Event ID 5441 — The following filter was present when the Windows Filtering Platform Base Filtering Engine started.
Description
The following filter was present when the Windows Filtering Platform Base Filtering Engine started.
Message #
Fields #
| Name | Description |
|---|---|
ProviderKey GUID | [Provider Information] ID |
ProviderName UnicodeString | [Provider Information] Name |
FilterKey GUID | [Filter Information] ID |
FilterName UnicodeString | [Filter Information] Name |
FilterType UnicodeString | [Filter Information] Type |
FilterId UInt64 | [Filter Information] Run-Time ID |
LayerKey GUID | [Layer Information] ID |
LayerName UnicodeString | [Layer Information] Name Known values
|
LayerId UInt32 | [Layer Information] Run-Time ID |
Weight UInt64 | [Layer Information] Weight |
Conditions UnicodeString | [Additional Information] Conditions |
Action UnicodeString | [Additional Information] Filter Action |
CalloutKey GUID | [Additional Information] Callout ID |
CalloutName UnicodeString | [Additional Information] Callout Name |
Example Event #
{
"system": {
"provider": "Microsoft-Windows-Security-Auditing",
"guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
"event_source_name": "",
"event_id": 5441,
"version": 0,
"level": 0,
"task": 13572,
"opcode": 0,
"keywords": 9232379236109516800,
"time_created": "2022-04-04T13:11:16.631722+00:00",
"event_record_id": 25499,
"correlation": {
"ActivityID": "7377737E-4825-0000-C974-77732548D801"
},
"execution": {
"process_id": 612,
"thread_id": 668
},
"channel": "Security",
"computer": "WIN-TKC15D7KHUR",
"security": {
"user_id": ""
}
},
"event_data": {
"ProviderKey": "DECC16CA-3F33-4346-BE1E-8FB4AE0F3D62",
"ProviderName": "Microsoft Corporation",
"FilterKey": "B98B75DC-17C0-4E84-BD4E-2080527CA6A6",
"FilterName": "AppContainerBoottimeFilter",
"FilterType": "%%16387",
"FilterId": 67430,
"LayerKey": "A3B42C97-9F04-4672-B87E-CEE9C483257F",
"LayerName": "ALE Receive/Accept v6 Layer",
"LayerId": 46,
"Weight": 18446744073709551615,
"Conditions": "\n\tCondition ID:\t{632ce23b-5167-435c-86d7-e903684aa80c}\n\tMatch value:\tAll flags set\n\tCondition value:\t0x00400000\n",
"Action": "%%16390",
"CalloutKey": "00000000-0000-0000-0000-000000000000",
"CalloutName": "-"
},
"message": ""
}
Detection Patterns #
References #
- Microsoft Learn https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5441
- Microsoft Learn Audit Policy https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change
- Ultimate Windows Security https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=5441
- Example event sourced from https://github.com/NextronSystems/evtx-baseline