Microsoft-Windows-Windows Firewall With Advanced Security
170 events across 7 channels
Event ID 2000 — The following settings were applied to the Windows Defender Firewall at startup Current Profile: %1 IPsec SA Idle time: %2 IPsec preshared key enco...
Message
Fields
| Name | Description |
|---|---|
CurrentProfile | — |
SAIdleTime | — |
PresharedKeyEncoding | — |
IPSecExempt | — |
CrlCheck | — |
IPSecThroughNAT | — |
PolicyVersionSupported | — |
PolicyVersion | — |
BinaryVersionSupported | — |
DisableStatefulFTP | — |
GroupPolicyApplied | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EnableAuditMode | — |
Event ID 2001 — The following per profile settings were applied by Windows Defender Firewall Profile: %1 Operational Mode: %2 Stealth Mode: %3 Block all Incoming C...
Message
Fields
| Name | Description |
|---|---|
Profile | — |
OpMode | — |
DisableStealthMode | — |
BlockAllInbound | — |
DisableUnicastResponseToMultiCastBroadCast | — |
LogDroppedPackets | — |
LogSuccessfulConnections | — |
LogIgnoredRules | — |
DisableInboundNotifications | — |
AllowUserPrefMergeForApps | — |
AllowUserPrefMergeForGlobalPorts | — |
AllowLocalPolicyMerge | — |
AllowIPSecPolicyMerge | — |
DefaultOutboundAction | — |
DefaultInboundAction | — |
RemoteAdministrationEnabled | — |
MaxLogFileSize | — |
LogFilePath | — |
DisabledInterfacesSize | — |
DisabledInterfaces | — |
DisableStealthModeIPsecSecuredPacketExemption | — |
Event ID 2002 — A Windows Defender Firewall setting has changed.
Message
Fields
| Name | Description |
|---|---|
SettingType | — |
SettingValueSize | — |
SettingValue | — |
SettingValueDisplay | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2002
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-07T17:00:02.923110+00:00'
event_record_id: 290
correlation: {}
execution:
process_id: 1212
thread_id: 2276
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WIN-FPV0DSIC9O6.sigma.fr
security:
user_id: S-1-5-19
event_data:
SettingType: 2
SettingValueSize: 4
SettingValue: '01000000'
SettingValueDisplay: (null)
Origin: 1
ModifyingUser: S-1-5-80-3088073201-1464728630-1879813800-1107566885-823218052
ModifyingApplication: ''
message: ''
Sigma Rules
- Windows Firewall Settings Have Been Changed
Detects activity when the settings of the Windows firewall have been changed
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2003 — A Windows Defender Firewall setting in the %1 profile has changed.
Message
Fields
| Name | Description |
|---|---|
Profiles | — |
SettingType | — |
SettingValueSize | — |
SettingValue | — |
SettingValueString | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: '{D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85}'
event_source_name: ''
event_id: 2003
version: '0'
level: '4'
task: '0'
opcode: '0'
keywords: 9223372036854775808
time_created: '2021-06-03T19:39:52.893086100Z'
event_record_id: '912'
correlation: {}
execution:
process_id: '1000'
thread_id: '5464'
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: fs01.offsec.lan
security:
user_id: S-1-5-19
event_data:
Profiles: '1'
SettingType: '1'
SettingValueSize: '4'
SettingValue: '01000000'
SettingValueString: 'Yes'
Origin: '1'
ModifyingUser: S-1-5-21-4230534742-2542757381-3142984815-1111
ModifyingApplication: C:\Windows\System32\wbem\WmiPrvSE.exe
Sigma Rules
- Windows Firewall Settings Have Been Changed
Detects activity when the settings of the Windows firewall have been changed
References
- Example event sourced from https://github.com/Yamato-Security/hayabusa-sample-evtx
Event ID 2004 — A rule has been added to the Windows Defender Firewall exception list.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2004
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223374235878031360
time_created: '2022-04-07T17:06:55.849451+00:00'
event_record_id: 173
correlation: {}
execution:
process_id: 1928
thread_id: 5436
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WIN-FPV0DSIC9O6
security:
user_id: S-1-5-19
event_data:
RuleId: ADDS-NB-Datagram-UDP-In
RuleName: Active Directory Domain Controller - NetBIOS name resolution (UDP-In)
Origin: 1
ApplicationPath: System
ServiceName: ''
Direction: 1
Protocol: 17
LocalPorts: '138'
RemotePorts: '*'
Action: 3
Profiles: 2147483647
LocalAddresses: '*'
RemoteAddresses: '*'
RemoteMachineAuthorizationList: ''
RemoteUserAuthorizationList: ''
EmbeddedContext: '@FirewallAPI.dll,-37601'
Flags: 1
Active: 1
EdgeTraversal: 0
LooseSourceMapped: 0
SecurityOptions: 0
ModifyingUser: S-1-5-18
ModifyingApplication: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.20348.557_none_f1edaeb8515fa10d\TiWorker.exe
SchemaVersion: 543
RuleStatus: 65536
LocalOnlyMapped: 0
message: ''
Sigma Rules
- Uncommon New Firewall Rule Added In Windows Firewall Exception List
Detects when a rule has been added to the Windows Firewall exception list - New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application
Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location. - New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule".
References
- Microsoft Learn https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd364408(v=ws.10)
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2005 — A rule has been modified in the Windows Defender Firewall exception list.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2005
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223374235878031360
time_created: '2022-04-07T17:07:00.091207+00:00'
event_record_id: 189
correlation: {}
execution:
process_id: 1928
thread_id: 1948
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WIN-FPV0DSIC9O6
security:
user_id: S-1-5-19
event_data:
RuleId: FPS-SpoolSvc-In-TCP
RuleName: File and Printer Sharing (Spooler Service - RPC)
Origin: 1
ApplicationPath: C:\Windows\system32\spoolsv.exe
ServiceName: Spooler
Direction: 1
Protocol: 6
LocalPorts: RPC
RemotePorts: '*'
Action: 3
Profiles: 7
LocalAddresses: '*'
RemoteAddresses: '*'
RemoteMachineAuthorizationList: ''
RemoteUserAuthorizationList: ''
EmbeddedContext: '@FirewallAPI.dll,-28502'
Flags: 1
Active: 1
EdgeTraversal: 0
LooseSourceMapped: 0
SecurityOptions: 0
ModifyingUser: S-1-5-18
ModifyingApplication: C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.20348.557_none_f1edaeb8515fa10d\TiWorker.exe
SchemaVersion: 543
RuleStatus: 65536
LocalOnlyMapped: 0
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2006 — A rule has been deleted in the Windows Defender Firewall exception list.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2006
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223374235878031360
time_created: '2022-04-04T08:05:47.030869+00:00'
event_record_id: 275
correlation: {}
execution:
process_id: 1320
thread_id: 5056
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WIN-TKC15D7KHUR
security:
user_id: S-1-5-19
event_data:
RuleId: '{731057A4-5875-4405-ACE3-4C0DD0043413}'
RuleName: WinDefend Outbound for TCP
ModifyingUser: S-1-5-18
ModifyingApplication: C:\Program Files\Windows Defender\MsMpEng.exe
message: ''
Sigma Rules
- A Rule Has Been Deleted From The Windows Firewall Exception List
Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2007 — A rule has been listed when the Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
Event ID 2008 — Windows Defender Firewall Group Policy settings have changed.
Message
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2008
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-05T23:50:01.847874+00:00'
event_record_id: 1250
correlation: {}
execution:
process_id: 2896
thread_id: 9248
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data: {}
message: ''
Sigma Rules
- Windows Firewall Settings Have Been Changed
Detects activity when the settings of the Windows firewall have been changed
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2009 — The Windows Defender Firewall service failed to load Group Policy.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Sigma Rules
- The Windows Defender Firewall Service Failed To Load Group Policy
Detects activity when The Windows Defender Firewall service failed to load Group Policy
Event ID 2010 — Network profile changed on an interface.
Message
Fields
| Name | Description |
|---|---|
InterfaceGuid | — |
InterfaceName | — |
OldProfile | — |
NewProfile | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2010
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T06:25:51.427999+00:00'
event_record_id: 719
correlation: {}
execution:
process_id: 3344
thread_id: 3844
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
InterfaceGuid: 8E4162AD-6500-4899-BA95-24051405E207
InterfaceName: ethernet_32769
OldProfile: 2147483649
NewProfile: 4
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2011 — Windows Defender Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.
Message
Fields
| Name | Description |
|---|---|
ReasonCode | — |
ApplicationPath | — |
IPVersion | — |
Protocol | — |
Port | — |
ProcessId | — |
ModifyingUser | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2011
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-07T08:12:17.921409+00:00'
event_record_id: 258
correlation: {}
execution:
process_id: 1928
thread_id: 2428
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WIN-FPV0DSIC9O6
security:
user_id: S-1-5-19
event_data:
ReasonCode: 64
ApplicationPath: C:\windows\system32\dns.exe
IPVersion: 1
Protocol: 17
Port: 53
ProcessId: 2208
ModifyingUser: S-1-5-18
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2012 — A connection security rule was added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2013 — A connection security rule was modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2014 — A connection security rule was deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2015 — A connection security rule was added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2016 — A main mode rule has been added in the IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2017 — A main mode rule has been modified in the IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2018 — A main mode rule has been deleted in the IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2019 — A main mode rule was added to the IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2020 — A phase 1 crypto set was added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2021 — A phase 1 crypto set was modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2022 — A phase 1 crypto set was deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2023 — A phase 1 crypto set was added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2024 — A phase 2 crypto set was added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2025 — A phase 2 crypto set was modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2026 — A phase 2 crypto set was deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2027 — A phase 2 crypto set was added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2028 — An authentication set has been added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2029 — An authentication set has been modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2030 — An authentication set has been deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
IPsecPhase | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2031 — An authentication set has been added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
Event ID 2032 — Windows Defender Firewall has been reset to its default configuration.
Message
Fields
| Name | Description |
|---|---|
ModifyingUser | — |
ModifyingApplication | — |
Sigma Rules
- Windows Defender Firewall Has Been Reset To Its Default Configuration
Detects activity when Windows Defender Firewall has been reset to its default configuration
Event ID 2033 — All rules have been deleted from the Windows Defender Firewall configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
Sigma Rules
- All Rules Have Been Deleted From The Windows Firewall Configuration
Detects when a all the rules have been deleted from the Windows Defender Firewall configuration
Event ID 2034 — All connection security rules have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2035 — All main mode rules have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2036 — All authentication sets have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
IPsecPhase | — |
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2037 — All crypto sets have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
IPsecPhase | — |
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2038 — Windows Defender Firewall did not apply the following rule because the rule was not properly configured on this computer: Rule Information: ID: %1 ...
Message
Fields
| Name | Description |
|---|---|
ID | — |
Name | — |
Reason | — |
RuleStatus | — |
Event ID 2039 — Http Proxies Changed Reason: %1 All Proxies: %2 All Domain Proxies: %3 Group Policy Configured Domain Proxies: %4 Group Policy Configured Local Pro...
Message
Fields
| Name | Description |
|---|---|
ChangeType | — |
All Proxies | — |
All Domain Proxies | — |
GP Configured Domain Proxies | — |
GP Configured Local Proxies | — |
All DA Nat64 Proxies | — |
GP Is Authoritative | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2039
version: 0
level: 4
task: 0
opcode: 0
keywords: 576460752303423504
time_created: '2023-11-05T23:50:01.858901+00:00'
event_record_id: 1
correlation: {}
execution:
process_id: 2896
thread_id: 9248
channel: Network Isolation Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
ChangeType: 0
All Proxies: '*'
All Domain Proxies: '*'
GP Configured Domain Proxies: '*'
GP Configured Local Proxies: '*'
All DA Nat64 Proxies: '*'
GP Is Authoritative: 0
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2040 — Corp Subnets Changed Reason: %1 All Domain Subnets: %2 Group Policy Configured Domain Subnets: %3 All DA Nat64 Domain Subnets: %4 Group Policy is a...
Message
Fields
| Name | Description |
|---|---|
ChangeType | — |
AllDomainProxies | — |
GPConfiguredDomainSubnets | — |
AllDANat64DomainSubnets | — |
GPIsAuthoritative | — |
Event ID 2041 — Capability Changed Reason: %1 Capability: %2 Profile: %3 IP Range Definition: %4.
Message
Fields
| Name | Description |
|---|---|
ChangeType | — |
Capability | — |
Profile | — |
IP Range Definition | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2041
version: 0
level: 4
task: 0
opcode: 0
keywords: 576460752303423504
time_created: '2023-11-05T23:50:49.936008+00:00'
event_record_id: 6
correlation: {}
execution:
process_id: 2896
thread_id: 3800
channel: Network Isolation Operational
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
ChangeType: 3
Capability: 0
Profile: 4
IP Range Definition: 0.0.0.0-255.255.255.255,::-ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2042 — Config Read Failed Config: %1 Error: %2.
Message
Fields
| Name | Description |
|---|---|
SettingType | — |
ErrorCode | — |
Event ID 2043 — The Windows Firewall Service failed to initialize a component.
Message
Fields
| Name | Description |
|---|---|
ComponentName | — |
ErrorCode | — |
Event ID 2044 — Added Dynamic Keyword Address.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Id | — |
Keyword | — |
Addresses | — |
AutoResolve | — |
Event ID 2045 — Deleted Dynamic Keyword Address.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Id | — |
Event ID 2046 — Updated Dynamic Keyword Address.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Id | — |
Append | — |
PreviousAddresses | — |
AddressesToUpdate | — |
UpdatedAddresses | — |
Event ID 2047 — Tenant Restrictions Policy Update.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
PreviousAddresses | — |
UpdatedAddresses | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2047
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2022-04-07T17:34:38.294357+00:00'
event_record_id: 292
correlation: {}
execution:
process_id: 1212
thread_id: 3732
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WIN-FPV0DSIC9O6.sigma.fr
security:
user_id: S-1-5-19
event_data:
ErrorCode: 0
PreviousAddresses: ''
UpdatedAddresses: ''
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2048 — Added Dynamic Keyword Address.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Id | — |
Keyword | — |
Addresses | — |
AutoResolve | — |
Event ID 2049 — Deleted Dynamic Keyword Address.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Id | — |
Event ID 2050 — Updated Dynamic Keyword Address.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Id | — |
Append | — |
PreviousAddresses | — |
AddressesToUpdate | — |
UpdatedAddresses | — |
Event ID 2051 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
PolicyChange | — |
Event ID 2051 —
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
PolicyChange | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2051
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T06:25:51.342732+00:00'
event_record_id: 717
correlation: {}
execution:
process_id: 3344
thread_id: 3768
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
ErrorCode: 0
PolicyChange: 0
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2052 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Sigma Rules
- A Rule Has Been Deleted From The Windows Firewall Exception List
Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall
Event ID 2052 —
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2052
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223374235878031360
time_created: '2023-11-06T01:42:34.475801+00:00'
event_record_id: 1314
correlation: {}
execution:
process_id: 2896
thread_id: 16976
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
RuleId: '{7F9A364D-0AAE-43ED-A6D1-8D400D83CF18}'
RuleName: WindowsAppRuntime.1.2
ModifyingUser: S-1-5-80-3088073201-1464728630-1879813800-1107566885-823218052
ModifyingApplication: C:\Windows\System32\svchost.exe
ErrorCode: 0
message: ''
Sigma Rules
- A Rule Has Been Deleted From The Windows Firewall Exception List
Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2053 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2053 — A connection security rule was deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2054 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2054 — A main mode rule has been deleted in the IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2055 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2055 — A phase 1 crypto set was deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2056 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2056 — A phase 2 crypto set was deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2057 —
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2057 — All connection security rules have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2058 —
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2058 — All main mode rules have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2059 —
Fields
| Name | Description |
|---|---|
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Sigma Rules
- All Rules Have Been Deleted From The Windows Firewall Configuration
Detects when a all the rules have been deleted from the Windows Defender Firewall configuration
Event ID 2059 —
Message
Fields
| Name | Description |
|---|---|
Store Type | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2059
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T06:25:51.342184+00:00'
event_record_id: 716
correlation: {}
execution:
process_id: 3344
thread_id: 3768
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
Store Type: 12
ModifyingUser: S-1-5-80-3088073201-1464728630-1879813800-1107566885-823218052
ModifyingApplication: C:\Windows\System32\svchost.exe
ErrorCode: 0
message: ''
Sigma Rules
- All Rules Have Been Deleted From The Windows Firewall Configuration
Detects when a all the rules have been deleted from the Windows Defender Firewall configuration
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2060 —
Fields
| Name | Description |
|---|---|
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Sigma Rules
- Windows Defender Firewall Has Been Reset To Its Default Configuration
Detects activity when Windows Defender Firewall has been reset to its default configuration
Event ID 2060 — Windows Defender Firewall has been reset to its default configuration.
Message
Fields
| Name | Description |
|---|---|
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Sigma Rules
- Windows Defender Firewall Has Been Reset To Its Default Configuration
Detects activity when Windows Defender Firewall has been reset to its default configuration
Event ID 2061 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2061 — A connection security rule was added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2062 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2062 — A connection security rule was modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2063 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2063 — A connection security rule was added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
Active | — |
Protocol | — |
Endpoint1Ports | — |
Endpoint2Ports | — |
LocalTunnelEndpointV4 | — |
LocalTunnelEndpointV6 | — |
RemoteTunnelEndpointV4 | — |
RemoteTunnelEndpointV6 | — |
Phase1AuthSetId | — |
Phase2AuthSetId | — |
Phase2CryptoSetId | — |
Action | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
MMParentRuleId | — |
EmbeddedContext | — |
Flags | — |
IsDTM | — |
ApplyAuthZ | — |
BypassTunnelIfEncrypted | — |
NoIPSecOnOutbound | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2064 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2064 — An authentication set has been added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2065 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2065 — An authentication set has been modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2066 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2066 — An authentication set has been added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
IPsecPhase | — |
EmbeddedContext | — |
Origin | — |
AuthSetFlags | — |
NumSuites | — |
SuitesBinaryLength | — |
AuthenticationSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2067 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
IPsecPhase | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2067 — An authentication set has been deleted from IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
IPsecPhase | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2068 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2068 — A main mode rule has been added in the IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2069 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2069 — A main mode rule has been modified in the IPsec settings.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2070 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2070 — A main mode rule was added to the IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Profiles | — |
Endpoint1 | — |
Endpoint2 | — |
Phase1AuthSetId | — |
Phase1CryptoSetId | — |
Flags | — |
Active | — |
EmbeddedContext | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2071 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
ErrorCode | — |
Sigma Rules
- Uncommon New Firewall Rule Added In Windows Firewall Exception List
Detects when a rule has been added to the Windows Firewall exception list - New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application
Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location. - New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule".
Event ID 2071 — A rule has been added to the Windows Defender Firewall exception list.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
ErrorCode | — |
Sigma Rules
- Uncommon New Firewall Rule Added In Windows Firewall Exception List
Detects when a rule has been added to the Windows Firewall exception list - New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application
Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location. - New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule".
Event ID 2072 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
ErrorCode | — |
Event ID 2072 — A rule has been listed when the Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
ErrorCode | — |
Event ID 2073 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
ErrorCode | — |
Event ID 2073 — A rule has been modified in the Windows Defender Firewall exception list.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
ErrorCode | — |
Event ID 2074 —
Fields
| Name | Description |
|---|---|
IPsecPhase | — |
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2074 — All authentication sets have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
IPsecPhase | — |
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2075 —
Fields
| Name | Description |
|---|---|
IPsecPhase | — |
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2075 — All crypto sets have been deleted from the IPsec configuration on this computer.
Message
Fields
| Name | Description |
|---|---|
IPsecPhase | — |
StoreType | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Event ID 2076 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2076 — A phase 1 crypto set was added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2077 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2077 — A phase 1 crypto set was modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2078 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2078 — A phase 1 crypto set was added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Flags | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
TimeOutMinutes | — |
TimeOutSessions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2079 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2079 — A phase 2 crypto set was added to IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2080 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2080 — A phase 2 crypto set was modified in IPsec settings.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2081 —
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2081 — A phase 2 crypto set was added to IPsec settings when Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
SetId | — |
SetName | — |
EmbeddedContext | — |
Origin | — |
CryptoSetFlags | — |
Pfs | — |
NumSuites | — |
SuitesBinaryLength | — |
CryptoSuites | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
ErrorCode | — |
Event ID 2082 —
Fields
| Name | Description |
|---|---|
Profiles | — |
SettingType | — |
SettingValueSize | — |
SettingValue | — |
SettingValueString | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Sigma Rules
- Windows Firewall Settings Have Been Changed
Detects activity when the settings of the Windows firewall have been changed
Event ID 2082 —
Message
Fields
| Name | Description |
|---|---|
Profiles | — |
SettingType | — |
SettingValueSize | — |
SettingValue | — |
SettingValueString | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2082
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T00:14:24.218884+00:00'
event_record_id: 1270
correlation: {}
execution:
process_id: 2896
thread_id: 8508
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
Profiles: 1
SettingType: 3
SettingValueSize: 4
SettingValue: '00000000'
SettingValueString: 'No'
Origin: 1
ModifyingUser: S-1-5-18
ModifyingApplication: C:\Program Files (x86)\Avira\Antivirus\ccuac.exe
ErrorCode: 0
message: ''
Sigma Rules
- Windows Firewall Settings Have Been Changed
Detects activity when the settings of the Windows firewall have been changed
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2083 —
Fields
| Name | Description |
|---|---|
SettingType | — |
SettingValueSize | — |
SettingValue | — |
SettingValueDisplay | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Sigma Rules
- Windows Firewall Settings Have Been Changed
Detects activity when the settings of the Windows firewall have been changed
Event ID 2083 —
Message
Fields
| Name | Description |
|---|---|
SettingType | — |
SettingValueSize | — |
SettingValue | — |
SettingValueDisplay | — |
Origin | — |
ModifyingUser | — |
ModifyingApplication | — |
ErrorCode | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2083
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-10-25T22:52:38.271525+00:00'
event_record_id: 650
correlation: {}
execution:
process_id: 2884
thread_id: 4496
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDevEval
security:
user_id: S-1-5-19
event_data:
SettingType: 2
SettingValueSize: 4
SettingValue: '06000000'
SettingValueDisplay: (null),(null)
Origin: 1
ModifyingUser: S-1-5-80-3088073201-1464728630-1879813800-1107566885-823218052
ModifyingApplication: ''
ErrorCode: 0
message: ''
Sigma Rules
- Windows Firewall Settings Have Been Changed
Detects activity when the settings of the Windows firewall have been changed
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2084 —
Fields
| Name | Description |
|---|---|
RuleName | — |
Event ID 2084 —
Message
Fields
| Name | Description |
|---|---|
RuleName | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2084
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223372036854775808
time_created: '2023-11-06T06:25:51.051278+00:00'
event_record_id: 715
correlation: {}
execution:
process_id: 3344
thread_id: 3768
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
RuleName: '@{Microsoft.WindowsTerminal_1.18.2822.0_x64__8wekyb3d8bbwe?ms-resource://Microsoft.WindowsTerminal/Resources/AppStoreName}'
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2085 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
ActivityGUID | — |
SwitchName | — |
PortName | — |
VMCreatorId | — |
InterfaceGUID | — |
PartitionGUID | — |
Constrained | — |
Event ID 2085 — Created Hyper-V Port.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
ActivityGUID | — |
SwitchName | — |
PortName | — |
VMCreatorId | — |
InterfaceGUID | — |
PartitionGUID | — |
Constrained | — |
Event ID 2086 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
ActivityGUID | — |
SwitchName | — |
PortName | — |
VMCreatorId | — |
InterfaceGUID | — |
PartitionGUID | — |
Constrained | — |
Event ID 2086 — Updated Hyper-V Port.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
ActivityGUID | — |
SwitchName | — |
PortName | — |
VMCreatorId | — |
InterfaceGUID | — |
PartitionGUID | — |
Constrained | — |
Event ID 2087 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
ActivityGUID | — |
SwitchName | — |
PortName | — |
Event ID 2087 — Deleted Hyper-V Port.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
ActivityGUID | — |
SwitchName | — |
PortName | — |
Event ID 2088 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
VMCreatorId | — |
VMConfig | — |
Value | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2088 — A Hyper-V Firewall VM Setting has changed.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
VMCreatorId | — |
VMConfig | — |
Value | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2089 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
VMCreatorId | — |
VMConfig | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2089 — A Hyper-V Firewall VM Setting has reset.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
VMCreatorId | — |
VMConfig | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2090 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
RuleID | — |
RuleName | — |
VMCreatorId | — |
Priority | — |
Direction | — |
Action | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
LocalAddresses | — |
RemoteAddresses | — |
Active | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2090 — A Hyper-V rule has been added.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
RuleID | — |
RuleName | — |
VMCreatorId | — |
Priority | — |
Direction | — |
Action | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
LocalAddresses | — |
RemoteAddresses | — |
Active | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2091 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
RuleID | — |
RuleName | — |
VMCreatorId | — |
Priority | — |
Direction | — |
Action | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
LocalAddresses | — |
RemoteAddresses | — |
Active | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2091 — A Hyper-V rule has been updated.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
RuleID | — |
RuleName | — |
VMCreatorId | — |
Priority | — |
Direction | — |
Action | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
LocalAddresses | — |
RemoteAddresses | — |
Active | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2092 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
RuleID | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2092 — A Hyper-V rule has been deleted.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
RuleID | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2093 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
SwitchName | — |
PortName | — |
Event ID 2093 — A error occured while initializing a Hyper-V port.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
SwitchName | — |
PortName | — |
Event ID 2094 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
RuleOperation | — |
RuleID | — |
StoreType | — |
Event ID 2094 — A error occured while processing a Hyper-V rule.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
RuleOperation | — |
RuleID | — |
StoreType | — |
Event ID 2095 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
VMCreatorId | — |
FriendlyName | — |
Event ID 2095 — A Hyper-V VM Creator has been registered with the firewall service.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
VMCreatorId | — |
FriendlyName | — |
Event ID 2096 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
VMCreatorId | — |
Event ID 2096 — A Hyper-V VM Creator has been unregistered with the firewall service.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
VMCreatorId | — |
Event ID 2097 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
PolicyAppId | — |
ErrorCode | — |
Sigma Rules
- Uncommon New Firewall Rule Added In Windows Firewall Exception List
Detects when a rule has been added to the Windows Firewall exception list - New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application
Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location. - New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule".
Event ID 2097 —
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
PolicyAppId | — |
ErrorCode | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2097
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223374235878031360
time_created: '2023-11-06T01:44:15.909142+00:00'
event_record_id: 1322
correlation: {}
execution:
process_id: 2896
thread_id: 22016
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
RuleId: '{F12880D2-1AF5-4F03-AB63-8FEB63B400D0}'
RuleName: Microsoft Teams
Origin: 1
ApplicationPath: C:\Program Files\WindowsApps\MicrosoftTeams_23275.702.2421.2406_x64__8wekyb3d8bbwe\msteams.exe
ServiceName: ''
Direction: 1
Protocol: 17
LocalPorts: '*'
RemotePorts: '*'
Action: 3
Profiles: 2147483647
LocalAddresses: '*'
RemoteAddresses: '*'
RemoteMachineAuthorizationList: ''
RemoteUserAuthorizationList: ''
EmbeddedContext: '{78E1CD88-49E3-476E-B926-580E596AD309}'
Flags: 1
Active: 1
EdgeTraversal: 0
LooseSourceMapped: 0
SecurityOptions: 0
ModifyingUser: S-1-5-18
ModifyingApplication: C:\Windows\System32\svchost.exe
SchemaVersion: 543
RuleStatus: 65536
LocalOnlyMapped: 0
PolicyAppId: ''
ErrorCode: 0
message: ''
Sigma Rules
- Uncommon New Firewall Rule Added In Windows Firewall Exception List
Detects when a rule has been added to the Windows Firewall exception list - New Firewall Rule Added In Windows Firewall Exception List For Potential Suspicious Application
Detects the addition of a new rule to the Windows Firewall exception list for an application located in a potentially suspicious location. - New Firewall Rule Added In Windows Firewall Exception List Via WmiPrvSE.EXE
Detects the addition of a new "Allow" firewall rule by the WMI process (WmiPrvSE.EXE). This can occur if an attacker leverages PowerShell cmdlets such as "New-NetFirewallRule", or directly uses WMI CIM classes such as "MSFT_NetFirewallRule".
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2098 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
PolicyAppId | — |
ErrorCode | — |
Event ID 2098 — A rule has been listed when the Windows Defender Firewall started.
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
PolicyAppId | — |
ErrorCode | — |
Event ID 2099 —
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
PolicyAppId | — |
ErrorCode | — |
Event ID 2099 —
Message
Fields
| Name | Description |
|---|---|
RuleId | — |
RuleName | — |
Origin | — |
ApplicationPath | — |
ServiceName | — |
Direction | — |
Protocol | — |
LocalPorts | — |
RemotePorts | — |
Action | — |
Profiles | — |
LocalAddresses | — |
RemoteAddresses | — |
RemoteMachineAuthorizationList | — |
RemoteUserAuthorizationList | — |
EmbeddedContext | — |
Flags | — |
Active | — |
EdgeTraversal | — |
LooseSourceMapped | — |
SecurityOptions | — |
ModifyingUser | — |
ModifyingApplication | — |
SchemaVersion | — |
RuleStatus | — |
LocalOnlyMapped | — |
PolicyAppId | — |
ErrorCode | — |
Example Event
system:
provider: Microsoft-Windows-Windows Firewall With Advanced Security
guid: D1BC9AFF-2ABF-4D71-9146-ECB2A986EB85
event_source_name: ''
event_id: 2099
version: 0
level: 4
task: 0
opcode: 0
keywords: 9223374235878031360
time_created: '2023-11-06T01:00:42.526564+00:00'
event_record_id: 1285
correlation: {}
execution:
process_id: 2896
thread_id: 18012
channel: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
computer: WinDev2310Eval
security:
user_id: S-1-5-19
event_data:
RuleId: '{C4847D55-2E11-4510-9513-51B82576049A}'
RuleName: Teamviewer Remote Control Service
Origin: 0
ApplicationPath: C:\Program Files\TeamViewer\TeamViewer_Service.exe
ServiceName: ''
Direction: 1
Protocol: 17
LocalPorts: '*'
RemotePorts: '*'
Action: 3
Profiles: 4
LocalAddresses: '*'
RemoteAddresses: '*'
RemoteMachineAuthorizationList: ''
RemoteUserAuthorizationList: ''
EmbeddedContext: ''
Flags: 1
Active: 1
EdgeTraversal: 0
LooseSourceMapped: 0
SecurityOptions: 0
ModifyingUser: S-1-5-21-1992711665-1655669231-58201500-1000
ModifyingApplication: C:\Users\User\AppData\Local\Temp\cdd35c3a-7c34-11ee-936c-000c293379ba\TeamViewer_.exe
SchemaVersion: 543
RuleStatus: 65536
LocalOnlyMapped: 0
PolicyAppId: ''
ErrorCode: 2
message: ''
References
- Example event sourced from https://github.com/NextronSystems/evtx-baseline
Event ID 2100 — A proxy is being used with Network Isolation, and is listed as a cloud resource.
Message
Fields
| Name | Description |
|---|---|
ProxyName | — |
Event ID 2101 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
ProfileType | — |
VMCreatorId | — |
ProfileConfig | — |
Value | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2101 — A Hyper-V Firewall Profile Setting has changed.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
ProfileType | — |
VMCreatorId | — |
ProfileConfig | — |
Value | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2102 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
ProfileType | — |
VMCreatorId | — |
ProfileConfig | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2102 — A Hyper-V Firewall Profile Setting has reset.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
StoreType | — |
ProfileType | — |
VMCreatorId | — |
ProfileConfig | — |
ModifyingUser | — |
ModifyingApplication | — |
Event ID 2103 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Event ID 2103 — A commit of an atomic transaction failed.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Event ID 2104 —
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2104 — The commit of an add operation in CSP failed.
Message
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2105 —
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2105 — The commit of an delete operation in CSP failed.
Message
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2106 —
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2106 — The commit of a set operation in CSP failed.
Message
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2107 —
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Event ID 2107 — A rollback of an atomic transaction completed.
Message
Fields
| Name | Description |
|---|---|
ErrorCode | — |
Event ID 2108 —
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2108 — The rollback of a delete operation completed.
Message
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2109 —
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2109 — The rollback of an add operation completed.
Message
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2110 —
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |
Event ID 2110 — The rollback of a set operation completed.
Message
Fields
| Name | Description |
|---|---|
RuleName | — |
ErrorCode | — |