Microsoft-Windows-Security-Auditing › Event 4905

Event ID 4905 — An attempt was made to unregister a security event source.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Policy Change → Audit Policy Change
Collection Priority
Recommended (Yamato Security, others)
Opcode
Info

Description

An attempt was made to unregister a security event source.

Message #

An attempt was made to unregister a security event source.

Subject
	Security ID: %1
	Account Name: %2
	Account Domain: %3
	Logon ID: %4

Process:
	Process ID: %7
	Process Name: %8

Event Source:
	Source Name: %5
	Event Source ID: %6

Fields #

NameDescription
Security_ID
Account_Name
Account_Domain
Logon_ID
Source_Name[Event Source] Source Name.
Event_Source_ID[Event Source] Event Source ID.
Process_ID[Process] Process ID.
Process_Name[Process] Process Name.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4905,
    "version": 0,
    "level": 0,
    "task": 13568,
    "opcode": 0,
    "keywords": 9232379236109516800,
    "time_created": "2013-10-23T16:26:16.473750Z",
    "event_record_id": 135,
    "correlation": {},
    "execution": {
      "process_id": 508,
      "thread_id": 1032
    },
    "channel": "Security",
    "computer": "IE8Win7",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "SubjectUserSid": "S-1-5-18",
    "SubjectUserName": "WIN-QALA5Q3KJ43$",
    "SubjectDomainName": "WORKGROUP",
    "SubjectLogonId": "0x3e7",
    "AuditSourceName": "VSSAudit",
    "EventSourceId": "0xe5eb0",
    "ProcessId": "0x9fc",
    "ProcessName": "C:\\Windows\\System32\\VSSVC.exe"
  }
}

Detection Patterns #

References #