Microsoft-Windows-Security-Mitigations

36 events across 2 channels

Event IDTitleChannel
1Process 'ProcessPath' (PID CallingProcessId) would have been blocked from …KernelMode
2Process 'ProcessPath' (PID CallingProcessId) was blocked from generating dynamic …KernelMode
3Process 'ProcessPath' (PID CallingProcessId) would have been blocked from …KernelMode
4Process 'ProcessPath' (PID CallingProcessId) was blocked from creating a child …KernelMode
5Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the …KernelMode
6Process 'ProcessPath' (PID ProcessId) was blocked from loading the low-integrity …KernelMode
7Process 'ProcessPath' (PID CallingProcessId) would have been blocking from …KernelMode
8Process 'ProcessPath' (PID CallingProcessId) was blocked from loading a binary …KernelMode
9Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making …KernelMode
10Process 'ProcessPath' (PID CallingProcessId) was blocked from making system …KernelMode
11Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the …KernelMode
12Process 'ProcessPath' (PID ProcessId) was blocked from loading the …KernelMode
13Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the …UserMode
14Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export …UserMode
15Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the …UserMode
16Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export …UserMode
17Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the …UserMode
18Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Import …UserMode
19Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the …UserMode
20Process 'ProcessPath' (PID ProcessId) was blocked from calling the API …UserMode
21Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the …UserMode
22Process 'ProcessPath' (PID ProcessId) was blocked from calling the API …UserMode
23Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the …UserMode
24Process 'ProcessPath' (PID ProcessId) was blocked from calling the API …UserMode
25Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return …KernelMode
26Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return …KernelMode
27Process 'ProcessPath' (PID ProcessId) would have been blocked from setting …KernelMode
28Process 'ProcessPath' (PID ProcessId) was blocked from setting context due to …KernelMode
29Process 'ProcessPath' (PID ProcessId) would have been blocked from loading an …KernelMode
30Process 'ProcessPath' (PID ProcessId) was blocked from loading an image binary …KernelMode
31Process 'Arguments' (PID Impersonating) would have been blocked from following …KernelMode
32Process 'Arguments' (PID Impersonating) was blocked from following an untrusted …KernelMode
33The system has encountered a kernel-mode shadow stack return address mismatch.KernelMode
34The system has encountered a kernel-mode shadow stack return address mismatch.KernelMode
35Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making …KernelMode
36Process 'ProcessPath' (PID CallingProcessId) was blocked from making the …KernelMode

Event ID 1 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from generating dynamic code.

#
Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_DYNAMIC_CODE

Description

Process 'ProcessPath' (PID CallingProcessId) would have been blocked from generating dynamic code.

Message #

Process '%2' (PID %5) would have been blocked from generating dynamic code.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Mitigations",
    "guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
    "event_source_name": "",
    "event_id": 1,
    "version": 0,
    "level": 0,
    "task": 1,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2022-04-04T14:07:23.788203+00:00",
    "event_record_id": 7,
    "correlation": {},
    "execution": {
      "process_id": 4808,
      "thread_id": 4432
    },
    "channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
    "computer": "WIN-TKC15D7KHUR",
    "security": {
      "user_id": "S-1-5-21-1958040314-2592322477-2606035944-500"
    }
  },
  "event_data": {
    "ProcessPathLength": 60,
    "ProcessPath": "\\Device\\HarddiskVolume2\\Windows\\System32\\inetsrv\\InetMgr.exe",
    "ProcessCommandLineLength": 42,
    "ProcessCommandLine": "\"C:\\Windows\\system32\\inetsrv\\InetMgr.exe\" ",
    "CallingProcessId": 4808,
    "CallingProcessCreateTime": "2022-04-04T14:07:23.009253Z",
    "CallingProcessStartKey": 1407374883554550,
    "CallingProcessSignatureLevel": 0,
    "CallingProcessSectionSignatureLevel": 0,
    "CallingProcessProtection": 0,
    "CallingThreadId": 4432,
    "CallingThreadCreateTime": "2022-04-04T14:07:23.009255Z"
  },
  "message": ""
}

References #

Event ID 2 — Process 'ProcessPath' (PID CallingProcessId) was blocked from generating dynamic code.

#
Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Level
Warning
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_DYNAMIC_CODE

Description

Process 'ProcessPath' (PID CallingProcessId) was blocked from generating dynamic code.

Message #

Process '%2' (PID %5) was blocked from generating dynamic code.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Mitigations",
    "guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
    "event_source_name": "",
    "event_id": 2,
    "version": 0,
    "level": 3,
    "task": 1,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2023-11-06T01:01:34.932541+00:00",
    "event_record_id": 88,
    "correlation": {},
    "execution": {
      "process_id": 11664,
      "thread_id": 10404
    },
    "channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "ProcessPathLength": 59,
    "ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\TeamViewer\\tv_x64.exe",
    "ProcessCommandLineLength": 192,
    "ProcessCommandLine": "\"C:\\Program Files\\TeamViewer\\tv_x64.exe\" --action installpnpdriver --inf \"C:\\Program Files\\TeamViewer\\x64\\TVVirtualMonitorDriver.inf\" --log \"C:\\Program Files\\TeamViewer\\TeamViewer15_Hooks.log\"",
    "CallingProcessId": 11664,
    "CallingProcessCreateTime": "2023-11-06T01:01:34.836839Z",
    "CallingProcessStartKey": 3659174697240700,
    "CallingProcessSignatureLevel": 2,
    "CallingProcessSectionSignatureLevel": 2,
    "CallingProcessProtection": 0,
    "CallingThreadId": 10404,
    "CallingThreadCreateTime": "2023-11-06T01:01:34.836843Z"
  },
  "message": ""
}

References #

Event ID 3 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.

#
Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_CHILD_PROCESS_CREATION

Description

Process 'ProcessPath' (PID CallingProcessId) would have been blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.

Message #

Process '%2' (PID %5) would have been blocked from creating a child process '%14' with command line '%16'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME
ChildImagePathNameLength UInt16
ChildImagePathName UnicodeString
ChildCommandLineLength UInt16
ChildCommandLine UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Mitigations",
    "guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
    "event_source_name": "",
    "event_id": 3,
    "version": 0,
    "level": 0,
    "task": 2,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2023-10-26T04:19:22.802481+00:00",
    "event_record_id": 6,
    "correlation": {},
    "execution": {
      "process_id": 2524,
      "thread_id": 452
    },
    "channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
    "computer": "WIN-OQ6R0RVA4NF",
    "security": {
      "user_id": "S-1-5-18"
    }
  },
  "event_data": {
    "ProcessPathLength": 52,
    "ProcessPath": "\\Device\\HarddiskVolume4\\Windows\\System32\\spoolsv.exe",
    "ProcessCommandLineLength": 31,
    "ProcessCommandLine": "C:\\Windows\\System32\\spoolsv.exe",
    "CallingProcessId": 2524,
    "CallingProcessCreateTime": "2023-10-26T04:17:19.791140Z",
    "CallingProcessStartKey": 281474976710715,
    "CallingProcessSignatureLevel": 2,
    "CallingProcessSectionSignatureLevel": 2,
    "CallingProcessProtection": 0,
    "CallingThreadId": 452,
    "CallingThreadCreateTime": "2023-10-26T04:19:20.206505Z",
    "ChildImagePathNameLength": 32,
    "ChildImagePathName": "C:\\Windows\\SysWOW64\\regsvr32.exe",
    "ChildCommandLineLength": 73,
    "ChildCommandLine": "C:\\Windows\\SysWOW64\\regsvr32.exe /s \"C:\\Windows\\SysWOW64\\PrintConfig.dll\""
  },
  "message": ""
}

References #

Event ID 4 — Process 'ProcessPath' (PID CallingProcessId) was blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Level
Warning
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_CHILD_PROCESS_CREATION

Description

Process 'ProcessPath' (PID CallingProcessId) was blocked from creating a child process 'ChildImagePathName' with command line 'ChildCommandLine'.

Message #

Process '%2' (PID %5) was blocked from creating a child process '%14' with command line '%16'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME
ChildImagePathNameLength UInt16
ChildImagePathName UnicodeString
ChildCommandLineLength UInt16
ChildCommandLine UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Mitigations",
    "guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
    "event_source_name": "",
    "event_id": 4,
    "version": 0,
    "level": 3,
    "task": 2,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2026-03-11T06:27:47.998503+00:00",
    "event_record_id": 3000,
    "correlation": {},
    "execution": {
      "process_id": 6084,
      "thread_id": 6236
    },
    "channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
    "computer": "LAB-WIN11",
    "security": {
      "user_id": "S-1-5-19"
    }
  },
  "event_data": {
    "ProcessPathLength": 94,
    "ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\Windows Defender Advanced Threat Protection\\SenseNdr.exe",
    "ProcessCommandLineLength": 512,
    "ProcessCommandLine": "\"C:\\Program Files\\Windows Defender Advanced Threat Protection\\SenseNdr.exe\"  \"eyJDbGllbnRWZXIiOiIxMC44MjEwLjIyNjIxLjQ1NyIsIkNvbXBvbmVudHMiOlt7IkFkYXB0ZXJJZCI6Ins4QTE3NjBCNi1EQzk5LTRCOTAtOUM0QS0wMjk2OThFNUFFMjd9IiwiQ2F0ZWdvcnkiOjIsIkRlZmF1bHRHYXRld2F5cyI6W3siQWRkcmVzcyI6IjEwLjIuMTAuMjU0IiwiTUFDIjoiYmM6MjQ6MTE6MjI6NWI6NTcifV0sIkRvbWFpblR5cGUiOjAsIklwQWRkcmVzc2VzIjpbeyJBZGRyZXNzIjoiMTAuMi4xMC4yMSIsIk1BU0siOjI0fV0sIk5ldE5hbWUiOiJOZXR3b3JrIDIiLCJQaHlzaWNhbEFkZHIiOiJiYzI0MTE5YTRkYzIiLCJQa3RNb25JZCI6MSwiUmVnaXN0cn",
    "CallingProcessId": 6084,
    "CallingProcessCreateTime": "2026-03-11T06:27:47.450908Z",
    "CallingProcessStartKey": 4222124650660002,
    "CallingProcessSignatureLevel": 8,
    "CallingProcessSectionSignatureLevel": 8,
    "CallingProcessProtection": 0,
    "CallingThreadId": 6236,
    "CallingThreadCreateTime": "2026-03-11T06:27:47.450927Z",
    "ChildImagePathNameLength": 35,
    "ChildImagePathName": "\\??\\C:\\Windows\\system32\\conhost.exe",
    "ChildCommandLineLength": 55,
    "ChildCommandLine": "\\??\\C:\\Windows\\system32\\conhost.exe 0xffffffff -ForceV1"
  },
  "message": ""
}

Event ID 5 — Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the low-integrity binary 'ImageName'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_LOWIL_IMAGE_MAP

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the low-integrity binary 'ImageName'.

Message #

Process '%2' (PID %5) would have been blocked from loading the low-integrity binary '%14'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
TargetThreadId UInt32
TargetThreadCreateTime FILETIME
ImageNameLength UInt16
ImageName UnicodeString

Event ID 6 — Process 'ProcessPath' (PID ProcessId) was blocked from loading the low-integrity binary 'ImageName'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_LOWIL_IMAGE_MAP

Description

Process 'ProcessPath' (PID ProcessId) was blocked from loading the low-integrity binary 'ImageName'.

Message #

Process '%2' (PID %5) was blocked from loading the low-integrity binary '%14'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
TargetThreadId UInt32
TargetThreadCreateTime FILETIME
ImageNameLength UInt16
ImageName UnicodeString

Event ID 7 — Process 'ProcessPath' (PID CallingProcessId) would have been blocking from loading a binary from a remote share.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_REMOTE_IMAGE_MAP

Description

Process 'ProcessPath' (PID CallingProcessId) would have been blocking from loading a binary from a remote share.

Message #

Process '%2' (PID %5) would have been blocking from loading a binary from a remote share.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME

Event ID 8 — Process 'ProcessPath' (PID CallingProcessId) was blocked from loading a binary from a remote share.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_REMOTE_IMAGE_MAP

Description

Process 'ProcessPath' (PID CallingProcessId) was blocked from loading a binary from a remote share.

Message #

Process '%2' (PID %5) was blocked from loading a binary from a remote share.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME

Event ID 9 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making system calls to Win32k.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_WIN32K_SYSTEM_CALLS

Description

Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making system calls to Win32k.sys.

Message #

Process '%2' (PID %5) would have been blocked from making system calls to Win32k.sys.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME

Event ID 10 — Process 'ProcessPath' (PID CallingProcessId) was blocked from making system calls to Win32k.

#
Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Level
Warning
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_WIN32K_SYSTEM_CALLS

Description

Process 'ProcessPath' (PID CallingProcessId) was blocked from making system calls to Win32k.sys.

Message #

Process '%2' (PID %5) was blocked from making system calls to Win32k.sys.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Mitigations",
    "guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
    "event_source_name": "",
    "event_id": 10,
    "version": 0,
    "level": 3,
    "task": 5,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2023-11-06T01:55:30.233087+00:00",
    "event_record_id": 194,
    "correlation": {},
    "execution": {
      "process_id": 17736,
      "thread_id": 9464
    },
    "channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "ProcessPathLength": 65,
    "ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\Mozilla Firefox\\firefox.exe",
    "ProcessCommandLineLength": 412,
    "ProcessCommandLine": "\"C:\\Program Files\\Mozilla Firefox\\firefox.exe\" -contentproc --channel=7928 -childID 13 -isForBrowser -prefsHandle 7924 -prefMapHandle 7272 -prefsLen 37923 -prefMapSize 235045 -jsInitHandle 1588 -jsInitLen 235336 -parentBuildID 20231019122658 -win32kLockedDown -appDir \"C:\\Program Files\\Mozilla Firefox\\browser\" - {9095c7bc-c09b-4e88-a55a-1b4a7ff727a7} 4148 \"\\\\.\\pipe\\gecko-crash-server-pipe.4148\" 22025387bd0 tab",
    "CallingProcessId": 17736,
    "CallingProcessCreateTime": "2023-11-06T01:55:29.635202Z",
    "CallingProcessStartKey": 3659174697241340,
    "CallingProcessSignatureLevel": 2,
    "CallingProcessSectionSignatureLevel": 2,
    "CallingProcessProtection": 0,
    "CallingThreadId": 9464,
    "CallingThreadCreateTime": "2023-11-06T01:55:29.635208Z"
  },
  "message": ""
}

References #

Event ID 11 — Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the non-Microsoft-signed binary 'ImageName'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_NON_MICROSOFT_BINARIES

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from loading the non-Microsoft-signed binary 'ImageName'.

Message #

Process '%2' (PID %5) would have been blocked from loading the non-Microsoft-signed binary '%16'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
TargetThreadId UInt32
TargetThreadCreateTime FILETIME
RequiredSignatureLevel UInt8
SignatureLevel UInt8
ImageNameLength UInt16
ImageName UnicodeString

Detection Patterns #

Event ID 12 — Process 'ProcessPath' (PID ProcessId) was blocked from loading the non-Microsoft-signed binary 'ImageName'.

#
Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Level
Warning
Collection Priority
Recommended (JSCU-NL)
Task
KERNEL_MITIGATION_TASK_PROHIBIT_NON_MICROSOFT_BINARIES

Description

Process 'ProcessPath' (PID ProcessId) was blocked from loading the non-Microsoft-signed binary 'ImageName'.

Message #

Process '%2' (PID %5) was blocked from loading the non-Microsoft-signed binary '%16'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
TargetThreadId UInt32
TargetThreadCreateTime FILETIME
RequiredSignatureLevel UInt8
SignatureLevel UInt8
ImageNameLength UInt16
ImageName UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Mitigations",
    "guid": "FAE10392-F0AF-4AC0-B8FF-9F4D920C3CDF",
    "event_source_name": "",
    "event_id": 12,
    "version": 0,
    "level": 3,
    "task": 6,
    "opcode": 0,
    "keywords": 9223372036854775808,
    "time_created": "2023-11-06T01:51:38.699135+00:00",
    "event_record_id": 190,
    "correlation": {},
    "execution": {
      "process_id": 18848,
      "thread_id": 20656
    },
    "channel": "Microsoft-Windows-Security-Mitigations/KernelMode",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "ProcessPathLength": 74,
    "ProcessPath": "\\Device\\HarddiskVolume4\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
    "ProcessCommandLineLength": 475,
    "ProcessCommandLine": "\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --type=renderer --disable-nacl --origin-trial-disabled-features=WebGPU --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=52 --time-ticks-at-unix-epoch=-1699223515372207 --launch-time-ticks=11971985687 --mojo-platform-channel-handle=7792 --field-trial-handle=1832,i,15435703333515679192,1539963582152160407,262144 /prefetch:1",
    "ProcessId": 18848,
    "ProcessCreateTime": "2023-11-06T01:51:27.394536Z",
    "ProcessStartKey": 3659174697241317,
    "ProcessSignatureLevel": 8,
    "ProcessSectionSignatureLevel": 8,
    "ProcessProtection": 0,
    "TargetThreadId": 20656,
    "TargetThreadCreateTime": "2023-11-06T01:51:27.394551Z",
    "RequiredSignatureLevel": 8,
    "SignatureLevel": 4,
    "ImageNameLength": 51,
    "ImageName": "\\Program Files\\Malwarebytes\\Anti-Malware\\mbae64.dll"
  },
  "message": ""
}

Detection Patterns #

References #

Event ID 13 — Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_EXPORT_ADDRESS_FILTER

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Message #

Process '%2' (PID %3) would have been blocked from accessing the Export Address Table for module '%8'.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
ModuleFullPath UnicodeString
ModuleBase Pointer
ModuleAddress Pointer
MemAddress Pointer
MemModuleFullPath UnicodeString
MemModuleBase Pointer
APIName UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

Event ID 14 — Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_EXPORT_ADDRESS_FILTER

Description

Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Message #

Process '%2' (PID %3) was blocked from accessing the Export Address Table for module '%8'.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
ModuleFullPath UnicodeString
ModuleBase Pointer
ModuleAddress Pointer
MemAddress Pointer
MemModuleFullPath UnicodeString
MemModuleBase Pointer
APIName UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

References #

Event ID 15 — Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_EXPORT_ADDRESS_FILTER_PLUS

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Message #

Process '%2' (PID %3) would have been blocked from accessing the Export Address Table for module '%8'.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
ModuleFullPath UnicodeString
ModuleBase Pointer
ModuleAddress Pointer
MemAddress Pointer
MemModuleFullPath UnicodeString
MemModuleBase Pointer
APIName UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

Event ID 16 — Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_EXPORT_ADDRESS_FILTER_PLUS

Description

Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Export Address Table for module 'MemModuleFullPath'.

Message #

Process '%2' (PID %3) was blocked from accessing the Export Address Table for module '%8'.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
ModuleFullPath UnicodeString
ModuleBase Pointer
ModuleAddress Pointer
MemAddress Pointer
MemModuleFullPath UnicodeString
MemModuleBase Pointer
APIName UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

Event ID 17 — Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Import Address Table for API 'APIName'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_IMPORT_ADDRESS_FILTER

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from accessing the Import Address Table for API 'APIName'.

Message #

Process '%2' (PID %3) would have been blocked from accessing the Import Address Table for API '%10'.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
ModuleFullPath UnicodeString
ModuleBase Pointer
ModuleAddress Pointer
MemAddress Pointer
MemModuleFullPath UnicodeString
MemModuleBase Pointer
APIName UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

Event ID 18 — Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Import Address Table for API 'APIName'.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_IMPORT_ADDRESS_FILTER

Description

Process 'ProcessPath' (PID ProcessId) was blocked from accessing the Import Address Table for API 'APIName'.

Message #

Process '%2' (PID %3) was blocked from accessing the Import Address Table for API '%10'.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
ModuleFullPath UnicodeString
ModuleBase Pointer
ModuleAddress Pointer
MemAddress Pointer
MemModuleFullPath UnicodeString
MemModuleBase Pointer
APIName UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

Event ID 19 — Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_ROP_STACKPIVOT

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Message #

Process '%2' (PID %3) would have been blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
HookedAPI UnicodeString
ReturnAddress Pointer
CalledAddress Pointer
TargetAddress Pointer
StackAddress Pointer
FrameAddress Pointer
ReturnAddressModuleFullPath UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

References #

Event ID 20 — Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_ROP_STACKPIVOT

Description

Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Message #

Process '%2' (PID %3) was blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
HookedAPI UnicodeString
ReturnAddress Pointer
CalledAddress Pointer
TargetAddress Pointer
StackAddress Pointer
FrameAddress Pointer
ReturnAddressModuleFullPath UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

References #

Event ID 21 — Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_ROP_CALLERCHECK

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Message #

Process '%2' (PID %3) would have been blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
HookedAPI UnicodeString
ReturnAddress Pointer
CalledAddress Pointer
TargetAddress Pointer
StackAddress Pointer
FrameAddress Pointer
ReturnAddressModuleFullPath UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

References #

Event ID 22 — Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_ROP_CALLERCHECK

Description

Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Message #

Process '%2' (PID %3) was blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
HookedAPI UnicodeString
ReturnAddress Pointer
CalledAddress Pointer
TargetAddress Pointer
StackAddress Pointer
FrameAddress Pointer
ReturnAddressModuleFullPath UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

Event ID 23 — Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_ROP_SIMEXEC

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Message #

Process '%2' (PID %3) would have been blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
HookedAPI UnicodeString
ReturnAddress Pointer
CalledAddress Pointer
TargetAddress Pointer
StackAddress Pointer
FrameAddress Pointer
ReturnAddressModuleFullPath UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

References #

Event ID 24 — Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Provider
Microsoft-Windows-Security-Mitigations
Channel
UserMode
Collection Priority
Recommended (JSCU-NL)
Task
USER_MITIGATION_TASK_ROP_SIMEXEC

Description

Process 'ProcessPath' (PID ProcessId) was blocked from calling the API 'HookedAPI' due to return-oriented programming (ROP) exploit indications.

Message #

Process '%2' (PID %3) was blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.

Fields #

NameDescription
Subcode UInt32
ProcessPath UnicodeString
ProcessId UInt32
HookedAPI UnicodeString
ReturnAddress Pointer
CalledAddress Pointer
TargetAddress Pointer
StackAddress Pointer
FrameAddress Pointer
ReturnAddressModuleFullPath UnicodeString
ProcessStartTime FILETIME
ThreadId UInt32

References #

Event ID 25 — Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_CONTROL_PROTECTION_USER_MODE_RETURN_MISMATCH

Description

Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch. The process will be allowed to continue execution.

Message #

Process '%2' (PID %5) has encountered a shadow stack return address mismatch. The process will be allowed to continue execution.

Return instruction executed from module '%12'.
Attempting to return to module '%14'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
ControlPcImageNameLength UInt16
ControlPcImageName UnicodeString
RspContentsImageNameLength UInt16
RspContentsImageName UnicodeString
StrictMode Boolean
UserCetAppcompatOptions UInt32
NonenforcementReason UInt32
ControlPcAddress Pointer
ControlPcOffset Pointer
ControlPcCetCompat Boolean
RspContentsAddress Pointer
RspContentsOffset Pointer
RspContentsCetCompat Boolean

References #

Event ID 26 — Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_CONTROL_PROTECTION_USER_MODE_RETURN_MISMATCH

Description

Process 'ProcessPath' (PID ProcessId) has encountered a shadow stack return address mismatch. The process will be terminated.

Message #

Process '%2' (PID %5) has encountered a shadow stack return address mismatch. The process will be terminated.

Return instruction executed from module '%12'.
Attempting to return to module '%14'.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
ControlPcImageNameLength UInt16
ControlPcImageName UnicodeString
RspContentsImageNameLength UInt16
RspContentsImageName UnicodeString
StrictMode Boolean
UserCetAppcompatOptions UInt32
NonenforcementReason UInt32
ControlPcAddress Pointer
ControlPcOffset Pointer
ControlPcCetCompat Boolean
RspContentsAddress Pointer
RspContentsOffset Pointer
RspContentsCetCompat Boolean

Event ID 27 — Process 'ProcessPath' (PID ProcessId) would have been blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is ena...

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_USER_CET_SET_CONTEXT_IP_VALIDATION_FAILURE

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.

Message #

Process '%2' (PID %5) would have been blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
TargetIpImageNameLength UInt16
TargetIpImageName UnicodeString
StrictMode Boolean
ContinueType UInt32

References #

Event ID 28 — Process 'ProcessPath' (PID ProcessId) was blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_USER_CET_SET_CONTEXT_IP_VALIDATION_FAILURE

Description

Process 'ProcessPath' (PID ProcessId) was blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.

Message #

Process '%2' (PID %5) was blocked from setting context due to instruction pointer validation failure when user-mode shadow stack is enabled.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
TargetIpImageNameLength UInt16
TargetIpImageName UnicodeString
StrictMode Boolean
ContinueType UInt32

References #

Event ID 29 — Process 'ProcessPath' (PID ProcessId) would have been blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing...

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_BLOCK_NON_CET_BINARIES

Description

Process 'ProcessPath' (PID ProcessId) would have been blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception handling continuation data.

Message #

Process '%2' (PID %5) would have been blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception handling continuation data.
Process requires binaries to also contain exception handling continuation data: %15

Binary path: %12
Binary compatible with shadow stacks: %13
Binary contains exception handling continuation data: %14

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
MappedImageNameLength UInt16
MappedImageName UnicodeString
ImageCetShadowStacksReady Boolean
ImageEHContinuationTablePresent Boolean
NonEhcontMode Boolean

References #

Event ID 30 — Process 'ProcessPath' (PID ProcessId) was blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception h...

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_BLOCK_NON_CET_BINARIES

Description

Process 'ProcessPath' (PID ProcessId) was blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception handling continuation data.

Message #

Process '%2' (PID %5) was blocked from loading an image binary due to the binary not being compatible with shadow stacks and/or missing exception handling continuation data.
Process requires binaries to also contain exception handling continuation data: %15

Binary path: %12
Binary compatible with shadow stacks: %13
Binary contains exception handling continuation data: %14

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
MappedImageNameLength UInt16
MappedImageName UnicodeString
ImageCetShadowStacksReady Boolean
ImageEHContinuationTablePresent Boolean
NonEhcontMode Boolean

Event ID 31 — Process 'Arguments' (PID Impersonating) would have been blocked from following an untrusted redirection.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_REDIRECTION_TRUST_POLICY

Description

Process 'Arguments' (PID Impersonating) would have been blocked from following an untrusted redirection.

Message #

Process '%2' (PID %5) would have been blocked from following an untrusted redirection: 

Binary path: %2
Arguments: %4
Redirection Type: %11
Operation Path: %13
Impersonating: %14

Fields #

NameDescription
Binary_path
Arguments
Redirection_Type
Operation_PathArguments.
Impersonating Boolean
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
RedirectionType UInt32
OperationPathLength UInt16
OperationPath UnicodeString
Module1 UnicodeString
Module1Offset UInt64
Module2 UnicodeString
Module2Offset UInt64
Module3 UnicodeString
Module3Offset UInt64
Module4 UnicodeString
Module4Offset UInt64
Module5 UnicodeString
Module5Offset UInt64
Module6 UnicodeString
Module6Offset UInt64
Module7 UnicodeString
Module7Offset UInt64
Module8 UnicodeString
Module8Offset UInt64
Module9 UnicodeString
Module9Offset UInt64
Module10 UnicodeString
Module10Offset UInt64
Module11 UnicodeString
Module11Offset UInt64
Module12 UnicodeString
Module12Offset UInt64
Module13 UnicodeString
Module13Offset UInt64
Module14 UnicodeString
Module14Offset UInt64
Module15 UnicodeString
Module15Offset UInt64
Module16 UnicodeString
Module16Offset UInt64

Event ID 32 — Process 'Arguments' (PID Impersonating) was blocked from following an untrusted redirection.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_REDIRECTION_TRUST_POLICY

Description

Process 'Arguments' (PID Impersonating) was blocked from following an untrusted redirection.

Message #

Process '%2' (PID %5) was blocked from following an untrusted redirection: 

Binary path: %2
Arguments: %4
Redirection Type: %11
Operation Path: %13
Impersonating: %14

Fields #

NameDescription
Binary_path
Arguments
Redirection_Type
Operation_PathArguments.
Impersonating Boolean
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
ProcessId UInt32
ProcessCreateTime FILETIME
ProcessStartKey UInt64
ProcessSignatureLevel UInt8
ProcessSectionSignatureLevel UInt8
ProcessProtection UInt8
RedirectionType UInt32
OperationPathLength UInt16
OperationPath UnicodeString
Module1 UnicodeString
Module1Offset UInt64
Module2 UnicodeString
Module2Offset UInt64
Module3 UnicodeString
Module3Offset UInt64
Module4 UnicodeString
Module4Offset UInt64
Module5 UnicodeString
Module5Offset UInt64
Module6 UnicodeString
Module6Offset UInt64
Module7 UnicodeString
Module7Offset UInt64
Module8 UnicodeString
Module8Offset UInt64
Module9 UnicodeString
Module9Offset UInt64
Module10 UnicodeString
Module10Offset UInt64
Module11 UnicodeString
Module11Offset UInt64
Module12 UnicodeString
Module12Offset UInt64
Module13 UnicodeString
Module13Offset UInt64
Module14 UnicodeString
Module14Offset UInt64
Module15 UnicodeString
Module15Offset UInt64
Module16 UnicodeString
Module16Offset UInt64

Event ID 33 — The system has encountered a kernel-mode shadow stack return address mismatch.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_CONTROL_PROTECTION_KERNEL_MODE_RETURN_MISMATCH

Description

The system has encountered a kernel-mode shadow stack return address mismatch. The system will be allowed to continue execution because: NonenforcementReason.

Message #

The system has encountered a kernel-mode shadow stack return address mismatch. The system will be allowed to continue execution because: %5.

Return instruction executed from module '%2'.
(Instruction address: %6, module offset: %7)

Attempting to return to module '%4'.
(Instruction address: %9, module offset: %10)

Fields #

NameDescription
ControlPcImageNameLength UInt16
ControlPcImageName UnicodeString
RspContentsImageNameLength UInt16
RspContentsImageName UnicodeString
NonenforcementReason UInt32
ControlPcAddress Pointer
ControlPcOffset Pointer
ControlPcCetCompat Boolean
RspContentsAddress Pointer
RspContentsOffset Pointer
RspContentsCetCompat Boolean
ShadowStackOverflowReset Boolean
ErrorCode UInt32

Event ID 34 — The system has encountered a kernel-mode shadow stack return address mismatch.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_CONTROL_PROTECTION_KERNEL_MODE_RETURN_MISMATCH

Description

The system has encountered a kernel-mode shadow stack return address mismatch. The system will be terminated.

Message #

The system has encountered a kernel-mode shadow stack return address mismatch. The system will be terminated.

Return instruction executed from module '%2'.
(Instruction address: %6, module offset: %7)

Attempting to return to module '%4'.
(Instruction address: %9, module offset: %10)

Fields #

NameDescription
Instruction_address
module_offset
Instruction_address
module_offset
ControlPcImageNameLength UInt16
ControlPcImageName UnicodeString
RspContentsImageNameLength UInt16
RspContentsImageName UnicodeString
NonenforcementReason UInt32
ControlPcAddress Pointer
ControlPcOffset Pointer
ControlPcCetCompat Boolean
RspContentsAddress Pointer
RspContentsOffset Pointer
RspContentsCetCompat Boolean
ShadowStackOverflowReset Boolean
ErrorCode UInt32

Event ID 35 — Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making the NtFsControlFile system call.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_PROHIBIT_FSCTL_SYSTEM_CALLS

Description

Process 'ProcessPath' (PID CallingProcessId) would have been blocked from making the NtFsControlFile system call.

Message #

Process '%2' (PID %5) would have been blocked from making the NtFsControlFile system call.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME

Event ID 36 — Process 'ProcessPath' (PID CallingProcessId) was blocked from making the NtFsControlFile system call.

Provider
Microsoft-Windows-Security-Mitigations
Channel
KernelMode
Task
KERNEL_MITIGATION_TASK_PROHIBIT_FSCTL_SYSTEM_CALLS

Description

Process 'ProcessPath' (PID CallingProcessId) was blocked from making the NtFsControlFile system call.

Message #

Process '%2' (PID %5) was blocked from making the NtFsControlFile system call.

Fields #

NameDescription
ProcessPathLength UInt16
ProcessPath UnicodeString
ProcessCommandLineLength UInt16
ProcessCommandLine UnicodeString
CallingProcessId UInt32
CallingProcessCreateTime FILETIME
CallingProcessStartKey UInt64
CallingProcessSignatureLevel UInt8
CallingProcessSectionSignatureLevel UInt8
CallingProcessProtection UInt8
CallingThreadId UInt32
CallingThreadCreateTime FILETIME