Name: %6
	Type: %7

Fields #

NameDescription
ProcessId UInt32[Process Information] Process ID
UserSid SID[Subject] Security ID
UserName UnicodeString[Subject] Account Name
ChangeType UnicodeString[Change Information] Change Type
ProviderKey GUID[Provider Information] ID
ProviderName UnicodeString[Provider Information] Name
ProviderType UnicodeString[Provider Information] Type

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5448,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T06:27:26.268863+00:00",
    "event_record_id": 2450415,
    "correlation": {
      "ActivityID": "164E10E5-B120-0003-FC10-4E1620B1DC01"
    },
    "execution": {
      "process_id": 720,
      "thread_id": 1044
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 3624,
    "UserSid": "S-1-5-18",
    "UserName": "NT AUTHORITY\\SYSTEM",
    "ChangeType": "%%16384",
    "ProviderKey": "32B38E01-DDB2-45AB-A37A-189A2BCA5CFC",
    "ProviderName": "Microsoft Corporation",
    "ProviderType": "%%16388"
  },
  "message": ""
}

References #

Event ID 5449 — A Windows Filtering Platform provider context has been changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A Windows Filtering Platform provider context has been changed.

Message #

A Windows Filtering Platform provider context has been changed.
	
Subject:
	Security ID: %2
	Account Name: %3

Process Information:
	Process ID: %1

Provider Information:
	Provider ID: %4
	Provider Name: %5

Change Information:
	Change Type: %6

Provider Context:
	ID: %7
	Name: %8
	Type: %9

Fields #

NameDescription
ProcessId UInt32[Process Information] Process ID
UserSid SID[Subject] Security ID
UserName UnicodeString[Subject] Account Name
ProviderKey GUID[Provider Information] Provider ID
ProviderName UnicodeString[Provider Information] Provider Name
ChangeType UnicodeString[Change Information] Change Type
ProviderContextKey GUID[Provider Context] ID
ProviderContextName UnicodeString[Provider Context] Name
ProviderContextType UnicodeString[Provider Context] Type

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5449,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:13:39.336916+00:00",
    "event_record_id": 29353,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 664
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 1192,
    "UserSid": "S-1-5-19",
    "UserName": "NT AUTHORITY\\LOCAL SERVICE",
    "ProviderKey": "DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62",
    "ProviderName": "Microsoft Corporation",
    "ChangeType": "%%16385",
    "ProviderContextKey": "E5AF5758-67DC-469F-9F77-8EAB0F229359",
    "ProviderContextName": "MPSSVC",
    "ProviderContextType": "%%16388"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 5450 — A Windows Filtering Platform sub-layer has been changed.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A Windows Filtering Platform sub-layer has been changed.

Message #

A Windows Filtering Platform sub-layer has been changed.
	
Subject:
	Security ID: %2
	Account Name: %3

Process Information:
	Process ID: %1

Provider Information:
	Provider ID: %4
	Provider Name: %5

Change Information:
	Change Type: %6

Sub-layer Information:
	Sub-layer ID: %7
	Sub-layer Name: %8
	Sub-layer Type: %9

Additional Information:
	Weight: %10

Fields #

NameDescription
ProcessId UInt32[Process Information] Process ID
UserSid SID[Subject] Security ID
UserName UnicodeString[Subject] Account Name
ProviderKey GUID[Provider Information] Provider ID
ProviderName UnicodeString[Provider Information] Provider Name
ChangeType UnicodeString[Change Information] Change Type
SubLayerKey GUID[Sub-layer Information] Sub-layer ID
SubLayerName UnicodeString[Sub-layer Information] Sub-layer Name
SubLayerType UnicodeString[Sub-layer Information] Sub-layer Type
Weight UInt32[Additional Information] Weight

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5450,
    "version": 0,
    "level": 0,
    "task": 13572,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:12:54.760352+00:00",
    "event_record_id": 29301,
    "correlation": {
      "ActivityID": "7377737E-4825-0000-C974-77732548D801"
    },
    "execution": {
      "process_id": 612,
      "thread_id": 664
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "ProcessId": 2088,
    "UserSid": "S-1-5-19",
    "UserName": "NT AUTHORITY\\LOCAL SERVICE",
    "ProviderKey": "00000000-0000-0000-0000-000000000000",
    "ProviderName": "-",
    "ChangeType": "%%16384",
    "SubLayerKey": "3C1CD879-1B8C-4AB4-8F83-5ED129176EF3",
    "SubLayerName": "windefend",
    "SubLayerType": "%%16388",
    "Weight": 4096
  },
  "message": ""
}

References #

Event ID 5451 — An IPsec quick mode security association was established.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Quick Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec quick mode security association was established.

Message #

An IPsec quick mode security association was established.
	
Local Endpoint:
	Network Address: %1
	Network Address mask: %2
	Port: %3
	Tunnel Endpoint: %4

Remote Endpoint:
	Network Address: %5
	Network Address Mask: %6
	Port: %7
	Private Address: %8
	Tunnel Endpoint: %9

	Protocol: %10
	Keying Module Name: %11

Cryptographic Information:
	Integrity Algorithm - AH: %12
	Integrity Algorithm - ESP: %13
	Encryption Algorithm: %14

Security Association Information:
	Lifetime - seconds: %15
	Lifetime - data: %16
	Lifetime - packets: %17
	Mode: %18
	Role: %19
	Quick Mode Filter ID: %20
	Main Mode SA ID: %21
	Quick Mode SA ID: %22

Additional Information:
	Inbound SPI: %23
	Outbound SPI: %24

Fields #

NameDescription
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalAddressMask UnicodeString[Local Endpoint] Network Address mask
LocalPort UInt32[Local Endpoint] Port
LocalTunnelEndpoint UnicodeString[Local Endpoint] Tunnel Endpoint
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteAddressMask UnicodeString[Remote Endpoint] Network Address Mask
RemotePort UInt32[Remote Endpoint] Port
PeerPrivateAddress UnicodeString[Remote Endpoint] Private Address
RemoteTunnelEndpoint UnicodeString[Remote Endpoint] Tunnel Endpoint
IpProtocol UInt32[Remote Endpoint] Protocol
KeyingModuleName UnicodeString[Remote Endpoint] Keying Module Name
AhAuthType UnicodeString[Cryptographic Information] Integrity Algorithm - AH
EspAuthType UnicodeString[Cryptographic Information] Integrity Algorithm - ESP
CipherType UnicodeString[Cryptographic Information] Encryption Algorithm
LifetimeSeconds UInt32[Security Association Information] Lifetime - seconds
LifetimeKilobytes UInt32[Security Association Information] Lifetime - data
LifetimePackets UInt32[Security Association Information] Lifetime - packets
Mode UnicodeString[Security Association Information] Mode
Role UnicodeString[Security Association Information] Role
TransportFilterId UInt64[Security Association Information] Quick Mode Filter ID
MainModeSaId UInt64[Security Association Information] Main Mode SA ID
QuickModeSaId UInt64[Security Association Information] Quick Mode SA ID
InboundSpi UInt64[Additional Information] Inbound SPI
OutboundSpi UInt64[Additional Information] Outbound SPI
TunnelId UInt64[Additional Information] Virtual Interface Tunnel ID
TrafficSelectorId UInt64[Additional Information] Traffic Selector ID

References #

Event ID 5452 — An IPsec quick mode security association ended.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Quick Mode
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec quick mode security association ended.

Message #

An IPsec quick mode security association ended.
	
Local Endpoint:
	Network Address: %1
	Port: %2
	Tunnel Endpoint: %3

Remote Endpoint:
	Network Address: %4
	Port: %5
	Tunnel Endpoint: %6

Additional Information:
	Protocol: %7
	Quick Mode SA ID: %8

Fields #

NameDescription
LocalAddress UnicodeString[Local Endpoint] Network Address
LocalAddressMask UnicodeString[Local Endpoint] Network Address mask
LocalPort UInt32[Local Endpoint] Port
LocalTunnelEndpoint UnicodeString[Local Endpoint] Tunnel Endpoint
RemoteAddress UnicodeString[Remote Endpoint] Network Address
RemoteAddressMask UnicodeString[Remote Endpoint] Network Address mask
RemotePort UInt32[Remote Endpoint] Port
RemoteTunnelEndpoint UnicodeString[Remote Endpoint] Tunnel Endpoint
IpProtocol UInt32[Additional Information] Protocol
QuickModeSaId UInt64[Additional Information] Quick Mode SA ID
TunnelId UInt64[Additional Information] Virtual Interface Tunnel ID
TrafficSelectorId UInt64[Additional Information] Traffic Selector ID

References #

Event ID 5453 — An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → IPsec Main Mode
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.

Message #

An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.

References #

Event ID 5456 — PAStore Engine applied Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent applied Active Directory storage IPsec policy on the computer.

Message #

IPsec Policy Agent applied Active Directory storage IPsec policy on the computer.

Policy: %1

Fields #

NameDescription
Policy UnicodeStringPolicy

References #

Event ID 5457 — PAStore Engine failed to apply Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent failed to apply Active Directory storage IPsec policy on the computer.

Message #

IPsec Policy Agent failed to apply Active Directory storage IPsec policy on the computer.

DN: %1
Error code: %2

Fields #

NameDescription
Policy UnicodeStringDN
Error UnicodeStringError code

References #

Event ID 5458 — PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent applied locally cached copy of Active Directory storage IPsec policy on the computer.

Message #

IPsec Policy Agent applied locally cached copy of Active Directory storage IPsec policy on the computer.

Policy: %1

Fields #

NameDescription
Policy UnicodeStringPolicy

References #

Event ID 5459 — PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.

Message #

IPsec Policy Agent failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.

Policy: %1
Error Code: %2

Fields #

NameDescription
Policy UnicodeStringPolicy
Error UnicodeStringError Code

References #

Event ID 5460 — PAStore Engine applied local registry storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent applied local registry storage IPsec policy on the computer.

Message #

IPsec Policy Agent applied local registry storage IPsec policy on the computer.

Policy: %1

Fields #

NameDescription
Policy UnicodeStringPolicy

References #

Event ID 5461 — PAStore Engine failed to apply local registry storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent failed to apply local registry storage IPsec policy on the computer.

Message #

IPsec Policy Agent failed to apply local registry storage IPsec policy on the computer.

Policy: %1
Error Code: %2

Fields #

NameDescription
Policy UnicodeStringPolicy
Error UnicodeStringError Code

References #

Event ID 5462 — PAStore Engine failed to apply some rules of the active IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem.

Message #

IPsec Policy Agent failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem.

Policy: %1
Error Code: %2

Fields #

NameDescription
Policy UnicodeStringPolicy
Error UnicodeStringError Code

References #

Event ID 5463 — PAStore Engine polled for changes to the active IPsec policy and detected no changes.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent polled for changes to the active IPsec policy and detected no changes.

Message #

IPsec Policy Agent polled for changes to the active IPsec policy and detected no changes.

References #

Event ID 5464 — PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent polled for changes to the active IPsec policy, detected changes, and applied them.

Message #

IPsec Policy Agent polled for changes to the active IPsec policy, detected changes, and applied them.

References #

Event ID 5465 — PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent received a control for forced reloading of IPsec policy and processed the control successfully.

Message #

IPsec Policy Agent received a control for forced reloading of IPsec policy and processed the control successfully.

References #

Event ID 5466 — PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Message #

IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied.

References #

Event ID 5467 — PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Message #

IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used.

References #

Event ID 5468 — PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Message #

IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used.

References #

Event ID 5471 — PAStore Engine loaded local storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent loaded local storage IPsec policy on the computer.

Message #

IPsec Policy Agent loaded local storage IPsec policy on the computer.

Policy: %1

Fields #

NameDescription
Policy UnicodeStringPolicy

References #

Event ID 5472 — PAStore Engine failed to load local storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent failed to load local storage IPsec policy on the computer.

Message #

IPsec Policy Agent failed to load local storage IPsec policy on the computer.

Policy: %1
Error Code: %2

Fields #

NameDescription
Policy UnicodeStringPolicy
Error UnicodeStringError Code

References #

Event ID 5473 — PAStore Engine loaded directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent loaded directory storage IPsec policy on the computer.

Message #

IPsec Policy Agent loaded directory storage IPsec policy on the computer.

Policy: %1

Fields #

NameDescription
Policy UnicodeStringPolicy

References #

Event ID 5474 — PAStore Engine failed to load directory storage IPsec policy on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent failed to load directory storage IPsec policy on the computer.

Message #

IPsec Policy Agent failed to load directory storage IPsec policy on the computer.

Policy: %1
Error Code: %2

Fields #

NameDescription
Policy UnicodeStringPolicy
Error UnicodeStringError Code

References #

Event ID 5477 — PAStore Engine failed to add quick mode filter.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Filtering Platform Policy Change
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

IPsec Policy Agent failed to add quick mode filter.

Message #

IPsec Policy Agent failed to add quick mode filter.

Quick Mode Filter: %1
Error Code: %2

Fields #

NameDescription
QuickModeFilter UnicodeStringQuick Mode Filter
Error UnicodeStringError Code

References #

Event ID 5478 — IPsec Services has started successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The IPsec Policy Agent service was started.

Message #

The IPsec Policy Agent service was started.

References #

Event ID 5479 — IPsec Services has been shut down successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

The IPsec Policy Agent service was stopped. Stopping this service can put the computer at greater risk of network attack or expose the computer to potential security risks.

Message #

The IPsec Policy Agent service was stopped. Stopping this service can put the computer at greater risk of network attack or expose the computer to potential security risks.

References #

Event ID 5480 — IPsec Services failed to get the complete list of network interfaces on the computer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Message #

IPsec Policy Agent failed to get the complete list of network interfaces on the computer. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.

References #

Event ID 5483 — IPsec Services failed to initialize RPC server.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

The IPsec Policy Agent service failed to initialize its RPC server. The service could not be started.

Message #

The IPsec Policy Agent service failed to initialize its RPC server. The service could not be started.

Error Code: %1

Fields #

NameDescription
Error UnicodeStringError Code

References #

Event ID 5484 — IPsec Services has experienced a critical failure and has been shut down.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Message #

The IPsec Policy Agent service experienced a critical failure and has shut down. The shutdown of this service can put the computer at greater risk of network attack or expose the computer to potential security risks.

Error Code: %1

Fields #

NameDescription
Error UnicodeStringError Code

References #

Event ID 5485 — IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → IPsec Driver
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Message #

IPsec Policy Agent failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.

References #

Event ID 5632 — A request was made to authenticate to a wireless network.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

A request was made to authenticate to a wireless network.

Message #

A request was made to authenticate to a wireless network.

Subject:
	Security ID: %2
	Account Name: %3
	Account Domain: %4
	Logon ID: %5

Network Information:
	Name (SSID): %1
	Interface GUID: %8
	Local MAC Address: %7
	Peer MAC Address: %6

Additional Information:
	Reason Code: %10 (%9)
	Error Code: %11

Fields #

NameDescription
SSID UnicodeString[Network Information] Name (SSID)
Identity UnicodeString[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
PeerMac UnicodeString[Network Information] Peer MAC Address
LocalMac UnicodeString[Network Information] Local MAC Address
IntfGuid GUID[Network Information] Interface GUID
ReasonCode HexInt32[Additional Information] (
ReasonText UnicodeString[Additional Information] Reason Code
ErrorCode HexInt32[Additional Information] Error Code
EAPReasonCode HexInt32[Additional Information] EAP Reason Code
EapRootCauseString UnicodeString[Additional Information] EAP Root Cause String
EAPErrorCode HexInt32[Additional Information] EAP Error Code

References #

Event ID 5633 — A request was made to authenticate to a wired network.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Other Logon/Logoff Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A request was made to authenticate to a wired network.

Message #

A request was made to authenticate to a wired network.

Subject:
	Security ID: %2
	Account Name: %3
	Account Domain: %4
	Logon ID: %5

Interface:
	Name: %1

Additional Information
	Reason Code: %7 (%6)
	Error Code: %8

Fields #

NameDescription
InterfaceName UnicodeString[Interface] Name
Identity UnicodeString[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
ReasonCode HexInt32[Interface] (
ReasonText UnicodeString[Interface] Reason Code
ErrorCode HexInt32[Interface] Error Code

References #

Event ID 5712 — A Remote Procedure Call (RPC) was attempted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → RPC Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

A Remote Procedure Call (RPC) was attempted.

Message #

A Remote Procedure Call (RPC) was attempted.

Subject:
	SID: %1
	Name: %2
	Account Domain: %3
	LogonId: %4

Process Information:
	PID: %5
	Name: %6

Network Information:
	Remote IP Address: %7
	Remote Port: %8

RPC Attributes:
	Interface UUID: %9
	Protocol Sequence: %10
	Authentication Service: %11
	Authentication Level: %12

Fields #

NameDescription
SubjectUserSid SID[Subject] SID
SubjectUserName UnicodeString[Subject] Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] LogonId
ProcessId UInt32[Process Information] PID
ProcessName UnicodeString[Process Information] Name
RemoteIpAddress UnicodeString[Network Information] Remote IP Address
RemotePort UnicodeString[Network Information] Remote Port
InterfaceUuid GUID[RPC Attributes] Interface UUID
ProtocolSequence UnicodeString[RPC Attributes] Protocol Sequence
AuthenticationService UInt32[RPC Attributes] Authentication Service
AuthenticationLevel UInt32[RPC Attributes] Authentication Level
OpNum UInt32
Endpoint UnicodeString
RemoteHost UnicodeString

References #

Event ID 5888 — An object in the COM+ Catalog was modified.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An object in the COM+ Catalog was modified.

Message #

An object in the COM+ Catalog was modified.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	COM+ Catalog Collection: %5
	Object Name: %6
	Object Properties Modified: %7

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectUserDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
ObjectCollectionName UnicodeString[Object] COM+ Catalog Collection
ObjectIdentifyingProperties UnicodeString[Object] Object Name
ModifiedObjectProperties UnicodeString[Object] Object Properties Modified

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5888,
    "version": 0,
    "level": 0,
    "task": 12290,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:07:28.323865+00:00",
    "event_record_id": 2042752,
    "correlation": {
      "ActivityID": "56E3EAD5-F269-44B1-8096-7C737168F10A"
    },
    "execution": {
      "process_id": 984,
      "thread_id": 1556
    },
    "channel": "Security",
    "computer": "LAB-WIN11.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "SYSTEM",
    "SubjectUserDomainName": "NT AUTHORITY",
    "SubjectLogonId": 999,
    "ObjectCollectionName": "Components",
    "ObjectIdentifyingProperties": "\r\n\t\tCLSID = {315FA593-3CF5-4310-887B-3977A578488A}\r\n\t\tBitness = 2\r\n\t\tApplicationID = {5268CA1B-44FF-4FE6-9D5F-9CF63F69C4E3}",
    "ModifiedObjectProperties": "\r\n\t\tApplicationID = '<null>' -> '{5268CA1B-44FF-4FE6-9D5F-9CF63F69C4E3}'\r\n\t\tTransaction = '0' -> '1'\r\n\t\tSynchronization = '0' -> '3'\r\n\t\tJustInTimeActivation = '0' -> '1'\r\n\t\tEventTrackingEnabled = '0' -> '1'\r\n\t\tSavedProgId = '<null>' -> 'IISFtpHost.IISFtpHost.1'\r\n\t\tAllowInprocSubscribers = '0' -> '1'\r\n\t\tIsEnabled = '0' -> '1'\r\n\t\tTxIsolationLevel = '0' -> '4'"
  },
  "message": ""
}

References #

Event ID 5889 — An object was deleted from the COM+ Catalog.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An object was deleted from the COM+ Catalog.

Message #

An object was deleted from the COM+ Catalog.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	COM+ Catalog Collection: %5
	Object Name: %6
	Object Details: %7
This event occurs when an object is deleted from the COM+ catalog.

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectUserDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
ObjectCollectionName UnicodeString[Object] COM+ Catalog Collection
ObjectIdentifyingProperties UnicodeString[Object] Object Name
ObjectProperties UnicodeString[Object] Object Details

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5889,
    "version": 0,
    "level": 0,
    "task": 12290,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T22:30:46.980255+00:00",
    "event_record_id": 3332,
    "correlation": {
      "ActivityID": "59A0D65F-1037-0001-A7D6-A0593710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 888
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "SYSTEM",
    "SubjectUserDomainName": "NT AUTHORITY",
    "SubjectLogonId": 999,
    "ObjectCollectionName": "Applications",
    "ObjectIdentifyingProperties": "\r\n\t\tID = {A14C837E-C9BC-4E79-B228-2A6CB72524A5}\r\n\t\tAppPartitionID = {41E90F3E-56C1-4633-81C3-6E8BAC8BDD70}",
    "ObjectProperties": "\r\n\t\tName = VMware Snapshot Provider\r\n\t\tApplicationProxyServerName = \r\n\t\tProcessType = 2\r\n\t\tCommandLine = \r\n\t\tServiceName = vmvss\r\n\t\tRunAsUserType = 1\r\n\t\tIdentity = LocalSystem\r\n\t\tDescription = VMware Snapshot Provider\r\n\t\tIsSystem = N\r\n\t\tAuthentication = 6\r\n\t\tShutdownAfter = 3\r\n\t\tRunForever = N\r\n\t\tPassword = ********\r\n\t\tActivation = Local\r\n\t\tChangeable = Y\r\n\t\tDeleteable = Y\r\n\t\tCreatedBy = \r\n\t\tAccessChecksLevel = 1\r\n\t\tApplicationAccessChecksEnabled = 0\r\n\t\tcCOL_SecurityDescriptor = <Opaque>\r\n\t\tImpersonationLevel = 2\r\n\t\tAuthenticationCapability = 2\r\n\t\tCRMEnabled = 0\r\n\t\t3GigSupportEnabled = 0\r\n\t\tQueuingEnabled = 0\r\n\t\tQueueListenerEnabled = N\r\n\t\tEventsEnabled = 1\r\n\t\tProcessFlags = 0\r\n\t\tThreadMax = 0\r\n\t\tApplicationProxy = 0\r\n\t\tCRMLogFile = \r\n\t\tDumpEnabled = 0\r\n\t\tDumpOnException = 0\r\n\t\tDumpOnFailfast = 0\r\n\t\tMaxDumpCount = 5\r\n\t\tDumpPath = %systemroot%\\system32\\com\\dmp\r\n\t\tIsEnabled = 1\r\n\t\tAppPartitionID = {41E90F3E-56C1-4633-81C3-6E8BAC8BDD70}\r\n\t\tConcurrentApps = 1\r\n\t\tRecycleLifetimeLimit = 0\r\n\t\tRecycleCallLimit = 0\r\n\t\tRecycleActivationLimit = 0\r\n\t\tRecycleMemoryLimit = 0\r\n\t\tRecycleExpirationTimeout = 15\r\n\t\tQCListenerMaxThreads = 0\r\n\t\tQCAuthenticateMsgs = 0\r\n\t\tApplicationDirectory = \r\n\t\tSRPTrustLevel = 262144\r\n\t\tSRPEnabled = 0\r\n\t\tSoapActivated = 0\r\n\t\tSoapVRoot = \r\n\t\tSoapMailTo = \r\n\t\tSoapBaseUrl = \r\n\t\tReplicable = 1"
  },
  "message": ""
}

References #

Event ID 5890 — An object was added to the COM+ Catalog.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Object Access → Other Object Access Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An object was added to the COM+ Catalog.

Message #

An object was added to the COM+ Catalog.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Object:
	COM+ Catalog Collection: %5
	Object Name: %6
	Object Details: %7

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectUserDomainName UnicodeString[Subject] Account Domain
SubjectLogonId UInt64[Subject] Logon ID
ObjectCollectionName UnicodeString[Object] COM+ Catalog Collection
ObjectIdentifyingProperties UnicodeString[Object] Object Name
ObjectProperties UnicodeString[Object] Object Details

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 5890,
    "version": 0,
    "level": 0,
    "task": 12290,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2023-11-05T22:30:50.680307+00:00",
    "event_record_id": 3348,
    "correlation": {
      "ActivityID": "59A0D65F-1037-0001-A7D6-A0593710DA01"
    },
    "execution": {
      "process_id": 808,
      "thread_id": 896
    },
    "channel": "Security",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "SYSTEM",
    "SubjectUserDomainName": "NT AUTHORITY",
    "SubjectLogonId": 999,
    "ObjectCollectionName": "UsersInRole",
    "ObjectIdentifyingProperties": "\r\n\t\tApplId = {B0C2D0B3-B19E-4769-B00B-A0D5996BAD73}\r\n\t\tName = Administrators\r\n\t\tUser = SYSTEM",
    "ObjectProperties": "\r\n\t\t<null>"
  },
  "message": ""
}

References #

Event ID 6144 — Security policy in the group policy objects has been applied successfully.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Low (Microsoft-AppendixL)
Opcode
Info

Description

Security policy in the group policy objects has been applied successfully.

Message #

Security policy in the group policy objects has been applied successfully. 

Return Code: %1

GPO List:
%2

Fields #

NameDescription
ErrorCode UInt32Return Code
GPOList UnicodeString

References #

Event ID 6145 — One or more errors occured while processing security policy in the group policy objects.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Other Policy Change Events
Collection Priority
Medium (Microsoft-AppendixL)
Opcode
Info

Description

One or more errors occured while processing security policy in the group policy objects.

Message #

One or more errors occured while processing security policy in the group policy objects.

Error Code: %1
GPO List:
%2

Fields #

NameDescription
ErrorCode UInt32Error Code
GPOList UnicodeString

References #

Event ID 6272 — Network Policy Server granted access to a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Recommended (Microsoft-WEF, others)
Opcode
Info

Description

Network Policy Server granted access to a user.

Message #

Network Policy Server granted access to a user.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Client Machine:
	Security ID: %5
	Account Name: %6
	Fully Qualified Account Name: %7
	OS-Version: %8
	Called Station Identifier: %9
	Calling Station Identifier: %10

NAS:
	NAS IPv4 Address: %11
	NAS IPv6 Address: %12
	NAS Identifier: %13
	NAS Port-Type: %14
	NAS Port: %15

RADIUS Client:
	Client Friendly Name: %16
	Client IP Address: %17

Authentication Details:
	Proxy Policy Name: %18
	Network Policy Name: %19
	Authentication Provider: %20
	Authentication Server: %21
	Authentication Type: %22
	EAP Type: %23
	Account Session Identifier: %24

Quarantine Information:
	Result: %25
	Session Identifier: %26

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name
SubjectMachineSID SID[Client Machine] Security ID
SubjectMachineName UnicodeString[Client Machine] Account Name
FullyQualifiedSubjectMachineName UnicodeString[Client Machine] Fully Qualified Account Name
CalledStationID UnicodeString[Client Machine] Called Station Identifier
CallingStationID UnicodeString[Client Machine] Calling Station Identifier
NASIPv4Address UnicodeString[NAS] NAS IPv4 Address
NASIPv6Address UnicodeString[NAS] NAS IPv6 Address
NASIdentifier UnicodeString[NAS] NAS Identifier
NASPortType UnicodeString[NAS] NAS Port-Type
NASPort UnicodeString[NAS] NAS Port
ClientName UnicodeString[RADIUS Client] Client Friendly Name
ClientIPAddress UnicodeString[RADIUS Client] Client IP Address
ProxyPolicyName UnicodeString[Authentication Details] Connection Request Policy Name
NetworkPolicyName UnicodeString[Authentication Details] Network Policy Name
AuthenticationProvider UnicodeString[Authentication Details] Authentication Provider
AuthenticationServer UnicodeString[Authentication Details] Authentication Server
AuthenticationType UnicodeString[Authentication Details] Authentication Type
EAPType UnicodeString[Authentication Details] EAP Type
AccountSessionIdentifier UnicodeString[Authentication Details] Account Session Identifier
LoggingResult UnicodeString[Authentication Details] Logging Results

References #

Event ID 6273 — Network Policy Server denied access to a user.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server denied access to a user.

Message #

Network Policy Server denied access to a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Client Machine:
	Security ID: %5
	Account Name: %6
	Fully Qualified Account Name: %7
	OS-Version: %8
	Called Station Identifier: %9
	Calling Station Identifier: %10

NAS:
	NAS IPv4 Address: %11
	NAS IPv6 Address: %12
	NAS Identifier: %13
	NAS Port-Type: %14
	NAS Port: %15

RADIUS Client:
	Client Friendly Name: %16
	Client IP Address: %17

Authentication Details:
	Proxy Policy Name: %18
	Network Policy Name: %19
	Authentication Provider: %20
	Authentication Server: %21
	Authentication Type: %22
	EAP Type: %23
	Account Session Identifier: %24
	Reason Code: %25
	Reason: %26

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name
SubjectMachineSID SID[Client Machine] Security ID
SubjectMachineName UnicodeString[Client Machine] Account Name
FullyQualifiedSubjectMachineName UnicodeString[Client Machine] Fully Qualified Account Name
CalledStationID UnicodeString[Client Machine] Called Station Identifier
CallingStationID UnicodeString[Client Machine] Calling Station Identifier
NASIPv4Address UnicodeString[NAS] NAS IPv4 Address
NASIPv6Address UnicodeString[NAS] NAS IPv6 Address
NASIdentifier UnicodeString[NAS] NAS Identifier
NASPortType UnicodeString[NAS] NAS Port-Type
NASPort UnicodeString[NAS] NAS Port
ClientName UnicodeString[RADIUS Client] Client Friendly Name
ClientIPAddress UnicodeString[RADIUS Client] Client IP Address
ProxyPolicyName UnicodeString[Authentication Details] Connection Request Policy Name
NetworkPolicyName UnicodeString[Authentication Details] Network Policy Name
AuthenticationProvider UnicodeString[Authentication Details] Authentication Provider
AuthenticationServer UnicodeString[Authentication Details] Authentication Server
AuthenticationType UnicodeString[Authentication Details] Authentication Type
EAPType UnicodeString[Authentication Details] EAP Type
AccountSessionIdentifier UnicodeString[Authentication Details] Account Session Identifier
ReasonCode UnicodeString[Authentication Details] Reason Code
Reason UnicodeString[Authentication Details] Reason
LoggingResult UnicodeString[Authentication Details] Logging Results

Community Notes #

Large numbers of Reason 16 or 23 from the same IP or MAC indicates bruting of WiFi, VPN, 802.1x portals. Repeat denials for privileged accounts should be investigated.

References #

Event ID 6274 — Network Policy Server discarded the request for a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server discarded the request for a user.

Message #

Network Policy Server discarded the request for a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Client Machine:
	Security ID: %5
	Account Name: %6
	Fully Qualified Account Name: %7
	OS-Version: %8
	Called Station Identifier: %9
	Calling Station Identifier: %10

NAS:
	NAS IPv4 Address: %11
	NAS IPv6 Address: %12
	NAS Identifier: %13
	NAS Port-Type: %14
	NAS Port: %15

RADIUS Client:
	Client Friendly Name: %16
	Client IP Address: %17

Authentication Details:
	Connection Request Policy Name: %18
	Network Policy Name: %19
	Authentication Provider: %20
	Authentication Server: %21
	Authentication Type: %22
	EAP Type: %23
	Account Session Identifier: %24
	Reason Code: %25
	Reason: %26

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name
SubjectMachineSID SID[Client Machine] Security ID
SubjectMachineName UnicodeString[Client Machine] Account Name
FullyQualifiedSubjectMachineName UnicodeString[Client Machine] Fully Qualified Account Name
CalledStationID UnicodeString[Client Machine] Called Station Identifier
CallingStationID UnicodeString[Client Machine] Calling Station Identifier
NASIPv4Address UnicodeString[NAS] NAS IPv4 Address
NASIPv6Address UnicodeString[NAS] NAS IPv6 Address
NASIdentifier UnicodeString[NAS] NAS Identifier
NASPortType UnicodeString[NAS] NAS Port-Type
NASPort UnicodeString[NAS] NAS Port
ClientName UnicodeString[RADIUS Client] Client Friendly Name
ClientIPAddress UnicodeString[RADIUS Client] Client IP Address
ProxyPolicyName UnicodeString[Authentication Details] Connection Request Policy Name
NetworkPolicyName UnicodeString[Authentication Details] Network Policy Name
AuthenticationProvider UnicodeString[Authentication Details] Authentication Provider
AuthenticationServer UnicodeString[Authentication Details] Authentication Server
AuthenticationType UnicodeString[Authentication Details] Authentication Type
EAPType UnicodeString[Authentication Details] EAP Type
AccountSessionIdentifier UnicodeString[Authentication Details] Account Session Identifier
ReasonCode UnicodeString[Authentication Details] Reason Code
Reason UnicodeString[Authentication Details] Reason

References #

Event ID 6275 — Network Policy Server discarded the accounting request for a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server discarded the accounting request for a user.

Message #

Network Policy Server discarded the accounting request for a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Client Machine:
	Security ID: %5
	Account Name: %6
	Fully Qualified Account Name: %7
	OS-Version: %8
	Called Station Identifier: %9
	Calling Station Identifier: %10

NAS:
	NAS IPv4 Address: %11
	NAS IPv6 Address: %12
	NAS Identifier: %13
	NAS Port-Type: %14
	NAS Port: %15

RADIUS Client:
	Client Friendly Name: %16
	Client IP Address: %17

Authentication Details:
	Connection Request Policy Name: %18
	Network Policy Name: %19
	Authentication Provider: %20
	Authentication Server: %21
	Authentication Type: %22
	EAP Type: %23
	Account Session Identifier: %24
	Reason Code: %25
	Reason: %26

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name
SubjectMachineSID SID[Client Machine] Security ID
SubjectMachineName UnicodeString[Client Machine] Account Name
FullyQualifiedSubjectMachineName UnicodeString[Client Machine] Fully Qualified Account Name
CalledStationID UnicodeString[Client Machine] Called Station Identifier
CallingStationID UnicodeString[Client Machine] Calling Station Identifier
NASIPv4Address UnicodeString[NAS] NAS IPv4 Address
NASIPv6Address UnicodeString[NAS] NAS IPv6 Address
NASIdentifier UnicodeString[NAS] NAS Identifier
NASPortType UnicodeString[NAS] NAS Port-Type
NASPort UnicodeString[NAS] NAS Port
ClientName UnicodeString[RADIUS Client] Client Friendly Name
ClientIPAddress UnicodeString[RADIUS Client] Client IP Address
ProxyPolicyName UnicodeString[Authentication Details] Connection Request Policy Name
NetworkPolicyName UnicodeString[Authentication Details] Network Policy Name
AuthenticationProvider UnicodeString[Authentication Details] Authentication Provider
AuthenticationServer UnicodeString[Authentication Details] Authentication Server
AuthenticationType UnicodeString[Authentication Details] Authentication Type
EAPType UnicodeString[Authentication Details] EAP Type
AccountSessionIdentifier UnicodeString[Authentication Details] Account Session Identifier
ReasonCode UnicodeString[Authentication Details] Reason Code
Reason UnicodeString[Authentication Details] Reason

References #

Event ID 6276 — Network Policy Server quarantined a user.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server quarantined a user.

Message #

Network Policy Server quarantined a user.

Contact the Network Policy Server administrator for more information.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Client Machine:
	Security ID: %5
	Account Name: %6
	Fully Qualified Account Name: %7
	OS-Version: %8
	Called Station Identifier: %9
	Calling Station Identifier: %10

NAS:
	NAS IPv4 Address: %11
	NAS IPv6 Address: %12
	NAS Identifier: %13
	NAS Port-Type: %14
	NAS Port: %15

RADIUS Client:
	Client Friendly Name: %16
	Client IP Address: %17

Authentication Details:
	Connection Request Policy Name: %18
	Network Policy Name: %19
	Authentication Provider: %20
	Authentication Server: %21
	Authentication Type: %22
	EAP Type: %23
	Account Session Identifier: %24

Quarantine Information:
	Result: %25
	Extended-Result: %26
	Session Identifier: %27
	Help URL: %28
	System Health Validator Result(s): %29

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name
SubjectMachineSID SID[Client Machine] Security ID
SubjectMachineName UnicodeString[Client Machine] Account Name
FullyQualifiedSubjectMachineName UnicodeString[Client Machine] Fully Qualified Account Name
MachineInventory UnicodeString[Client Machine] OS-Version
CalledStationID UnicodeString[Client Machine] Called Station Identifier
CallingStationID UnicodeString[Client Machine] Calling Station Identifier
NASIPv4Address UnicodeString[NAS] NAS IPv4 Address
NASIPv6Address UnicodeString[NAS] NAS IPv6 Address
NASIdentifier UnicodeString[NAS] NAS Identifier
NASPortType UnicodeString[NAS] NAS Port-Type
NASPort UnicodeString[NAS] NAS Port
ClientName UnicodeString[RADIUS Client] Client Friendly Name
ClientIPAddress UnicodeString[RADIUS Client] Client IP Address
ProxyPolicyName UnicodeString[Authentication Details] Connection Request Policy Name
NetworkPolicyName UnicodeString[Authentication Details] Network Policy Name
AuthenticationProvider UnicodeString[Authentication Details] Authentication Provider
AuthenticationServer UnicodeString[Authentication Details] Authentication Server
AuthenticationType UnicodeString[Authentication Details] Authentication Type
EAPType UnicodeString[Authentication Details] EAP Type
AccountSessionIdentifier UnicodeString[Authentication Details] Account Session Identifier
QuarantineState UnicodeString[Quarantine Information] Result
ExtendedQuarantineState UnicodeString[Quarantine Information] Extended-Result
QuarantineSessionID UnicodeString[Quarantine Information] Session Identifier
QuarantineHelpURL UnicodeString[Quarantine Information] Help URL
QuarantineSystemHealthResult UnicodeString[Quarantine Information] System Health Validator Result(s)

References #

Event ID 6277 — Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.

Message #

Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.

Contact the Network Policy Server administrator for more information.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Client Machine:
	Security ID: %5
	Account Name: %6
	Fully Qualified Account Name: %7
	OS-Version: %8
	Called Station Identifier: %9
	Calling Station Identifier: %10

NAS:
	NAS IPv4 Address: %11
	NAS IPv6 Address: %12
	NAS Identifier: %13
	NAS Port-Type: %14
	NAS Port: %15

RADIUS Client:
	Client Friendly Name: %16
	Client IP Address: %17

Authentication Details:
	Connection Request Policy Name: %18
	Network Policy Name: %19
	Authentication Provider: %20
	Authentication Server: %21
	Authentication Type: %22
	EAP Type: %23
	Account Session Identifier: %24

Quarantine Information:
	Result: %25
	Extended-Result: %26
	Session Identifier: %27
	Help URL: %28
	System Health Validator Result(s): %29
	Quarantine Grace Time: %30

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name
SubjectMachineSID SID[Client Machine] Security ID
SubjectMachineName UnicodeString[Client Machine] Account Name
FullyQualifiedSubjectMachineName UnicodeString[Client Machine] Fully Qualified Account Name
MachineInventory UnicodeString[Client Machine] OS-Version
CalledStationID UnicodeString[Client Machine] Called Station Identifier
CallingStationID UnicodeString[Client Machine] Calling Station Identifier
NASIPv4Address UnicodeString[NAS] NAS IPv4 Address
NASIPv6Address UnicodeString[NAS] NAS IPv6 Address
NASIdentifier UnicodeString[NAS] NAS Identifier
NASPortType UnicodeString[NAS] NAS Port-Type
NASPort UnicodeString[NAS] NAS Port
ClientName UnicodeString[RADIUS Client] Client Friendly Name
ClientIPAddress UnicodeString[RADIUS Client] Client IP Address
ProxyPolicyName UnicodeString[Authentication Details] Connection Request Policy Name
NetworkPolicyName UnicodeString[Authentication Details] Network Policy Name
AuthenticationProvider UnicodeString[Authentication Details] Authentication Provider
AuthenticationServer UnicodeString[Authentication Details] Authentication Server
AuthenticationType UnicodeString[Authentication Details] Authentication Type
EAPType UnicodeString[Authentication Details] EAP Type
AccountSessionIdentifier UnicodeString[Authentication Details] Account Session Identifier
QuarantineState UnicodeString[Quarantine Information] Result
ExtendedQuarantineState UnicodeString[Quarantine Information] Extended-Result
QuarantineSessionID UnicodeString[Quarantine Information] Session Identifier
QuarantineHelpURL UnicodeString[Quarantine Information] Help URL
QuarantineSystemHealthResult UnicodeString[Quarantine Information] System Health Validator Result(s)
QuarantineGraceTime UnicodeString[Quarantine Information] Quarantine Grace Time

References #

Event ID 6278 — Network Policy Server granted full access to a user because the host met the defined health policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server granted full access to a user because the host met the defined health policy.

Message #

Network Policy Server granted full access to a user because the host met the defined health policy.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Client Machine:
	Security ID: %5
	Account Name: %6
	Fully Qualified Account Name: %7
	OS-Version: %8
	Called Station Identifier: %9
	Calling Station Identifier: %10

NAS:
	NAS IPv4 Address: %11
	NAS IPv6 Address: %12
	NAS Identifier: %13
	NAS Port-Type: %14
	NAS Port: %15

RADIUS Client:
	Client Friendly Name: %16
	Client IP Address: %17

Authentication Details:
	Connection Request Policy Name: %18
	Network Policy Name: %19
	Authentication Provider: %20
	Authentication Server: %21
	Authentication Type: %22
	EAP Type: %23
	Account Session Identifier: %24

Quarantine Information:
	Result: %25
	Extended-Result: %26
	Session Identifier: %27
	Help URL: %28
	System Health Validator Result(s): %29

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name
SubjectMachineSID SID[Client Machine] Security ID
SubjectMachineName UnicodeString[Client Machine] Account Name
FullyQualifiedSubjectMachineName UnicodeString[Client Machine] Fully Qualified Account Name
MachineInventory UnicodeString[Client Machine] OS-Version
CalledStationID UnicodeString[Client Machine] Called Station Identifier
CallingStationID UnicodeString[Client Machine] Calling Station Identifier
NASIPv4Address UnicodeString[NAS] NAS IPv4 Address
NASIPv6Address UnicodeString[NAS] NAS IPv6 Address
NASIdentifier UnicodeString[NAS] NAS Identifier
NASPortType UnicodeString[NAS] NAS Port-Type
NASPort UnicodeString[NAS] NAS Port
ClientName UnicodeString[RADIUS Client] Client Friendly Name
ClientIPAddress UnicodeString[RADIUS Client] Client IP Address
ProxyPolicyName UnicodeString[Authentication Details] Connection Request Policy Name
NetworkPolicyName UnicodeString[Authentication Details] Network Policy Name
AuthenticationProvider UnicodeString[Authentication Details] Authentication Provider
AuthenticationServer UnicodeString[Authentication Details] Authentication Server
AuthenticationType UnicodeString[Authentication Details] Authentication Type
EAPType UnicodeString[Authentication Details] EAP Type
AccountSessionIdentifier UnicodeString[Authentication Details] Account Session Identifier
QuarantineState UnicodeString[Quarantine Information] Result
ExtendedQuarantineState UnicodeString[Quarantine Information] Extended-Result
QuarantineSessionID UnicodeString[Quarantine Information] Session Identifier
QuarantineHelpURL UnicodeString[Quarantine Information] Help URL
QuarantineSystemHealthResult UnicodeString[Quarantine Information] System Health Validator Result(s)

References #

Event ID 6279 — Network Policy Server locked the user account due to repeated failed authentication attempts.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server locked the user account due to repeated failed authentication attempts.

Message #

Network Policy Server locked the user account due to repeated failed authentication attempts.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name

References #

Event ID 6280 — Network Policy Server unlocked the user account.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Logon/Logoff → Network Policy Server
Collection Priority
Medium (Microsoft-AppendixL, others)
Opcode
Info

Description

Network Policy Server unlocked the user account.

Message #

Network Policy Server unlocked the user account.

User:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Fully Qualified Account Name: %4

Fields #

NameDescription
SubjectUserSid SID[User] Security ID
SubjectUserName UnicodeString[User] Account Name
SubjectDomainName UnicodeString[User] Account Domain
FullyQualifiedSubjectUserName UnicodeString[User] Fully Qualified Account Name

References #

Event ID 6281 — Code Integrity determined that the page hashes of an image file are not valid.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (NSA, others)
Opcode
Info

Message #

Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.

File Name: %1

Fields #

NameDescription
param1 UnicodeStringFile Name

References #

Event ID 6400 — BranchCache: Received an incorrectly formatted response while discovering availability of content.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

BranchCache: Received an incorrectly formatted response while discovering availability of content.

Message #

BranchCache: Received an incorrectly formatted response while discovering availability of content. 

IP address of the client that sent this response: %1

Fields #

NameDescription
ClientIPAddress UnicodeStringIP address of the client that sent this response

References #

Event ID 6401 — BranchCache: Received invalid data from a peer.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

BranchCache: Received invalid data from a peer. Data discarded.

Message #

BranchCache: Received invalid data from a peer. Data discarded. 

IP address of the client that sent this data: %1

Fields #

NameDescription
ClientIPAddress UnicodeStringIP address of the client that sent this data

References #

Event ID 6402 — BranchCache: The message to the hosted cache offering it data is incorrectly formatted.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

BranchCache: The message to the hosted cache offering it data is incorrectly formatted.

Message #

BranchCache: The message to the hosted cache offering it data is incorrectly formatted. 

IP address of the client that sent this message: %1

Fields #

NameDescription
ClientIPAddress UnicodeStringIP address of the client that sent this message

References #

Event ID 6403 — BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data.

Message #

BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data. 

Domain name of the hosted cache is: %1

Fields #

NameDescription
HostedCacheName UnicodeStringDomain name of the hosted cache is

References #

Event ID 6404 — BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.

Message #

BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate. 

Domain name of the hosted cache: %1
	
Error Code: %2

Fields #

NameDescription
HostedCacheName UnicodeStringDomain name of the hosted cache
ErrorCode UInt32Error Code

References #

Event ID 6405 — BranchCache: Count instance(s) of event id EventId occurred.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

BranchCache: Count instance(s) of event id EventId occurred.

Message #

BranchCache: %2 instance(s) of event id %1 occurred.

Fields #

NameDescription
EventId UInt32instance(s) of event id
Count UInt32BranchCache

References #

Event ID 6406 — ProductName registered to Windows Firewall to control filtering for the following.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

ProductName registered to Windows Firewall to control filtering for the following.

Message #

%1 registered to Windows Firewall to control filtering for the following: 
%2.

Fields #

NameDescription
ProductName UnicodeString
Categories UnicodeString

References #

Event ID 6407 — Firewall category unregistered: Message

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Message #

%1

Fields #

NameDescription
Message UnicodeString

References #

Event ID 6408 — Registered product ProductName failed and Windows Firewall is now controlling the filtering for Categories.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

Registered product ProductName failed and Windows Firewall is now controlling the filtering for Categories.

Message #

Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.

Fields #

NameDescription
ProductName UnicodeStringRegistered product
Categories UnicodeStringfailed and Windows Firewall is now controlling the filtering for

References #

Event ID 6409 — BranchCache: A service connection point object could not be parsed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → Other System Events
Opcode
Info

Description

BranchCache: A service connection point object could not be parsed.

Message #

BranchCache: A service connection point object could not be parsed. 

SCP object GUID: %1

Fields #

NameDescription
GUID UnicodeStringSCP object GUID

References #

Event ID 6410 — Code integrity determined that a file does not meet the security requirements to load into a process.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
System → System Integrity
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

Code integrity determined that a file does not meet the security requirements to load into a process. This could be due to the use of shared sections or other issues.

Message #

Code integrity determined that a file does not meet the security requirements to load into a process. This could be due to the use of shared sections or other issues.

File Name: %1

Fields #

NameDescription
param1 UnicodeStringFile Name

References #

Event ID 6416 — A new external device was recognized by the system.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Plug and Play Events
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

A new external device was recognized by the system.

Message #

A new external device was recognized by the system.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Class ID: %5

Vendor IDs: %6

Compatible IDs: %7

Location Information: %8

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DeviceId UnicodeStringDevice ID
DeviceDescription UnicodeStringDevice Name
ClassId GUIDClass ID
ClassName UnicodeStringClass Name
VendorIds UnicodeStringVendor IDs
CompatibleIds UnicodeStringCompatible IDs
LocationInformation UnicodeStringLocation Information

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 6416,
    "version": 1,
    "level": 0,
    "task": 13316,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2022-04-04T13:11:35.388890+00:00",
    "event_record_id": 28470,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 340
    },
    "channel": "Security",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-TKC15D7KHUR$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "DeviceId": "SWD\\PRINTENUM\\{3AEC7D2D-F29E-48EB-A851-2E9DF0B72EDC}",
    "DeviceDescription": "Microsoft Print to PDF",
    "ClassId": "1ED2BBF9-11F0-4084-B21F-AD83A8E6DCDC",
    "ClassName": "PrintQueue",
    "VendorIds": "\r\n\t\tPRINTENUM\\{084f01fa-e634-4d77-83ee-074817c03581}\r\n\t\tPRINTENUM\\LocalPrintQueue\r\n\t\t{084f01fa-e634-4d77-83ee-074817c03581}\r\n\t\t\r\n\t\t",
    "CompatibleIds": "\r\n\t\tGenPrintQueue\r\n\t\tSWD\\GenericRaw\r\n\t\tSWD\\Generic\r\n\t\t\r\n\t\t",
    "LocationInformation": "-"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 6417 — The FIPS mode crypto selftests succeeded.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

The FIPS mode crypto selftests succeeded.

Message #

The FIPS mode crypto selftests succeeded.

	Process ID: %1
	Process Name: %2

Fields #

NameDescription
ProcessId PointerProcess ID
ProcessName UnicodeStringProcess Name

Event ID 6418 — The FIPS mode crypto selftests failed.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

The FIPS mode crypto selftests failed.

Message #

The FIPS mode crypto selftests failed.

	Process ID: %1
	Process Name: %2
	Failed test code: %3

Fields #

NameDescription
ProcessId PointerProcess ID
ProcessName UnicodeStringProcess Name
FatalCode UInt32Failed test code

Event ID 6419 — A request was made to disable a device.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Plug and Play Events
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

A request was made to disable a device.

Message #

A request was made to disable a device.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Device ID: %5

Device Name: %6

Class ID: %7

Class Name: %8

Hardware IDs: %9

Compatible IDs: %10

Location Information: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DeviceId UnicodeStringDevice ID
DeviceDescription UnicodeStringDevice Name
ClassId GUIDClass ID
ClassName UnicodeStringClass Name
HardwareIds UnicodeStringHardware IDs
CompatibleIds UnicodeStringCompatible IDs
LocationInformation UnicodeStringLocation Information

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 6419,
    "version": 0,
    "level": 0,
    "task": 13316,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:18:51.247229+00:00",
    "event_record_id": 16259082,
    "correlation": {},
    "execution": {
      "process_id": 6984,
      "thread_id": 9864
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "DeviceId": "PCI\\VEN_1AF4&DEV_1000&SUBSYS_00011AF4&REV_00\\3&267A616A&0&90",
    "DeviceDescription": "Red Hat VirtIO Ethernet Adapter",
    "ClassId": "4D36E972-E325-11CE-BFC1-08002BE10318",
    "ClassName": "Net",
    "HardwareIds": "\r\n\t\tPCI\\VEN_1AF4&DEV_1000&SUBSYS_00011AF4&REV_00\r\n\t\tPCI\\VEN_1AF4&DEV_1000&SUBSYS_00011AF4\r\n\t\tPCI\\VEN_1AF4&DEV_1000&CC_020000\r\n\t\tPCI\\VEN_1AF4&DEV_1000&CC_0200\r\n\t\t\r\n\t\t",
    "CompatibleIds": "\r\n\t\tPCI\\VEN_1AF4&DEV_1000&REV_00\r\n\t\tPCI\\VEN_1AF4&DEV_1000\r\n\t\tPCI\\VEN_1AF4&CC_020000\r\n\t\tPCI\\VEN_1AF4&CC_0200\r\n\t\tPCI\\VEN_1AF4\r\n\t\tPCI\\CC_020000\r\n\t\tPCI\\CC_0200\r\n\t\t\r\n\t\t",
    "LocationInformation": "-"
  },
  "message": ""
}

References #

Event ID 6420 — A device was disabled.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Plug and Play Events
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

A device was disabled.

Message #

A device was disabled.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Device ID: %5

Device Name: %6

Class ID: %7

Class Name: %8

Hardware IDs: %9

Compatible IDs: %10

Location Information: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DeviceId UnicodeStringDevice ID
DeviceDescription UnicodeStringDevice Name
ClassId GUIDClass ID
ClassName UnicodeStringClass Name
HardwareIds UnicodeStringHardware IDs
CompatibleIds UnicodeStringCompatible IDs
LocationInformation UnicodeStringLocation Information

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 6420,
    "version": 0,
    "level": 0,
    "task": 13316,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T06:32:01.859671+00:00",
    "event_record_id": 2461244,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 356
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "LAB-WIN11$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "DeviceId": "ROOT\\VMS_VSMP\\0000",
    "DeviceDescription": "Hyper-V Virtual Switch Extension Adapter",
    "ClassId": "4D36E972-E325-11CE-BFC1-08002BE10318",
    "ClassName": "Net",
    "HardwareIds": "\r\n\t\tvms_vsmp\r\n\t\t\r\n\t\t",
    "CompatibleIds": "-",
    "LocationInformation": "-"
  },
  "message": ""
}

References #

Event ID 6421 — A request was made to enable a device.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Plug and Play Events
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

A request was made to enable a device.

Message #

A request was made to enable a device.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Device ID: %5

Device Name: %6

Class ID: %7

Class Name: %8

Hardware IDs: %9

Compatible IDs: %10

Location Information: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DeviceId UnicodeStringDevice ID
DeviceDescription UnicodeStringDevice Name
ClassId GUIDClass ID
ClassName UnicodeStringClass Name
HardwareIds UnicodeStringHardware IDs
CompatibleIds UnicodeStringCompatible IDs
LocationInformation UnicodeStringLocation Information

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 6421,
    "version": 0,
    "level": 0,
    "task": 13316,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-13T20:18:54.348192+00:00",
    "event_record_id": 16267789,
    "correlation": {},
    "execution": {
      "process_id": 6984,
      "thread_id": 6948
    },
    "channel": "Security",
    "computer": "LAB-DC01.ludus.domain",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-21-1006758700-2167138679-1475694448-1105",
    "SubjectUserName": "domainadmin",
    "SubjectDomainName": "ludus",
    "SubjectLogonId": "0xa981e",
    "DeviceId": "PCI\\VEN_1AF4&DEV_1000&SUBSYS_00011AF4&REV_00\\3&267A616A&0&90",
    "DeviceDescription": "Red Hat VirtIO Ethernet Adapter",
    "ClassId": "4D36E972-E325-11CE-BFC1-08002BE10318",
    "ClassName": "Net",
    "HardwareIds": "\r\n\t\tPCI\\VEN_1AF4&DEV_1000&SUBSYS_00011AF4&REV_00\r\n\t\tPCI\\VEN_1AF4&DEV_1000&SUBSYS_00011AF4\r\n\t\tPCI\\VEN_1AF4&DEV_1000&CC_020000\r\n\t\tPCI\\VEN_1AF4&DEV_1000&CC_0200\r\n\t\t\r\n\t\t",
    "CompatibleIds": "\r\n\t\tPCI\\VEN_1AF4&DEV_1000&REV_00\r\n\t\tPCI\\VEN_1AF4&DEV_1000\r\n\t\tPCI\\VEN_1AF4&CC_020000\r\n\t\tPCI\\VEN_1AF4&CC_0200\r\n\t\tPCI\\VEN_1AF4\r\n\t\tPCI\\CC_020000\r\n\t\tPCI\\CC_0200\r\n\t\t\r\n\t\t",
    "LocationInformation": "-"
  },
  "message": ""
}

References #

Event ID 6422 — A device was enabled.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Plug and Play Events
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

A device was enabled.

Message #

A device was enabled.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Device ID: %5

Device Name: %6

Class ID: %7

Class Name: %8

Hardware IDs: %9

Compatible IDs: %10

Location Information: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DeviceId UnicodeStringDevice ID
DeviceDescription UnicodeStringDevice Name
ClassId GUIDClass ID
ClassName UnicodeStringClass Name
HardwareIds UnicodeStringHardware IDs
CompatibleIds UnicodeStringCompatible IDs
LocationInformation UnicodeStringLocation Information

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 6422,
    "version": 0,
    "level": 0,
    "task": 13316,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2026-03-11T06:32:01.861463+00:00",
    "event_record_id": 2461246,
    "correlation": {},
    "execution": {
      "process_id": 4,
      "thread_id": 3728
    },
    "channel": "Security",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "LAB-WIN11$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "DeviceId": "ROOT\\VMS_VSMP\\0000",
    "DeviceDescription": "Hyper-V Virtual Switch Extension Adapter",
    "ClassId": "4D36E972-E325-11CE-BFC1-08002BE10318",
    "ClassName": "Net",
    "HardwareIds": "\r\n\t\tvms_vsmp\r\n\t\t\r\n\t\t",
    "CompatibleIds": "-",
    "LocationInformation": "-"
  },
  "message": ""
}

Community Notes #

May indicate removable storage or network adapters to stage tools or exfiltrate data.

References #

Event ID 6423 — The installation of this device is forbidden by system policy.

#
Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Plug and Play Events
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

The installation of this device is forbidden by system policy.

Message #

The installation of this device is forbidden by system policy.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Device ID: %5

Device Name: %6

Class ID: %7

Class Name: %8

Hardware IDs: %9

Compatible IDs: %10

Location Information: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DeviceId UnicodeStringDevice ID
DeviceDescription UnicodeStringDevice Name
ClassId GUIDClass ID
ClassName UnicodeStringClass Name
HardwareIds UnicodeStringHardware IDs
CompatibleIds UnicodeStringCompatible IDs
LocationInformation UnicodeStringLocation Information

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

References #

Event ID 6424 — The installation of this device was allowed, after having previously been forbidden by policy.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Detailed Tracking → Plug and Play Events
Collection Priority
Recommended (Yamato Security)
Opcode
Info

Description

The installation of this device was allowed, after having previously been forbidden by policy.

Message #

The installation of this device was allowed, after having previously been forbidden by policy.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Device ID: %5

Device Name: %6

Class ID: %7

Class Name: %8

Hardware IDs: %9

Compatible IDs: %10

Location Information: %11

Fields #

NameDescription
SubjectUserSid SID[Subject] Security ID
SubjectUserName UnicodeString[Subject] Account Name
SubjectDomainName UnicodeString[Subject] Account Domain
SubjectLogonId HexInt64[Subject] Logon ID
DeviceId UnicodeStringDevice ID
DeviceDescription UnicodeStringDevice Name
ClassId GUIDClass ID
ClassName UnicodeStringClass Name
HardwareIds UnicodeStringHardware IDs
CompatibleIds UnicodeStringCompatible IDs
LocationInformation UnicodeStringLocation Information

References #

Event ID 6425 — A network client used a legacy RPC method to modify authentication information on a trusted domain object.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Message #

A network client used a legacy RPC method to modify authentication information on a trusted domain object. The authentication information was encrypted with a legacy encryption algorithm. Consider upgrading the client operating system or application to use the latest and more secure version of this method.

Trusted Domain:
	Domain Name: %5
	Domain ID: %6

Modified By:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Client Network Address: %7
RPC Method Name: %8

For more information please see https://go.microsoft.com/fwlink/?linkid=2161080.

Fields #

NameDescription
SubjectUserSid SID[Modified By] Security ID
SubjectUserName UnicodeString[Modified By] Account Name
SubjectDomainName UnicodeString[Modified By] Account Domain
SubjectLogonId HexInt64[Modified By] Logon ID
TrustedDomainName UnicodeString[Trusted Domain] Domain Name
TrustedDomainId SID[Trusted Domain] Domain ID
ClientNetworkAddress UnicodeStringClient Network Address
LegacyRPCMethodName UnicodeStringRPC Method Name

Event ID 6426 — The volatile system access rights assigned to an account were modified.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

The volatile system access rights assigned to an account were modified.

Message #

The volatile system access rights assigned to an account were modified.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Account Modified:
	Security ID: %5

Original Access Rights (%6):
%7

Access Rights Granted (%8):
%9

Access Rights Removed (%10):
%11

Final Access Rights (%12):
%13


For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields #

NameDescription
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
TargetSid SID
OriginalAccessRightsMask HexInt32
OriginalAccessRights UnicodeString
GrantedAccessRightsMask HexInt32
GrantedAccessRights UnicodeString
RemovedAccessRightsMask HexInt32
RemovedAccessRights UnicodeString
FinalAccessRightsMask HexInt32
FinalAccessRights UnicodeString

Event ID 6427 — System access right details for a successful logon.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

System access right details for a successful logon.

Message #

System access right details for a successful logon.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

New Logon:
	Security ID: %5
	Account Name: %6
	Account Domain: %7
	Logon ID: %8

Logon Type: %9

Allow right: %10 (%11)

Event in sequence: %12 of %13

Policy assignments: %14

Local assignments: %15

Additional details about this logon attempt may be found in the correlated 4624 event.

For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields #

NameDescription
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
TargetUserSid SID
TargetUserName UnicodeString
TargetDomainName UnicodeString
TargetLogonId HexInt64
LogonType UInt32Logon type reference
SystemAccessRightRequiredForLogon UnicodeString
SystemAccessRightRequiredForLogonUlong HexInt32
EventIndex UInt32
EventCountTotal UInt32
SystemAccessRightSidList UnicodeString
LocalSystemAccessRightSidList UnicodeString

Event ID 6428 — System access right details for a failed logon that was explicitly denied.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

System access right details for a failed logon that was explicitly denied.

Message #

System access right details for a failed logon that was explicitly denied.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Account For Which Logon Failed:
	Security ID: %5
	Account Name: %6
	Account Domain: %7

Logon Type: %8

Deny right: %9 (%10)

Event in sequence: %11 of %12

Policy assignments: %13

Local assignments: %14

Additional details about this logon attempt may be found in the correlated 4625 event.

For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields #

NameDescription
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
TargetUserSid SID
TargetUserName UnicodeString
TargetDomainName UnicodeString
LogonType UInt32Logon type reference
DenySystemAccessRight UnicodeString
DenySystemAccessRightUlong HexInt32
EventIndex UInt32
EventCountTotal UInt32
DenySystemAccessRightsSidList UnicodeString
DenyLocalSystemAccessRightsSidList UnicodeString

Event ID 6429 — System access right details for a failed logon that was implicitly denied.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

System access right details for a failed logon that was implicitly denied.

Message #

System access right details for a failed logon that was implicitly denied.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Account For Which Logon Failed:
	Security ID: %5
	Account Name: %6
	Account Domain: %7

Logon Type: %8

Allow right: %9 (%10)

Additional details about this logon attempt may be found in the correlated 4625 event.

For more information please see https://go.microsoft.com/fwlink/?linkid=2305011.

Fields #

NameDescription
SubjectUserSid SID
SubjectUserName UnicodeString
SubjectDomainName UnicodeString
SubjectLogonId HexInt64
TargetUserSid SID
TargetUserName UnicodeString
TargetDomainName UnicodeString
LogonType UInt32Logon type reference
AllowSystemAccessRight UnicodeString
AllowSystemAccessRightUlong HexInt32

Event ID 6430 — A Windows Firewall policy was imported.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security

Description

A Windows Firewall policy was imported.

Message #

A Windows Firewall policy was imported.

Subject:
	Security ID: %1
	Account Name: %2
	Account Domain: %3

Import Information:
	Import File Name: %4
	Policy Details: %5

Fields #

NameDescription
UserSid SID
UserName UnicodeString
DomainName UnicodeString
ImportFileName UnicodeString
PolicyDetails UnicodeString

Event ID 8191 — Highest System-Defined Audit Message Value.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Opcode
Info

Description

Highest System-Defined Audit Message Value.

Message #

Highest System-Defined Audit Message Value.