Collection Priority Reference

965 events across 58 providers from 12 sources.

Download as JSON (965 events)

SourceEvents
Palantir Windows Event Forwarding73
NSA Event Forwarding Guidance105
Microsoft Defender for Endpoint19
Microsoft Appendix L: Events to Monitor352
Microsoft Windows Event Forwarding for Intrusion Detection47
ASD Priority Logs for SIEM Ingestion181
Olaf Hartong ATTACKdatamap124
Yamato Security EventLog Baseline Guide521
mdecrevoisier Windows Auditing Baseline36
JSCU-NL Logging Essentials199
ANSSI Guide to Microsoft Logging72
Splunk User Behavior Analytics102
Provider / ChannelIDTitleSources
AD-FS/Admin510More information for the event entry with Instance ID %1.ASD Recommended
AD-FS-Auditing/Security307ASD Recommended
AD-FS-Auditing/Security1200ASD Recommended
AD-FS-Auditing/Security1202ASD Recommended
Application Error/Application1000Faulting application name: %1, version: %2, time stamp: 0x%3 Faulting module name: %4, version: %5, time stamp: 0x%6 Exception code: 0x%7 Fault off...Microsoft-WEF, JSCU-NL Recommended
Application Hang/Application1002The program Widgets.Microsoft-WEF, JSCU-NL Recommended
Application-Error/Application1000Faulting application name: %1, version: %2, time stamp: 0x%3 Faulting module name: %4, version: %5, time stamp: 0x%6 Exception code: 0x%7 Fault off...ANSSI Recommended
Application-Hang/Application1002The program Widgets.ANSSI Recommended
ESENT/Application325ASD Recommended
ESENT/Application326ASD Recommended
ESENT/Application327ASD Recommended
LsaSrv/Operational300Groups assigned to a new logon.Microsoft-WEF, ANSSI Recommended
Application-Experience/Program-Inventory903A program was installed on the system.NSA Recommended
Application-Experience/Program-Inventory904A program was installed on the system.NSA Recommended
Application-Experience/Program-Inventory905A program was updated on the system.NSA Recommended
Application-Experience/Program-Inventory906A program was updated on the system.NSA Recommended
Application-Experience/Program-Inventory907A program was removed from the system.NSA Recommended
Application-Experience/Program-Inventory908A program was removed from the system.NSA Recommended
AppLocker/EXE and DLL8000AppID policy conversion failed.ASD, Olaf Hartong Recommended
AppLocker/EXE and DLL8001The AppLocker policy was applied successfully to this computer.ASD, Olaf Hartong Recommended
AppLocker/EXE and DLL8002%11 was allowed to run.NSA, Olaf Hartong, JSCU-NL Recommended
AppLocker/EXE and DLL8003%11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced.Palantir, Olaf Hartong, JSCU-NL Recommended
AppLocker/EXE and DLL8004%11 was prevented from running.Palantir, ASD, Olaf Hartong, JSCU-NL Recommended
AppLocker/MSI and Script8005%11 was allowed to run.NSA, Olaf Hartong, JSCU-NL Recommended
AppLocker/MSI and Script8006%11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced.NSA, Olaf Hartong, JSCU-NL Recommended
AppLocker/MSI and Script8007%11 was prevented from running.NSA, ASD, Olaf Hartong, JSCU-NL Recommended
AppLocker/EXE and DLL8008%2: AppLocker component not available on this SKU.ASD, Olaf Hartong Recommended
AppLocker/MSI and Script8009%2: AppLocker component not available on this SKU.Olaf Hartong Recommended
AppLocker/Operational8010Olaf Hartong Recommended
AppLocker/Operational8011Olaf Hartong Recommended
AppLocker/Operational8012Olaf Hartong Recommended
AppLocker/Operational8013Olaf Hartong Recommended
AppLocker/Operational8014Olaf Hartong Recommended
AppLocker/Operational8015Olaf Hartong Recommended
AppLocker/Operational8016Olaf Hartong Recommended
AppLocker/Operational8017Olaf Hartong Recommended
AppLocker/Operational8018Olaf Hartong Recommended
AppLocker/Operational8019Olaf Hartong Recommended
AppLocker/Packaged app-Execution8020%11 was allowed to run.NSA, Olaf Hartong, JSCU-NL Recommended
AppLocker/Packaged app-Execution8021%11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced.Olaf Hartong Recommended
AppLocker/Packaged app-Execution8022%11 was prevented from running.ASD, Olaf Hartong Recommended
AppLocker/Packaged app-Deployment8023%11 was allowed to be installed.NSA, Olaf Hartong, JSCU-NL Recommended
AppLocker/Packaged app-Deployment8024%11 was allowed to run but would have been prevented from running if the AppLocker policy were enforced.Olaf Hartong Recommended
AppLocker/Packaged app-Deployment8025%11 was prevented from running.ASD, Olaf Hartong Recommended
AppLocker/Packaged app-Deployment8026No packaged apps can be executed while Exe rules are being enforced and no Packaged app rules have been configured.Olaf Hartong Recommended
AppLocker/Packaged app-Execution8027No packaged apps can be executed while Exe rules are being enforced and no Packaged app rules have been configured.ASD, Olaf Hartong Recommended
AppLocker/MSI and Script8029%2 was prevented from running due to Config CI policy.ASD Recommended
AppLocker/EXE and DLL8032ManagedInstaller check FAILED during Appid verification of %2.ASD Recommended
AppLocker/MSI and Script8035ManagedInstaller Script check SUCCEEDED during Appid verification of %2.ASD Recommended
AppLocker/MSI and Script8036%2 was prevented from running due to Config CI policy.ASD Recommended
AppLocker/MSI and Script8040Package family name %2 version %3 was prevented from installing or updating due to Config CI policy (Name:%5 ID:%7 Version:%8 GUID:%9).ASD Recommended
Bits-Client/Operational1BITS job "%2" with ID %1 has been resumed.Yamato Security, JSCU-NL Recommended
Bits-Client/Operational2BITS job "%2" with ID %1 has been suspended.Yamato Security Recommended
Bits-Client/Operational3The BITS service created a new job.Yamato Security, JSCU-NL Recommended
Bits-Client/Operational4The transfer job is complete.Yamato Security, JSCU-NL Recommended
Bits-Client/Operational5Job cancelled.Yamato Security Recommended
Bits-Client/Operational6Command-line command set for job %1 with owner %2.Yamato Security Recommended
Bits-Client/Operational17BITS has read the policy parameters for peer-caching.Yamato Security Recommended
Bits-Client/Operational18The peer list rejected an incoming server announcement.Yamato Security Recommended
Bits-Client/Operational23An application cleared the peer list.Yamato Security Recommended
Bits-Client/Operational59BITS started the %2 transfer job that is associated with the %4 URL.Yamato Security, JSCU-NL Recommended
Bits-Client/Operational60BITS stopped transferring the %2 transfer job that is associated with the %4 URL.Yamato Security Recommended
Bits-Client/Operational61BITS stopped transferring the %2 transfer job that is associated with the %4 URL.Yamato Security Recommended
Bits-Client/Operational62The BITS job named "%1" belonging to user %2 received inconsistent data while downloading.Yamato Security Recommended
Bits-Client/Operational63The BITS job %1 is configured to launch %3 after transfer of %2.Yamato Security Recommended
Bits-Client/Operational64The BITS job %1 is configured to launch %3 after transfer of %2.Yamato Security Recommended
Bits-Client/Operational78BITS has encountered %1 error while reading the peer-cache information.Yamato Security Recommended
Bits-Client/Operational79BITS has successfully deleted the peer-cache.Yamato Security Recommended
Bits-Client/Operational80BITS has successfully enabled peer-client and/or peer-server related components.Yamato Security Recommended
Bits-Client/Operational81BITS has encountered %1 error while starting one or more peer-client or peer-server components.Yamato Security Recommended
Bits-Client/Operational201The BITS job named "%1" was unable to contact any HTTP proxy server in its proxy list.Yamato Security Recommended
Bits-Client/Operational202While transferring %1, BITS encountered error %7 using %6 as the HTTP proxy server.Yamato Security Recommended
Bits-Client/Operational203The BITS service provided job credentials in response to an authentication challenge from the %1 server for the %2 transfer job that is associated ...Yamato Security Recommended
Bits-Client/Operational204The BITS service provided job credentials in response to an authentication challenge from %1 for job %2, url %3.Yamato Security Recommended
Bits-Client/Operational206The URL "%2" in BITS job "%1" does not support the HTTP HEAD verb, which is required for BITS bandwidth throttling.Yamato Security Recommended
Bits-Client/Operational207The URL "%2" in BITS job "%1" does not support the HTTP Content-Length header, which is required for BITS bandwidth throttling.Yamato Security Recommended
Bits-Client/Operational208A flash-Crowd situation is detected for the URL "%2" in BITS job "%1".Yamato Security Recommended
Bits-Client/Operational209High performance property for BITS job "%1" with ID "%2" %3.Yamato Security Recommended
Bits-Client/Operational210The URL "%2" in BITS job "%1" does not support the HTTP Content-Range header, which is required for BITS bandwidth throttling.Yamato Security Recommended
Bits-Client/Operational211BITS job "%2" with ID "%1" encountered an error %3.Yamato Security Recommended
Bits-Client/Operational302The BITS service has started successfully, but it was delayed long enough that there may be a problem.Yamato Security Recommended
Bits-Client/Operational303The peer-cache client startup phase of startup has completed.Yamato Security Recommended
Bits-Client/Operational306The BITS service loaded the job list from disk.Yamato Security Recommended
Bits-Client/Operational307It took %1 seconds to write a change file to the BITS job list.Yamato Security Recommended
Bits-Client/Operational308The BITS service shut down successfully, but it was delayed for %1 seconds.Yamato Security Recommended
Bits-Client/Operational309The BITS peer cache was unable to find any peers in the network.Yamato Security Recommended
Bits-Client/Operational310The initialization of the peer helper modules failed with the following error.Yamato Security Recommended
Bits-Client/Operational311The BITS peer transfer with the %1 ID for the %2 transfer job resulted in the following error: %4.Yamato Security Recommended
Bits-Client/Operational312The Network List Manager Cost Interface is not available on this system.Yamato Security Recommended
Bits-Client/Operational313The Network List Manager Cost Interface is reporting no network connectivity.Yamato Security Recommended
Bits-Client/Operational16384The administrator %4 canceled job "%2" on behalf of %3.Yamato Security Recommended
Bits-Client/Operational16387The administrator %3 modified the %4 property of job "%2".Yamato Security Recommended
Bits-Client/Operational16388The administrator %4 took ownership of job "%2" from %3.Yamato Security Recommended
Bits-Client/Operational16389Job "%2" owned by %3 was canceled after being inactive for more than %4 days.Yamato Security Recommended
Bits-Client/Operational16391The BITS job list is not in a recognized format.Yamato Security Recommended
Bits-Client/Operational16394BITS Peer-caching protocolYamato Security Recommended
Bits-Client/Operational16395Web Services-Discovery protocolYamato Security Recommended
Bits-Client/Operational16403Yamato Security Recommended
CAPI2/Operational11For more details for this event, please refer to the "Details" sectionMicrosoft-WEF Recommended
CAPI2/Operational70For more details for this event, please refer to the "Details" sectionMicrosoft-WEF Recommended
CAPI2/Operational90For more details for this event, please refer to the "Details" sectionMicrosoft-WEF Recommended
CertificateServicesClient-Lifecycle-System/Operational1001A certificate has been replaced.NSA Recommended
CertificateServicesClient-Lifecycle-System/Operational1002A certificate has expired.NSA Recommended
CertificateServicesClient-Lifecycle-System/Operational1003A certificate is about to expire.NSA Recommended
CertificateServicesClient-Lifecycle-System/Operational1004A certificate has been deleted.NSA Recommended
CertificateServicesClient-Lifecycle-System/Operational1006A new certificate has been installed.NSA Recommended
CertificateServicesClient-Lifecycle-System/Operational1007A certificate has been exported.NSA Recommended
CertificationAuthority/Application95Security permissions are corrupted or missing.NSA Recommended
CodeIntegrity/Operational3001Code Integrity determined an unsigned kernel module %2 is loaded into the system.NSA, Yamato Security Recommended
CodeIntegrity/Operational3002Code Integrity is unable to verify the image integrity of the file %2 because the set of per-page image hashes could not be found on the system.NSA, Yamato Security Recommended
CodeIntegrity/Operational3003Code Integrity is unable to verify the image integrity of the file %2 because the set of per-page image hashes could not be found on the system.NSA, Yamato Security Recommended
CodeIntegrity/Operational3004Windows is unable to verify the image integrity of the file %2 because file hash could not be found on the system.NSA, Yamato Security Recommended
CodeIntegrity/Operational3005Code Integrity is unable to verify the image integrity of the file %2 because a file hash could not be found on the system.Yamato Security Recommended
CodeIntegrity/Operational3010Code Integrity was unable to load the %2 catalog.NSA, Yamato Security Recommended
CodeIntegrity/Operational3021Code Integrity determined a revoked kernel module %2 is loaded into the system.Yamato Security Recommended
CodeIntegrity/Operational3022Code Integrity determined a revoked kernel module %2 is loaded into the system.Yamato Security Recommended
CodeIntegrity/Operational3023The driver %2 is blocked from loading as the driver has been revoked by Microsoft.NSA, Yamato Security Recommended
CodeIntegrity/Operational3024Windows was unable to update the boot catalog cache file.Yamato Security Recommended
CodeIntegrity/Operational3026Code Integrity was unable to load the %2 catalog because the signing certificate for this catalog has been revoked.Yamato Security Recommended
CodeIntegrity/Operational3032Code Integrity determined a revoked image %2 is loaded into the system.Yamato Security Recommended
CodeIntegrity/Operational3033Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements.Palantir, ASD, Yamato Security Recommended
CodeIntegrity/Operational3034Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3035Code Integrity determined a revoked image %2 is loaded into the system.Yamato Security Recommended
CodeIntegrity/Operational3036Windows is unable to verify the integrity of the file %2 because the signing certificate has been revoked.Yamato Security Recommended
CodeIntegrity/Operational3037Code Integrity determined an unsigned image %2 is loaded into the system.Yamato Security Recommended
CodeIntegrity/Operational3050Code Integrity completed retrieval of file cache.Yamato Security Recommended
CodeIntegrity/Operational3051Code Integrity completed retrieval of file cache.Yamato Security Recommended
CodeIntegrity/Operational3052Code Integrity completed retrieval of file cache.Yamato Security Recommended
CodeIntegrity/Operational3057Code Integrity completed retrieval of file cache.Yamato Security Recommended
CodeIntegrity/Operational3058Code Integrity completed retrieval of file cache.Yamato Security Recommended
CodeIntegrity/Operational3063Code Integrity determined that a process (%4) attempted to load %2 that did not meet the security requirements for %5.ASD, Yamato Security Recommended
CodeIntegrity/Operational3065Code Integrity determined that a process (%4) attempted to load %2 that did not meet the security requirements for %5.Palantir, Yamato Security Recommended
CodeIntegrity/Operational3066Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3067Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3068Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3069Code Integrity was unable to load the weak crypto policy value from registry.Yamato Security Recommended
CodeIntegrity/Operational3070Code Integrity was unable to load the weak crypto policy from registry store.Yamato Security Recommended
CodeIntegrity/Operational3071Code Integrity was unable to load the weak crypto policies.Yamato Security Recommended
CodeIntegrity/Operational3072Code Integrity determined that the module %2 is not compatible with hypervisor enforcement due to it having non-page aligned sections.Yamato Security Recommended
CodeIntegrity/Operational3073Code Integrity determined that the module %2 is not compatible with strict mode hypervisor enforcement due to it having an executable section that ...Yamato Security Recommended
CodeIntegrity/Operational3074Code Integrity was unable to verify a page for a module verified using hypervisor enforcement.Yamato Security Recommended
CodeIntegrity/Operational3076Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3077Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...ASD, Yamato Security Recommended
CodeIntegrity/Operational3078Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3079Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3080Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3081Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3082Code Integrity determined kernel module %2 that did not meet the WHQL requirements is loaded into the system.Yamato Security Recommended
CodeIntegrity/Operational3083Code Integrity determined kernel module %2 that did not meet the WHQL requirements is loaded into the system.Yamato Security Recommended
CodeIntegrity/Operational3084Code Integrity will enable WHQL driver enforcement for this boot session.Yamato Security Recommended
CodeIntegrity/Operational3085Code Integrity will disable WHQL driver enforcement for this boot session.Yamato Security Recommended
CodeIntegrity/Operational3086Code Integrity determined that a process (%4) attempted to load %2 that did not meet the signing requirements for Isolated User Mode.Yamato Security Recommended
CodeIntegrity/Operational3087Code Integrity determined that the kernel module %2 is not compatible with hypervisor enforcement.Yamato Security Recommended
CodeIntegrity/Operational3089Signature information for another event.ASD, Yamato Security Recommended
CodeIntegrity/Operational3090Code Integrity testing module %2 against policy %11.Yamato Security Recommended
CodeIntegrity/Operational3091Code Integrity testing module %2 against policy %11.Yamato Security Recommended
CodeIntegrity/Operational3092Code Integrity testing module %2 against policy %11.Yamato Security Recommended
CodeIntegrity/Operational3093other (see event data)Yamato Security Recommended
CodeIntegrity/Operational3094other (see event data)Yamato Security Recommended
CodeIntegrity/Operational3095Code Integrity policy %5 %2 is set to unrefreshable.Yamato Security Recommended
CodeIntegrity/Operational3096No change in active Code Integrity policy %5 %2 after refresh.Yamato Security Recommended
CodeIntegrity/Operational3097Not allowed to refresh Code Integrity policy %5 %2.Yamato Security Recommended
CodeIntegrity/Operational3098other (see event data)Yamato Security Recommended
CodeIntegrity/Operational3099Refreshed and activated Code Integrity policy %5 %2.Yamato Security Recommended
CodeIntegrity/Operational3100Refreshed but not activated Code Integrity policy %5 %2.Yamato Security Recommended
CodeIntegrity/Operational3101Code Integrity policy refresh started for %1 policies.Yamato Security Recommended
CodeIntegrity/Operational3102Code Integrity policy refresh finished for %1 policies.Yamato Security Recommended
CodeIntegrity/Operational3103Ignoring refresh for Code Integrity policy ID %1.Yamato Security Recommended
CodeIntegrity/Operational3104Windows blocked file %2 which has been disallowed for protected processes.Yamato Security Recommended
CodeIntegrity/Operational3105Trying to refresh Code Integrity policy with policy ID %1.Yamato Security Recommended
CodeIntegrity/Operational3108Code Integrity successfully switched from %3 mode to %4 mode.Yamato Security Recommended
CodeIntegrity/Operational3109Code Integrity already switched from %3 mode to %4 mode.Yamato Security Recommended
CodeIntegrity/Operational3110Code Integrity failed to switch from %3 mode to %4 mode with error code %5.Yamato Security Recommended
CodeIntegrity/Operational3111Code Integrity determined that a process (%6) attempted to load %2 that is not compatible with hypervisor enforcement.Yamato Security Recommended
CodeIntegrity/Operational3112Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements or violated code integrity p...Yamato Security Recommended
CodeIntegrity/Operational3113Code Integrity could not update the driver.Yamato Security Recommended
CodeIntegrity/Operational3114Code Integrity determined that %4 is trying to load %2 which failed the dynamic code trust verification with error code of %5.Yamato Security Recommended
CodeIntegrity/Operational3115Code Integrity determined that %4 is trying to load %2 which failed the dynamic code trust verification with error code of %5.Yamato Security Recommended
CodeIntegrity/Operational3116Signature information for Code Integrity policy ID %1.Yamato Security Recommended
CodeIntegrity/Operational3117Code Integrity determined that a process (%4) attempted to load %2 that violated code integrity policy (Policy ID:%31).Yamato Security Recommended
CodeIntegrity/Operational3118Smart App Control Block DeteailsYamato Security Recommended
Dhcp-Client/Operational50028Address %1 is plumbed on the interface %2.JSCU-NL Recommended
DHCPv6-Client/Operational51039Address %1 is plumbed on the interface %2.JSCU-NL Recommended
DNS-Client/Operational3008DNS query is completed for the name %1, type %2, query options %3 with status %4 Results %5.Microsoft-WEF, JSCU-NL Recommended
DNS-Client/Operational3020Query response for name %1, type %2, interface index %3 and network index %4 returned %5 with results %6.NSA Recommended
DNS-Server-Service/DNS Server6001The DNS server successfully completed transfer of version %1 of zone %2 to the DNS server at %3.ASD Recommended
DNSServer/Analytical256QUERY_RECEIVED: TCP=.NSA Recommended
DNSServer/Analytical257RESPONSE_SUCCESS: TCP=.NSA, ASD Recommended
DNSServer/Analytical258RESPONSE_FAILURE: TCP=.ASD Recommended
DNSServer/Analytical259IGNORED_QUERY: TCP=.ASD Recommended
DNSServer/Analytical260RECURSE_QUERY_OUT: TCP=.ASD Recommended
DNSServer/Analytical261RECURSE_RESPONSE_IN: TCP=.ASD Recommended
DNSServer/Analytical262RECURSE_QUERY_TIMEOUT: TCP=.ASD Recommended
DNSServer/Analytical263DYN_UPDATE_RECV: TCP=.ASD Recommended
DNSServer/Analytical264DYN_UPDATE_RESPONSE: TCP=.ASD Recommended
DNSServer/Analytical277DYN_UPDATE_FORWARD: TCP=.ASD Recommended
DNSServer/Analytical278DYN_UPDATE_RESPONSE_IN: TCP=.ASD Recommended
DriverFrameworks-UserMode/Operational2003The UMDF Host Process (%1) has been asked to load drivers for device %2.ANSSI Recommended
DriverFrameworks-UserMode/Operational2004The UMDF Host is loading driver %4 at level %3 for device %2.Microsoft-WEF, ANSSI Recommended
DriverFrameworks-UserMode/Operational2006The UMDF Host successfully loaded the driver at level %3.ANSSI Recommended
DriverFrameworks-UserMode/Operational2010The UMDF Host Process (%1) has successfully loaded drivers for device %2.ANSSI Recommended
DriverFrameworks-UserMode/Operational2100Received a Pnp or Power operation (%3, %4) for device %2.ANSSI Recommended
DriverFrameworks-UserMode/Operational2101Completed a Pnp or Power operation (%3, %4) for device %2 with status %9.ANSSI Recommended
DriverFrameworks-UserMode/Operational2105Forwarded a Pnp or Power operation (%3, %4) for device %2 to the lower driver with status %9.ANSSI Recommended
DriverFrameworks-UserMode/Operational2106Received a Pnp or Power operation (%3, %4) for device %2 which was completed by the lower drivers with status %9.ANSSI Recommended
Eventlog/System104The System log file was cleared.Microsoft-WEF, JSCU-NL, ANSSI Recommended
Eventlog/Security1100The event logging service has shut down.JSCU-NL Recommended
Eventlog/Security1102The audit log was cleared.Microsoft-AppendixL High
ASD, Olaf Hartong, JSCU-NL, ANSSI, Splunk-UBA Recommended
Eventlog/Security1104The security log is now full.Palantir Recommended
FilterManager/System6File System Filter 'FileInfo' (6.1, 1.247502111e+09) has successfully loaded and registered with Filter Manager.NSA Recommended
GroupPolicy/System1125The processing of Group Policy failed because of an internal system error.NSA Recommended
GroupPolicy/System1126Windows was unable to determine whether new Group Policy settings defined by a network administrator should be enforced for this user or computer b...NSA Recommended
GroupPolicy/System1129The processing of Group Policy failed because of lack of network connectivity to a domain controller.NSA Recommended
Kernel-General/System1The system time has changed to %1 from %2.NSA Recommended
Kernel-General/System12The operating system started at system time 1.3825413334687505e+09.Microsoft-WEF, JSCU-NL, ANSSI Recommended
Kernel-General/System13The operating system is shutting down at system time StopTime.Microsoft-WEF, JSCU-NL Recommended
Kernel-PnP/System219The driver %5 failed to load.NSA Recommended
Kernel-PnP/Configuration400Device %1 was configured.NSA Recommended
Kernel-PnP/Configuration410Device %1 was started.NSA Recommended
Kernel-Power/System41The last sleep transition was unsuccessful.JSCU-NL Recommended
NetworkProfile/Operational10000Network Connected Name: %1 Desc: %2 Type: %4 State: %5 Category: %6.NSA Recommended
NetworkProfile/Operational10001Network Disconnected Name: %1 Desc: %2 Type: %4 State: %5 Category: %6.NSA Recommended
NTLM/Operational4001NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.Yamato Security Recommended
NTLM/Operational4002NTLM server blocked: Incoming NTLM traffic to servers that is blocked Calling process PID: %1 Calling process name: %2 Calling process LUID: %3 Cal...Yamato Security Recommended
NTLM/Operational4003NTLM server blocked in the domain: NTLM authentication in this domain that is blocked User: %1 Domain: %2 Workstation: %3 PID: %4 Process: %5 Logon...Yamato Security Recommended
NTLM/Operational4010NTLM Minimum Client Security Block: Calling process PID: %1 Calling Process Name: %2 Negotiated Security Flags: %3 Minimum Security Flags: %4.Yamato Security Recommended
NTLM/Operational4011NTLM Minimum Server Security Block: Calling process PID: %1 Calling Process Name: %2 Negotiated Security Flags: %3 Minimum Security Flags: %4.Yamato Security Recommended
NTLM/Operational4012NTLM client used the domain password.Yamato Security Recommended
NTLM/Operational4013Attempt to use NTLMv1 failed.Yamato Security Recommended
NTLM/Operational4014Attempt to get credential key by call package blocked by Credential Guard.Yamato Security Recommended
NTLM/Operational4015NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.Yamato Security Recommended
NTLM/Operational4020This machine attempted to authenticate to a remote resource via NTLM.Yamato Security Recommended
NTLM/Operational4021This machine attempted to authenticate to a remote resource via NTLM.Yamato Security Recommended
NTLM/Operational4022A remote client is using NTLM to authenticate to this workstation.Yamato Security Recommended
NTLM/Operational4023A remote client is using NTLM to authenticate to this workstation.Yamato Security Recommended
NTLM/Operational4024Auditing an attempt to use NTLMv1-derived credentials for Single Sign-On.Yamato Security Recommended
NTLM/Operational4025An attempt to use NTLMv1-derived credentials for Single Sign-On was blocked due to policy.Yamato Security Recommended
NTLM/Operational8001NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked.Palantir, Yamato Security Recommended
NTLM/Operational8002NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked Calling process PID: %1 Calling process name: %2 Calling process LUID:...Palantir, Yamato Security Recommended
NTLM/Operational8003NTLM server blocked in the domain audit: Audit NTLM authentication in this domain User: %1 Domain: %2 Workstation: %3 PID: %4 Process: %5 Logon typ...Palantir, Yamato Security Recommended
PowerShell/Operational4097Computer Name $null or.Yamato Security Recommended
PowerShell/Operational4098Resolving to default scheme httpYamato Security Recommended
PowerShell/Operational4099Remote shell name resolved to default Microsoft.Yamato Security Recommended
PowerShell/Operational4100%3 Context: %1 User Data: %2.Olaf Hartong, Yamato Security Recommended
PowerShell/Operational4101%3 Context: %1 User Data: %2.Olaf Hartong, Yamato Security Recommended
PowerShell/Operational4102%3 Context: %1 User Data: %2.Olaf Hartong, Yamato Security Recommended
PowerShell/Operational4103%3 Context: %1 User Data: %2.ASD, Olaf Hartong, Yamato Security, ANSSI Recommended
Splunk-UBA Low
PowerShell/Operational4104Creating Scriptblock text (%1 of %2): %3 ScriptBlock ID: %4 Path: %5.ASD, Olaf Hartong, Yamato Security, JSCU-NL, ANSSI Recommended
Splunk-UBA Low
PowerShell/Operational4105Started invocation of ScriptBlock ID: %1 Runspace ID: %2.Microsoft-WEF, Yamato Security, ANSSI Recommended
PowerShell/Operational4106Completed invocation of ScriptBlock ID: %1 Runspace ID: %2.Microsoft-WEF, Yamato Security, ANSSI Recommended
PowerShell/Operational8193Creating Runspace object Instance Id.Yamato Security Recommended
PowerShell/Operational8194Creating RunspacePool object InstanceId %1 MinRunspaces %2 MaxRunspaces %3.Yamato Security Recommended
PowerShell/Operational8195Opening RunspacePoolYamato Security Recommended
PowerShell/Operational8196Modifying activity Id and correlatingYamato Security Recommended
PowerShell/Operational8197Runspace state changed to %1.Yamato Security Recommended
PowerShell/Operational8198Attempting session creation retry %1 for error code %2 on session Id %3.Yamato Security Recommended
PowerShell/Operational12039Modifying activity Id and correlatingYamato Security Recommended
PowerShell/Operational24577Windows PowerShell ISE has started to run script file %1.Yamato Security Recommended
PowerShell/Operational24578Windows PowerShell ISE has started to run a user-selected script from file %1.Yamato Security Recommended
PowerShell/Operational24579Windows PowerShell ISE is stopping the current command.Yamato Security Recommended
PowerShell/Operational24580Windows PowerShell ISE is resuming the debugger.Yamato Security Recommended
PowerShell/Operational24581Windows PowerShell ISE is stopping the debugger.Yamato Security Recommended
PowerShell/Operational24582Windows PowerShell ISE is stepping into debugging.Yamato Security Recommended
PowerShell/Operational24583Windows PowerShell ISE is stepping over debugging.Yamato Security Recommended
PowerShell/Operational24584Windows PowerShell ISE is stepping out of debugging.Yamato Security Recommended
PowerShell/Operational24592Windows PowerShell ISE is enabling all breakpoints.Yamato Security Recommended
PowerShell/Operational24593Windows PowerShell ISE is disabling all breakpoints.Yamato Security Recommended
PowerShell/Operational24594Windows PowerShell ISE is removing all breakpoints.Yamato Security Recommended
PowerShell/Operational24595Windows PowerShell ISE is setting the breakpoint at line #: %1 of file %2.Yamato Security Recommended
PowerShell/Operational24596Windows PowerShell ISE is removing the breakpoint on line #: %1 of file %2.Yamato Security Recommended
PowerShell/Operational24597Windows PowerShell ISE is enabling the breakpoint on line #: %1 of file %2.Yamato Security Recommended
PowerShell/Operational24598Windows PowerShell ISE is disabling the breakpoint on line #: %1 of file %2.Yamato Security Recommended
PowerShell/Operational24599Windows PowerShell ISE has hit a breakpoint on line #: %1 of file %2.Yamato Security Recommended
PowerShell/Operational32777An unhandled exception occurred in the appdomain.Yamato Security Recommended
PowerShell/Operational32784Runspace Id: %1 Pipeline Id: %2.Yamato Security Recommended
PowerShell/Operational40961PowerShell console is starting upYamato Security Recommended
PowerShell/Operational40962PowerShell console is ready for user inputYamato Security Recommended
PowerShell/Operational46358Persistence store has reached its maximum specified sizeYamato Security Recommended
PowerShell/Operational53249Scheduled Job %1 started at %2.Yamato Security Recommended
PowerShell/Operational53250Scheduled Job %1 completed at %2 with state %3.Yamato Security Recommended
PowerShell/Operational53251Scheduled Job Exception %1: Message: %2 StackTrace: %3 InnerException: %4.Yamato Security Recommended
PowerShell/Operational53504Windows PowerShell has started an IPC listening thread on process: %1 in AppDomain: %2.Yamato Security Recommended
PowerShell/Operational53505Windows PowerShell has ended an IPC listening thread on process: %1 in AppDomain: %2.Yamato Security Recommended
PowerShell/Operational53506An error has occurred in Windows PowerShell IPC listening thread on process: %1 in AppDomain: %2.Yamato Security Recommended
PowerShell/Operational53507Windows PowerShell IPC connect on process: %1 in AppDomain: %2 for User: %3.Yamato Security Recommended
PowerShell/Operational53508Windows PowerShell IPC disconnect on process: %1 in AppDomain: %2 for User: %3.Yamato Security Recommended
PrintService/Operational307Document %1, %2 owned by %3 on %4 was printed on %5 through port %6.NSA Recommended
Security-Auditing1100ANSSI Recommended
Security-Auditing/Security4608Windows is starting up.Yamato Security, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4609Windows is shutting down.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4610An authentication package has been loaded by the Local Security Authority.ASD, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4611A trusted logon process has been registered with the Local Security Authority.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4612Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4614A notification package has been loaded by the Security Account Manager.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4615Invalid use of LPC port.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4616The system time was changed.Microsoft-WEF, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4618A monitored security event pattern has occurred.Microsoft-AppendixL High
ASD, Yamato Security Recommended
Splunk-UBA Low
Security-Auditing/Security4621Administrator recovered system from CrashOnAuditFail.Microsoft-AppendixL Medium
ASD, Yamato Security Recommended
Security-Auditing/Security4622A security package has been loaded by the Local Security Authority.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4624An account was successfully logged on.Splunk-UBA High
Palantir, ASD, Olaf Hartong, Yamato Security, mdecrevoisier, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4625An account failed to log on.Splunk-UBA High
Palantir, ASD, Olaf Hartong, Yamato Security, mdecrevoisier, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4626User / Device claims information.Palantir Recommended
Security-Auditing/Security4627Group membership information.ASD, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4634An account was logged off.Splunk-UBA High
Palantir, ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4646%1Microsoft-AppendixL Low
Security-Auditing/Security4647User initiated logoff.Palantir, ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4648A logon was attempted using explicit credentials.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4649A replay attack was detected.Microsoft-AppendixL High
Palantir, ASD, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4650An IPsec main mode security association was established.Microsoft-AppendixL Low
Security-Auditing/Security4651An IPsec main mode security association was established.Microsoft-AppendixL Low
Security-Auditing/Security4652An IPsec main mode negotiation failed.Microsoft-AppendixL Low
Security-Auditing/Security4653An IPsec main mode negotiation failed.Microsoft-AppendixL Low
Security-Auditing/Security4654An IPsec quick mode negotiation failed.Microsoft-AppendixL Low
Security-Auditing/Security4655An IPsec main mode security association ended.Microsoft-AppendixL Low
Security-Auditing/Security4656A handle to an object was requested.Palantir, ASD, Yamato Security, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4657A registry value was modified.Microsoft-WEF, Olaf Hartong, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4658The handle to an object was closed.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4659A handle to an object was requested with intent to delete.Microsoft-AppendixL Low
Security-Auditing/Security4660An object was deleted.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4661A handle to an object was requested.ASD, Yamato Security, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4662An operation was performed on an object.ASD, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4663An attempt was made to access an object.Palantir, ASD, Olaf Hartong, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4664An attempt was made to create a hard link.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4665An attempt was made to create an application client context.Microsoft-AppendixL Low
Security-Auditing/Security4666An application attempted an operation: Subject: Client Name: %5 Client Domain: %6 Client Context ID: %7 Object: Object Name: %3 Scope Names: %4 App...Microsoft-AppendixL Low
Security-Auditing/Security4667An application client context was deleted.Microsoft-AppendixL Low
Security-Auditing/Security4668An application was initialized.Microsoft-AppendixL Low
Security-Auditing/Security4670Permissions on an object were changed.ASD, Yamato Security, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4671An application attempted to access a blocked ordinal through the TBS.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4672Special privileges assigned to new logon.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4673A privileged service was called.Palantir, ASD, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4674An operation was attempted on a privileged object.Palantir, ASD, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4675SIDs were filtered.Microsoft-AppendixL Medium
Palantir, ASD, Yamato Security Recommended
Security-Auditing/Security4688A new process has been created.ASD, Olaf Hartong, Yamato Security, mdecrevoisier, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4689A process has exited.Palantir, ASD, Olaf Hartong, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4690An attempt was made to duplicate a handle to an object.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4691Indirect access to an object was requested.ASD, Yamato Security, mdecrevoisier Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4692Backup of data protection master key was attempted.Microsoft-AppendixL Medium
Splunk-UBA Low
Security-Auditing/Security4693Recovery of data protection master key was attempted.Microsoft-AppendixL Medium
Splunk-UBA Low
Security-Auditing/Security4694Protection of auditable protected data was attempted.ASD Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4695Unprotection of auditable protected data was attempted.ASD Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4696A primary token was assigned to process.ASD, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4697A service was installed in the system.Palantir, ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4698A scheduled task was created.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4699A scheduled task was deleted.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4700A scheduled task was enabled.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4701A scheduled task was disabled.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4702A scheduled task was updated.ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4703A user right was adjusted.ASD, mdecrevoisier Recommended
Security-Auditing/Security4704A user right was assigned.NSA, ASD Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4705A user right was removed.ASD Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4706A new trust was created to a domain.Microsoft-AppendixL Medium
NSA, ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4707A trust to a domain was removed.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4709The IPsec Policy Agent service was started.Microsoft-AppendixL Low
Security-Auditing/Security4710The IPsec Policy Agent service was disabled.Microsoft-AppendixL Low
Security-Auditing/Security4711%1Microsoft-AppendixL Low
Security-Auditing/Security4712IPsec Policy Agent encountered a potentially serious failure.Microsoft-AppendixL Low
Security-Auditing/Security4713Kerberos policy was changed.Microsoft-AppendixL Medium
NSA, ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4714Data Recovery Agent group policy for Encrypting File System (EFS) has changed.Microsoft-AppendixL Medium
NSA Recommended
Security-Auditing/Security4715The audit policy (SACL) on an object was changed.Microsoft-AppendixL Medium
Yamato Security, mdecrevoisier, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4716Trusted domain information was modified.Microsoft-AppendixL Medium
NSA, ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4717System security access was granted to an account.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4718System security access was removed from an account.ASD, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4719System audit policy was changed.Microsoft-AppendixL High
ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4720A user account was created.Palantir, ASD, Yamato Security, mdecrevoisier, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4722A user account was enabled.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4723An attempt was made to change an account's password.Palantir, ASD, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4724An attempt was made to reset an account's password.Microsoft-AppendixL Medium
Palantir, ASD, Olaf Hartong, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4725A user account was disabled.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4726A user account was deleted.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4727A security-enabled global group was created.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4728A member was added to a security-enabled global group.Palantir, ASD, Olaf Hartong, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4729A member was removed from a security-enabled global group.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4730A security-enabled global group was deleted.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4731A security-enabled local group was created.NSA, ASD, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4732A member was added to a security-enabled local group.Palantir, ASD, Olaf Hartong, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4733A member was removed from a security-enabled local group.Microsoft-WEF, ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4734A security-enabled local group was deleted.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4735A security-enabled local group was changed.Microsoft-AppendixL Medium
NSA, ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4737A security-enabled global group was changed.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4738A user account was changed.ASD, Olaf Hartong, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4739Domain Policy was changed.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4740A user account was locked out.Splunk-UBA High
Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4741A computer account was created.ASD, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4742A computer account was changed.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4743A computer account was deleted.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4744A security-disabled local group was created.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4745A security-disabled local group was changed.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4746A member was added to a security-disabled local group.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4747A member was removed from a security-disabled local group.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4748A security-disabled local group was deleted.Microsoft-AppendixL Low
Security-Auditing/Security4749A security-disabled global group was created.Microsoft-AppendixL Low
Security-Auditing/Security4750A security-disabled global group was changed.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4751A member was added to a security-disabled global group.Microsoft-AppendixL Low
Security-Auditing/Security4752A member was removed from a security-disabled global group.Microsoft-AppendixL Low
Security-Auditing/Security4753A security-disabled global group was deleted.Microsoft-AppendixL Low
Security-Auditing/Security4754A security-enabled universal group was created.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4755A security-enabled universal group was changed.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4756A member was added to a security-enabled universal group.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4757A member was removed from a security-enabled universal group.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4758A security-enabled universal group was deleted.ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4759A security-disabled universal group was created.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4760A security-disabled universal group was changed.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4761A member was added to a security-disabled universal group.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4762A member was removed from a security-disabled universal group.Microsoft-AppendixL Low
Security-Auditing/Security4763A security-disabled universal group was deleted.Splunk-UBA Low
Security-Auditing/Security4764A group’s type was changed.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4765SID History was added to an account.Microsoft-AppendixL High
ASD, Yamato Security Recommended
Security-Auditing/Security4766An attempt to add SID History to an account failed.Microsoft-AppendixL High
ASD, Yamato Security Recommended
Security-Auditing/Security4767A user account was unlocked.NSA, ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4768A Kerberos authentication ticket (TGT) was requested.Splunk-UBA High
Palantir, ASD, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4769A Kerberos service ticket was requested.Splunk-UBA High
Palantir, ASD, Olaf Hartong, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4770A Kerberos service ticket was renewed.ASD, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4771Kerberos pre-authentication failed.Palantir, ASD, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4772A Kerberos authentication ticket request failed.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4773A Kerberos service ticket request failed.Yamato Security Recommended
Security-Auditing/Security4774An account was mapped for logon.Palantir, Yamato Security, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4775An account could not be mapped for logon.Palantir, Yamato Security, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4776The domain controller attempted to validate the credentials for an account.Splunk-UBA High
Palantir, ASD, Yamato Security, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4777The domain controller failed to validate the credentials for an account.Palantir, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4778A session was reconnected to a Window Station.Palantir, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4779A session was disconnected from a Window Station.Palantir, ASD, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4780The ACL was set on accounts which are members of administrators groups.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4781The name of an account was changed.NSA, ASD, Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4782The password hash an account was accessed.NSA, mdecrevoisier, JSCU-NL Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4783A basic application group was created.Microsoft-AppendixL Low
Security-Auditing/Security4784A basic application group was changed.Microsoft-AppendixL Low
Security-Auditing/Security4785A member was added to a basic application group.Microsoft-AppendixL Low
Security-Auditing/Security4786A member was removed from a basic application group.Microsoft-AppendixL Low
Security-Auditing/Security4787A non-member was added to a basic application group.Microsoft-AppendixL Low
Security-Auditing/Security4788A non-member was removed from a basic application group.Microsoft-AppendixL Low
Security-Auditing/Security4789A basic application group was deleted.Microsoft-AppendixL Low
Security-Auditing/Security4790An LDAP query group was created.Microsoft-AppendixL Low
Security-Auditing/Security4793The Password Policy Checking API was called.NSA Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4794An attempt was made to set the Directory Services Restore Mode administrator password.Microsoft-AppendixL High
ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4797An attempt was made to query the existence of a blank password for an account.Yamato Security Recommended
Splunk-UBA Low
Security-Auditing/Security4798A user's local group membership was enumerated.Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4799A security-enabled local group membership was enumerated.Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4800The workstation was locked.Palantir, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4801The workstation was unlocked.Palantir, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4802The screen saver was invoked.Palantir, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4803The screen saver was dismissed.Palantir, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4816RPC detected an integrity violation while decrypting an incoming message.Microsoft-AppendixL Medium
Yamato Security Recommended
Security-Auditing/Security4817Auditing settings on object were changed.Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4820A Kerberos Ticket-granting-ticket (TGT) was denied because the device does not meet the access control restrictions.ASD Recommended
Splunk-UBA Low
Security-Auditing/Security4821A Kerberos service ticket was denied because the user, device, or both does not meet the access control restrictions.ASD Recommended
Security-Auditing/Security4822NTLM authentication failed because the account was a member of the Protected User group.ASD Recommended
Security-Auditing/Security4824Kerberos preauthentication by using DES or RC4 failed because the account was a member of the Protected User group.ASD Recommended
Security-Auditing/Security4825A user was denied the access to Remote Desktop.Yamato Security, mdecrevoisier Recommended
Security-Auditing/Security4826Boot Configuration Data loaded.JSCU-NL Recommended
Security-Auditing/Security4864A namespace collision was detected.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4865A trusted forest information entry was added.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4866A trusted forest information entry was removed.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4867A trusted forest information entry was modified.Microsoft-AppendixL Medium
ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4868The certificate manager denied a pending certificate request.Microsoft-AppendixL Medium
Yamato Security, mdecrevoisier Recommended
Security-Auditing/Security4869Certificate Services received a resubmitted certificate request.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4870Certificate Services revoked a certificate.Microsoft-AppendixL Medium
NSA, Yamato Security Recommended
Security-Auditing/Security4871Certificate Services received a request to publish the certificate revocation list (CRL).Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4872Certificate Services published the certificate revocation list (CRL).Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4873A certificate request extension changed.NSA, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4874One or more certificate request attributes changed.NSA, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4875Certificate Services received a request to shut down.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4876Certificate Services backup started.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4877Certificate Services backup completed.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4878Certificate Services restore started.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4879Certificate Services restore completed.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4880Certificate Services started.Microsoft-WEF, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4881Certificate Services stopped.Microsoft-WEF, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4882The security permissions for Certificate Services changed.Microsoft-AppendixL Medium
NSA, Yamato Security Recommended
Security-Auditing/Security4883Certificate Services retrieved an archived key.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4884Certificate Services imported a certificate into its database.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4885The audit filter for Certificate Services changed.Microsoft-AppendixL Medium
NSA, Yamato Security Recommended
Security-Auditing/Security4886Certificate Services received a certificate request.Microsoft-WEF, ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4887Certificate Services approved a certificate request and issued a certificate.Microsoft-WEF, ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4888Certificate Services denied a certificate request.Microsoft-WEF, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4889Certificate Services set the status of a certificate request to pending.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4890The certificate manager settings for Certificate Services changed.Microsoft-AppendixL Medium
NSA, Yamato Security Recommended
Security-Auditing/Security4891A configuration entry changed in Certificate Services.NSA, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4892A property of Certificate Services changed.Microsoft-AppendixL Medium
NSA, Yamato Security Recommended
Security-Auditing/Security4893Certificate Services archived a key.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4894Certificate Services imported and archived a key.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4895Certificate Services published the CA certificate to Active Directory Domain Services.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4896One or more rows have been deleted from the certificate database.Microsoft-AppendixL Medium
Microsoft-WEF, Yamato Security Recommended
Security-Auditing/Security4897Role separation enabled.Microsoft-AppendixL High
ASD, Yamato Security Recommended
Security-Auditing/Security4898Certificate Services loaded a template.Microsoft-WEF, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4899A Certificate Services template was updated.NSA, ASD Recommended
Security-Auditing/Security4900Certificate Services template security was updated.NSA, ASD Recommended
Security-Auditing/Security4902The Per-user audit policy table was created.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4904An attempt was made to register a security event source.Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4905An attempt was made to unregister a security event source.Yamato Security, JSCU-NL Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4906The CrashOnAuditFail value has changed.Microsoft-AppendixL Medium
Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4907Auditing settings on object were changed.Microsoft-AppendixL Medium
Yamato Security, JSCU-NL Recommended
Splunk-UBA Low
Security-Auditing/Security4908Special Groups Logon table modified.Microsoft-AppendixL Medium
Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4909The local policy settings for the TBS were changed.Microsoft-AppendixL Low
Security-Auditing/Security4910The group policy settings for the TBS were changed.Microsoft-AppendixL Low
Security-Auditing/Security4911Resource attributes of the object were changed.Splunk-UBA Low
Security-Auditing/Security4912Per User Audit Policy was changed.Microsoft-AppendixL Medium
Yamato Security, JSCU-NL Recommended
Security-Auditing/Security4928An Active Directory replica source naming context was established.ASD, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4929An Active Directory replica source naming context was removed.ASD Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4930An Active Directory replica source naming context was modified.Microsoft-AppendixL Low
Security-Auditing/Security4931An Active Directory replica destination naming context was modified.Microsoft-AppendixL Low
Security-Auditing/Security4932Synchronization of a replica of an Active Directory naming context has begun.Microsoft-AppendixL Low
Security-Auditing/Security4933Synchronization of a replica of an Active Directory naming context has ended.Microsoft-AppendixL Low
Security-Auditing/Security4934Attributes of an Active Directory object were replicated.Microsoft-AppendixL Low
Security-Auditing/Security4935Replication failure begins.Microsoft-AppendixL Low
Security-Auditing/Security4936Replication failure ends.Microsoft-AppendixL Low
Security-Auditing/Security4937A lingering object was removed from a replica.Microsoft-AppendixL Low
Security-Auditing/Security4944The following policy was active when the Windows Firewall started.mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security4945A rule was listed when the Windows Firewall started.Microsoft-AppendixL Low
Security-Auditing/Security4946A change has been made to Windows Firewall exception list. A rule was added.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4947A change has been made to Windows Firewall exception list. A rule was modified.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4948A change has been made to Windows Firewall exception list. A rule was deleted.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4949Windows Firewall settings were restored to the default values.Microsoft-AppendixL Low
Security-Auditing/Security4950A Windows Firewall setting has changed.Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security4951A rule has been ignored because its major version number was not recognized by Windows Firewall.Microsoft-AppendixL Low
Security-Auditing/Security4952Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall.Microsoft-AppendixL Low
Security-Auditing/Security4953A rule has been ignored by Windows Firewall because it could not parse the rule.Microsoft-AppendixL Low
Security-Auditing/Security4954Windows Firewall Group Policy settings has changed.Microsoft-AppendixL Low
Security-Auditing/Security4956Windows Firewall has changed the active profile.Microsoft-AppendixL Low
Security-Auditing/Security4957Windows Firewall did not apply the following rule.Microsoft-AppendixL Low
Security-Auditing/Security4958Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.Microsoft-AppendixL Low
Security-Auditing/Security4960IPsec dropped an inbound packet that failed an integrity check.Microsoft-AppendixL Medium
ASD Recommended
Security-Auditing/Security4961IPsec dropped an inbound packet that failed a replay check.Microsoft-AppendixL Medium
ASD Recommended
Security-Auditing/Security4962IPsec dropped an inbound packet that failed a replay check.Microsoft-AppendixL Medium
ASD Recommended
Security-Auditing/Security4963IPsec dropped an inbound clear text packet that should have been secured.Microsoft-AppendixL Medium
ASD Recommended
Security-Auditing/Security4964Special groups have been assigned to a new logon.Microsoft-AppendixL High
Palantir, ASD, Yamato Security, mdecrevoisier Recommended
Security-Auditing/Security4965IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI).Microsoft-AppendixL Medium
ASD Recommended
Security-Auditing/Security4976During Main Mode negotiation, IPsec received an invalid negotiation packet.Microsoft-AppendixL Medium
Security-Auditing/Security4977During Quick Mode negotiation, IPsec received an invalid negotiation packet.Microsoft-AppendixL Medium
Security-Auditing/Security4978During Extended Mode negotiation, IPsec received an invalid negotiation packet.Microsoft-AppendixL Medium
Security-Auditing/Security4979IPsec Main Mode and Extended Mode security associations were established.Microsoft-AppendixL Low
Security-Auditing/Security4980IPsec Main Mode and Extended Mode security associations were established.Microsoft-AppendixL Low
Security-Auditing/Security4981IPsec Main Mode and Extended Mode security associations were established.Microsoft-AppendixL Low
Security-Auditing/Security4982IPsec Main Mode and Extended Mode security associations were established.Microsoft-AppendixL Low
Security-Auditing/Security4983An IPsec Extended Mode negotiation failed.Microsoft-AppendixL Medium
Security-Auditing/Security4984An IPsec Extended Mode negotiation failed.Microsoft-AppendixL Medium
Security-Auditing/Security4985The state of a transaction has changed.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5024The Windows Firewall Service has started successfully.Microsoft-AppendixL Low
Security-Auditing/Security5025The Windows Firewall Service has been stopped.Microsoft-AppendixL Low
Security-Auditing/Security5027The Windows Firewall Service was unable to retrieve the security policy from the local storage.Microsoft-AppendixL Medium
Security-Auditing/Security5028The Windows Firewall Service was unable to parse the new security policy.Microsoft-AppendixL Medium
Security-Auditing/Security5029The Windows Firewall Service failed to initialize the driver.Microsoft-AppendixL Medium
Security-Auditing/Security5030The Windows Firewall Service failed to start.Microsoft-AppendixL Medium
Security-Auditing/Security5031The Windows Firewall Service blocked an application from accepting incoming connections on the network.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5032Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.Microsoft-AppendixL Low
Security-Auditing/Security5033The Windows Firewall Driver has started successfully.Microsoft-AppendixL Low
Security-Auditing/Security5034The Windows Firewall Driver has been stopped.Microsoft-AppendixL Low
Security-Auditing/Security5035The Windows Firewall Driver failed to start.Microsoft-AppendixL Medium
Security-Auditing/Security5037The Windows Firewall Driver detected critical runtime error.Microsoft-AppendixL Medium
Security-Auditing/Security5038Code integrity determined that the image hash of a file is not valid.Microsoft-AppendixL Medium
NSA, ASD, Olaf Hartong, Yamato Security, mdecrevoisier, JSCU-NL Recommended
Security-Auditing/Security5039A registry key was virtualized.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5040A change has been made to IPsec settings. An Authentication Set was added.Microsoft-AppendixL Low
Security-Auditing/Security5041A change has been made to IPsec settings. An Authentication Set was modified.Microsoft-AppendixL Low
Security-Auditing/Security5042A change has been made to IPsec settings. An Authentication Set was deleted.Microsoft-AppendixL Low
Security-Auditing/Security5043A change has been made to IPsec settings. A Connection Security Rule was added.Microsoft-AppendixL Low
Security-Auditing/Security5044A change has been made to IPsec settings. A Connection Security Rule was modified.Microsoft-AppendixL Low
Security-Auditing/Security5045A change has been made to IPsec settings. A Connection Security Rule was deleted.Microsoft-AppendixL Low
Security-Auditing/Security5046A change has been made to IPsec settings. A Crypto Set was added.Microsoft-AppendixL Low
Security-Auditing/Security5047A change has been made to IPsec settings. A Crypto Set was modified.Microsoft-AppendixL Low
Security-Auditing/Security5048A change has been made to IPsec settings. A Crypto Set was deleted.Microsoft-AppendixL Low
Security-Auditing/Security5049An IPsec Security Association was deleted.Microsoft-AppendixL Low
Security-Auditing/Security5050An attempt to programmatically disable the Windows Firewall using a call to INetFwProfile.FirewallEnabled(FALSE) interface was rejected.Microsoft-AppendixL Low
Security-Auditing/Security5051A file was virtualized.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5056A cryptographic self test was performed.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5057A cryptographic primitive operation failed.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5058Key file operation.Microsoft-AppendixL Low
Security-Auditing/Security5059Key migration operation.Microsoft-AppendixL Low
Security-Auditing/Security5060Verification operation failed.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5061Cryptographic operation.ASD, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5062A kernel-mode cryptographic self test was performed.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5063A cryptographic provider operation was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5064A cryptographic context operation was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5065A cryptographic context modification was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5066A cryptographic function operation was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5067A cryptographic function modification was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5068A cryptographic function provider operation was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5069A cryptographic function property operation was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5070A cryptographic function property modification was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5120OCSP Responder Service Started.Microsoft-AppendixL Medium
Yamato Security, mdecrevoisier Recommended
Security-Auditing/Security5121OCSP Responder Service Stopped.Microsoft-AppendixL Medium
Yamato Security Recommended
Security-Auditing/Security5122A Configuration entry changed in the OCSP Responder Service.Microsoft-AppendixL Medium
Security-Auditing/Security5123A configuration entry changed in the OCSP Responder Service.Microsoft-AppendixL Medium
Yamato Security Recommended
Security-Auditing/Security5124A security setting was updated on OCSP Responder Service.Microsoft-AppendixL High
ASD, Yamato Security Recommended
Security-Auditing/Security5125A request was submitted to OCSP Responder Service.Microsoft-AppendixL Low
Security-Auditing/Security5126Signing Certificate was automatically updated by the OCSP Responder Service.Microsoft-AppendixL Low
Security-Auditing/Security5127The OCSP Revocation Provider successfully updated the revocation information.Microsoft-AppendixL Low
Security-Auditing/Security5136A directory service object was modified.NSA, ASD, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5137A directory service object was created.NSA, ASD Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5138A directory service object was undeleted.NSA, ASD Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5139A directory service object was moved.NSA, ASD Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5140A network share object was accessed.Palantir, Olaf Hartong, Yamato Security, mdecrevoisier, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security5141A directory service object was deleted.NSA, ASD Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5142A network share object was added.Microsoft-WEF, Yamato Security, JSCU-NL, ANSSI Recommended
Splunk-UBA Low
Security-Auditing/Security5143A network share object was modified.Yamato Security Recommended
Security-Auditing/Security5144A network share object was deleted.Microsoft-WEF, Yamato Security, ANSSI Recommended
Splunk-UBA Low
Security-Auditing/Security5145A network share object was checked to see whether client can be granted desired access.Palantir, Olaf Hartong, mdecrevoisier, ANSSI Recommended
Splunk-UBA Low
Security-Auditing/Security5148The Windows Filtering Platform has detected a DoS attack and entered a defensive mode.Yamato Security, mdecrevoisier Recommended
Security-Auditing/Security5149The DoS attack has subsided and normal processing is being resumed.Yamato Security Recommended
Security-Auditing/Security5150The Windows Filtering Platform has blocked a packet.Yamato Security Recommended
Security-Auditing/Security5151A more restrictive Windows Filtering Platform filter has blocked a packet.Yamato Security Recommended
Security-Auditing/Security5152The Windows Filtering Platform blocked a packet.Microsoft-AppendixL Low
Security-Auditing/Security5153A more restrictive Windows Filtering Platform filter has blocked a packet.Microsoft-AppendixL Low
Security-Auditing/Security5154The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5155The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5156The Windows Filtering Platform has permitted a connection.Olaf Hartong, Yamato Security Recommended
Microsoft-AppendixL, Splunk-UBA Low
Security-Auditing/Security5157The Windows Filtering Platform has blocked a connection.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5158The Windows Filtering Platform has permitted a bind to a local port.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5159The Windows Filtering Platform has blocked a bind to a local port.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5168SPN check for SMB/SMB2 fails.Yamato Security Recommended
Security-Auditing/Security5376Credential Manager credentials were backed up.Microsoft-AppendixL Medium
NSA, ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security5377Credential Manager credentials were restored from a backup.Microsoft-AppendixL Medium
NSA, ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security5378The requested credentials delegation was disallowed by policy.Palantir, Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5379Credential Manager credentials were read.Yamato Security Recommended
Splunk-UBA Low
Security-Auditing/Security5381Vault credentials were read.Yamato Security Recommended
Security-Auditing/Security5382Vault credentials were read.Yamato Security Recommended
Security-Auditing/Security5440The following callout was present when the Windows Filtering Platform Base Filtering Engine started.Microsoft-AppendixL Low
Security-Auditing/Security5441The following filter was present when the Windows Filtering Platform Base Filtering Engine started.Microsoft-AppendixL Low
Security-Auditing/Security5442The following provider was present when the Windows Filtering Platform Base Filtering Engine started.Microsoft-AppendixL Low
Security-Auditing/Security5443The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.Microsoft-AppendixL Low
Security-Auditing/Security5444The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.Microsoft-AppendixL Low
Security-Auditing/Security5446A Windows Filtering Platform callout has been changed.Microsoft-AppendixL Low
Security-Auditing/Security5447A Windows Filtering Platform filter has been changed.Microsoft-AppendixL Low
Security-Auditing/Security5448A Windows Filtering Platform provider has been changed.Microsoft-AppendixL Low
Security-Auditing/Security5449A Windows Filtering Platform provider context has been changed.Microsoft-AppendixL Low
Security-Auditing/Security5450A Windows Filtering Platform sub-layer has been changed.Microsoft-AppendixL Low
Security-Auditing/Security5451An IPsec quick mode security association was established.Microsoft-AppendixL Low
Security-Auditing/Security5452An IPsec quick mode security association ended.Microsoft-AppendixL Low
Security-Auditing/Security5453An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.Microsoft-AppendixL Medium
Security-Auditing/Security5456PAStore Engine applied Active Directory storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5457PAStore Engine failed to apply Active Directory storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5458PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5459PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5460PAStore Engine applied local registry storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5461PAStore Engine failed to apply local registry storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5462PAStore Engine failed to apply some rules of the active IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5463PAStore Engine polled for changes to the active IPsec policy and detected no changes.Microsoft-AppendixL Low
Security-Auditing/Security5464PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services.Microsoft-AppendixL Low
Security-Auditing/Security5465PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully.Microsoft-AppendixL Low
Security-Auditing/Security5466PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead.Microsoft-AppendixL Low
Security-Auditing/Security5467PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy.Microsoft-AppendixL Low
Security-Auditing/Security5468PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes.Microsoft-AppendixL Low
Security-Auditing/Security5471PAStore Engine loaded local storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5472PAStore Engine failed to load local storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5473PAStore Engine loaded directory storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5474PAStore Engine failed to load directory storage IPsec policy on the computer.Microsoft-AppendixL Low
Security-Auditing/Security5477PAStore Engine failed to add quick mode filter.Microsoft-AppendixL Low
Security-Auditing/Security5478IPsec Services has started successfully.Microsoft-AppendixL Low
Security-Auditing/Security5479IPsec Services has been shut down successfully.Microsoft-AppendixL Low
Security-Auditing/Security5480IPsec Services failed to get the complete list of network interfaces on the computer.Microsoft-AppendixL Medium
Security-Auditing/Security5483IPsec Services failed to initialize RPC server.Microsoft-AppendixL Medium
Security-Auditing/Security5484IPsec Services has experienced a critical failure and has been shut down.Microsoft-AppendixL Medium
Security-Auditing/Security5485IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces.Microsoft-AppendixL Medium
Security-Auditing/Security5632A request was made to authenticate to a wireless network.Microsoft-WEF, Yamato Security, JSCU-NL, ANSSI Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5633A request was made to authenticate to a wired network.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5712A Remote Procedure Call (RPC) was attempted.Microsoft-AppendixL Low
Security-Auditing/Security5888An object in the COM+ Catalog was modified.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5889An object was deleted from the COM+ Catalog.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security5890An object was added to the COM+ Catalog.Yamato Security Recommended
Microsoft-AppendixL Low
Security-Auditing/Security6144Security policy in the group policy objects has been applied successfully.Microsoft-AppendixL Low
Security-Auditing/Security6145One or more errors occured while processing security policy in the group policy objects.Microsoft-AppendixL Medium
Security-Auditing/Security6272Network Policy Server granted access to a user.Microsoft-WEF, mdecrevoisier Recommended
Microsoft-AppendixL Low
Security-Auditing/Security6273Network Policy Server denied access to a user.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Splunk-UBA Low
Security-Auditing/Security6274Network Policy Server discarded the request for a user.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Security-Auditing/Security6275Network Policy Server discarded the accounting request for a user.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Security-Auditing/Security6276Network Policy Server quarantined a user.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Splunk-UBA Low
Security-Auditing/Security6277Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Splunk-UBA Low
Security-Auditing/Security6278Network Policy Server granted full access to a user because the host met the defined health policy.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Security-Auditing/Security6279Network Policy Server locked the user account due to repeated failed authentication attempts.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Security-Auditing/Security6280Network Policy Server unlocked the user account.Microsoft-AppendixL Medium
Microsoft-WEF Recommended
Security-Auditing/Security6281Code Integrity determined that the page hashes of an image file are not valid.NSA, ASD, Olaf Hartong, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security6410Code integrity determined that a file does not meet the security requirements to load into a process.ASD, Yamato Security, JSCU-NL Recommended
Security-Auditing/Security6416A new external device was recognized by the system.Yamato Security, mdecrevoisier, JSCU-NL, ANSSI Recommended
Splunk-UBA Low
Security-Auditing/Security6419A request was made to disable a device.Yamato Security Recommended
Security-Auditing/Security6420A device was disabled.Yamato Security Recommended
Security-Auditing/Security6421A request was made to enable a device.Yamato Security Recommended
Security-Auditing/Security6422A device was enabled.Yamato Security Recommended
Security-Auditing/Security6423The installation of this device is forbidden by system policy.Yamato Security Recommended
Security-Auditing/Security6424The installation of this device was allowed, after having previously been forbidden by policy.Yamato Security Recommended
Security-Mitigations/KernelMode1Process '%2' (PID %5) would have been blocked from generating dynamic code.JSCU-NL Recommended
Security-Mitigations/KernelMode2Process '%2' (PID %5) was blocked from generating dynamic code.JSCU-NL Recommended
Security-Mitigations/KernelMode3Process '%2' (PID %5) would have been blocked from creating a child process '%14' with command line '%16'.JSCU-NL Recommended
Security-Mitigations/KernelMode4Process '%2' (PID %5) was blocked from creating a child process '%14' with command line '%16'.JSCU-NL Recommended
Security-Mitigations/KernelMode5Process '%2' (PID %5) would have been blocked from loading the low-integrity binary '%14'.JSCU-NL Recommended
Security-Mitigations/KernelMode6Process '%2' (PID %5) was blocked from loading the low-integrity binary '%14'.JSCU-NL Recommended
Security-Mitigations/KernelMode7Process '%2' (PID %5) would have been blocking from loading a binary from a remote share.JSCU-NL Recommended
Security-Mitigations/KernelMode8Process '%2' (PID %5) was blocked from loading a binary from a remote share.JSCU-NL Recommended
Security-Mitigations/KernelMode9Process '%2' (PID %5) would have been blocked from making system calls to Win32k.JSCU-NL Recommended
Security-Mitigations/KernelMode10Process '%2' (PID %5) was blocked from making system calls to Win32k.JSCU-NL Recommended
Security-Mitigations/KernelMode11Process '%2' (PID %5) would have been blocked from loading the non-Microsoft-signed binary '%16'.JSCU-NL Recommended
Security-Mitigations/KernelMode12Process '%2' (PID %5) was blocked from loading the non-Microsoft-signed binary '%16'.JSCU-NL Recommended
Security-Mitigations/UserMode13Process '%2' (PID %3) would have been blocked from accessing the Export Address Table for module '%8'.JSCU-NL Recommended
Security-Mitigations/UserMode14Process '%2' (PID %3) was blocked from accessing the Export Address Table for module '%8'.JSCU-NL Recommended
Security-Mitigations/UserMode15Process '%2' (PID %3) would have been blocked from accessing the Export Address Table for module '%8'.JSCU-NL Recommended
Security-Mitigations/UserMode16Process '%2' (PID %3) was blocked from accessing the Export Address Table for module '%8'.JSCU-NL Recommended
Security-Mitigations/UserMode17Process '%2' (PID %3) would have been blocked from accessing the Import Address Table for API '%10'.JSCU-NL Recommended
Security-Mitigations/UserMode18Process '%2' (PID %3) was blocked from accessing the Import Address Table for API '%10'.JSCU-NL Recommended
Security-Mitigations/UserMode19Process '%2' (PID %3) would have been blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.JSCU-NL Recommended
Security-Mitigations/UserMode20Process '%2' (PID %3) was blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.JSCU-NL Recommended
Security-Mitigations/UserMode21Process '%2' (PID %3) would have been blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.JSCU-NL Recommended
Security-Mitigations/UserMode22Process '%2' (PID %3) was blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.JSCU-NL Recommended
Security-Mitigations/UserMode23Process '%2' (PID %3) would have been blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.JSCU-NL Recommended
Security-Mitigations/UserMode24Process '%2' (PID %3) was blocked from calling the API '%4' due to return-oriented programming (ROP) exploit indications.JSCU-NL Recommended
Servicing/Setup2Package %1 was successfully changed to the %2 state.NSA Recommended
SMBClient/Operational30622Session to server {ObjectName} was re-established.Microsoft-WEF Recommended
SMBClient/Operational30624Connection to share {ObjectName} was re-established.Microsoft-WEF Recommended
SoftwareRestrictionPolicies/Application865Access to %1 has been restricted by your Administrator by the default software restriction policy level.NSA, JSCU-NL Recommended
SoftwareRestrictionPolicies/Application866Access to %1 has been restricted by your Administrator by location with policy rule %2 placed on path %3.NSA, JSCU-NL, ANSSI Recommended
SoftwareRestrictionPolicies/Application867Access to %1 has been restricted by your Administrator by software publisher policy.NSA, JSCU-NL Recommended
SoftwareRestrictionPolicies/Application868Access to %1 has been restricted by your Administrator by policy rule %2.NSA, JSCU-NL Recommended
SoftwareRestrictionPolicies/Application882Access to %1 has been restricted by your Administrator by policy rule %2.NSA, JSCU-NL Recommended
Sysmon/Operational1Process creationASD, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational2A process changed a file creation timeOlaf Hartong, JSCU-NL Recommended
Sysmon/Operational3Network connectionOlaf Hartong, JSCU-NL Recommended
Sysmon/Operational4Sysmon service state changedOlaf Hartong, JSCU-NL Recommended
Sysmon/Operational5Process terminatedPalantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational6Driver loadedOlaf Hartong, JSCU-NL Recommended
Sysmon/Operational7Image loadedOlaf Hartong, JSCU-NL Recommended
Sysmon/Operational8CreateRemoteThreadPalantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational9RawAccessReadJSCU-NL Recommended
Sysmon/Operational10ProcessAccessJSCU-NL Recommended
Sysmon/Operational11FileCreatePalantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational12RegistryEvent (Object create and delete)Palantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational13RegistryEvent (Value Set)Palantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational14RegistryEvent (Key and Value Rename)Palantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational15FileCreateStreamHashPalantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational16ServiceConfigurationChangeOlaf Hartong, JSCU-NL Recommended
Sysmon/Operational17PipeEvent (Pipe Created)Palantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational18PipeEvent (Pipe Connected)Palantir, Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational19WmiEvent (WmiEventFilter activity detected)Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational20WmiEvent (WmiEventConsumer activity detected)Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational21WmiEvent (WmiEventConsumerToFilter activity detected)Olaf Hartong, JSCU-NL Recommended
Sysmon/Operational22DNSEvent (DNS query)JSCU-NL Recommended
Sysmon/Operational23FileDelete (File Delete archived)Palantir, JSCU-NL Recommended
Sysmon/Operational24ClipboardChange (New content in the clipboard)JSCU-NL Recommended
Sysmon/Operational25ProcessTampering (Process image change)Palantir, JSCU-NL Recommended
Sysmon/Operational26FileDeleteDetected (File Delete logged)JSCU-NL Recommended
Sysmon/Operational255Error report: UtcTime: %1 ID: %2 Description: %3.JSCU-NL Recommended
TaskScheduler/Operational100Task Scheduler started "%3" instance of the "%1" task for user "%2".Olaf Hartong, Yamato Security, ANSSI Recommended
TaskScheduler/Operational101Task Scheduler failed to start "%1" task for user "%2".Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational102Task Scheduler successfully finished "%3" instance of the "%1" task for user "%2".Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational103Task Scheduler failed to start instance "%2" of "%1" task for user "%3" .Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational104Task Scheduler failed to log on "%1" .Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational105Task Scheduler failed to impersonate "%1" .Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational106User "%2" registered Task Scheduler task "%1".Microsoft-WEF, Olaf Hartong, Yamato Security, ANSSI Recommended
TaskScheduler/Operational107Task Scheduler launched "%2" instance of task "%1" due to a time trigger condition.Olaf Hartong, Yamato Security, ANSSI Recommended
TaskScheduler/Operational108Task Scheduler launched "%2" instance of task "%1" according to an event trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational109Task Scheduler launched "%2" instance of task "%1" according to a registration trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational110Task Scheduler launched "%2" instance of task "%1" for user "%3" .Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational111Task Scheduler terminated "%2" instance of the "%1" task.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational112Task Scheduler could not start task "%1" because the network was unavailable.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational113Task registered task "%1" , but not all specified triggers will start the task.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational114Task Scheduler could not launch task "%1" as scheduled.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational115Task Scheduler failed to roll back a transaction when updating or deleting a task.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational116Task Scheduler validated the configuration for task "%1" , but credentials could not be stored.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational117Task Scheduler launched "%2" instance of task "%1" due to an idle condition.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational118Task Scheduler launched "%2" instance of task "%1" due to system startup.ASD, Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational119Task Scheduler launched "%3" instance of task "%1" due to user "%2" logon.ASD, Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational120Task Scheduler launched "%3" instance of task "%1" due to user "%2" connecting to the console trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational121Task Scheduler launched "%3" instance of task "%1" due to user "%2" disconnecting from the console trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational122Task Scheduler launched "%3" instance of task "%1" due to user "%2" remotely connecting trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational123Task Scheduler launched "%3" instance of task "%1" due to user "%2" remotely disconnecting trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational124Task Scheduler launched "%3" instance of task "%1" due to user "%2" locking the computer trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational125Task Scheduler launched "%3" instance of task "%1" due to user "%2" unlocking the computer trigger.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational126Task Scheduler failed to execute task "%1" .Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational127Task Scheduler failed to execute task "%1" due to a shutdown race condition.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational128Task Scheduler did not launch task "%1" , because current time exceeds the configured task end time.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational129Task Scheduler launch task "%1" , instance "%2" with process ID %3.ASD, Olaf Hartong, Yamato Security, ANSSI Recommended
TaskScheduler/Operational130Task Scheduler failed to start task "%1" due to the service being busy.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational131Task Scheduler failed to start task "%1" because the number of tasks in the task queue exceeding the quota currently configured to %2.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational132Task Scheduler task launching queue quota is approaching its preset limit of tasks currently configured to %1.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational133Task Scheduler failed to start task %1" in TaskEngine "%2" for user "%3".Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational134Task Engine "%1" for user "%2" is approaching its preset limit of tasks.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational135Task Scheduler could not start task "%1" because the machine was not idle.Olaf Hartong, Yamato Security Recommended
TaskScheduler/Operational140User "%2" updated Task Scheduler task "%1".Yamato Security, ANSSI Recommended
TaskScheduler/Operational141User "%2" deleted Task Scheduler task "%1".Microsoft-WEF, Yamato Security, ANSSI Recommended
TaskScheduler/Operational142User "%2" disabled Task Scheduler task "%1".Microsoft-WEF, Yamato Security, ANSSI Recommended
TaskScheduler/Operational145Task Scheduler woke up the computer to run a task.Yamato Security Recommended
TaskScheduler/Operational146Task Scheduler failed to load task "%1" at service startup.Yamato Security Recommended
TaskScheduler/Operational147Task Scheduler recovered sucessfully the image of task "%1" after a corruption occured during OS upgrade.Yamato Security Recommended
TaskScheduler/Operational148Task Scheduler failed to recover the image of task "%1" after a corruption occured during OS upgrade.Yamato Security Recommended
TaskScheduler/Operational149Task "%1" is using a combination of properties that is incompatible with the scheduling engine.Yamato Security Recommended
TaskScheduler/Operational150Task Scheduler failed to subscribe for the event trigger for task "%1".Yamato Security Recommended
TaskScheduler/Operational151Task instantiation failed "%1".Yamato Security Recommended
TaskScheduler/Operational152Task "%1" was re-directed to legacy scheduling engine.Yamato Security Recommended
TaskScheduler/Operational153Task Scheduler did not launch task "%1" as it missed its schedule.Yamato Security Recommended
TaskScheduler/Operational155Task Scheduler is currently waiting on completion of task "%1".Yamato Security Recommended
TaskScheduler/Operational200Task Scheduler launched action "%2" in instance "%3" of task "%1".NSA, ASD, Olaf Hartong, Yamato Security, JSCU-NL, ANSSI Recommended
TaskScheduler/Operational201Task Scheduler successfully completed task "%1" , instance "%3" , action "%2" .Yamato Security, JSCU-NL Recommended
TaskScheduler/Operational202Task Scheduler failed to complete task "%1" , instance "%2" , action "%3" .Yamato Security Recommended
TaskScheduler/Operational203Task Scheduler failed to launch action "%3" in instance "%2" of task "%1".Yamato Security Recommended
TaskScheduler/Operational204Task Scheduler failed to retrieve the event triggering values for task "%1" .Yamato Security Recommended
TaskScheduler/Operational205Task Scheduler failed to match the pattern of events for task "%1" .Yamato Security Recommended
TaskScheduler/Operational300Task Scheduler started Task Engine "%1" with process ID %2.Yamato Security Recommended
TaskScheduler/Operational301Task Scheduler is shutting down Task Engine "%1".Yamato Security Recommended
TaskScheduler/Operational303Task Scheduler is shutting down Task Engine "%1" due to an error in "%2" .Yamato Security Recommended
TaskScheduler/Operational304Task Scheduler sent "%1" task to Task Engine "%2" .Yamato Security Recommended
TaskScheduler/Operational305Task Scheduler did not send "%1" task to Task Engine "%2" .Yamato Security Recommended
TaskScheduler/Operational306For Task Scheduler Task Engine "%1" , the thread pool failed to process the message.Yamato Security Recommended
TaskScheduler/Operational307Task Scheduler service failed to connect to the Task Engine "%1" process.Yamato Security Recommended
TaskScheduler/Operational308Task Scheduler connected to the Task Engine "%1" process.Yamato Security Recommended
TaskScheduler/Operational309Task Scheduler %1 tasks orphaned during Task Engine "%2" shutdown.Yamato Security Recommended
TaskScheduler/Operational310Task Scheduler started Task Engine "%1" process.Yamato Security Recommended
TaskScheduler/Operational311Task Scheduler failed to start Task Engine "%1" process due to an error occurring in "%3" .Yamato Security Recommended
TaskScheduler/Operational312Task Scheduler created the Win32 job object for Task Engine "%1" .Yamato Security Recommended
TaskScheduler/Operational313Task Scheduler channel with Task Engine "%1" is ready to send and receive messages.Yamato Security Recommended
TaskScheduler/Operational314Task Scheduler has no tasks running for Task Engine "%1" , and the idle timer has started.Yamato Security Recommended
TaskScheduler/Operational315Task Engine "%1" process failed to connect to the Task Scheduler service.Yamato Security Recommended
TaskScheduler/Operational316Task Engine "%1" failed to send a message to the Task Scheduler service.Yamato Security Recommended
TaskScheduler/Operational317Task Scheduler started Task Engine "%1" process.Yamato Security Recommended
TaskScheduler/Operational318Task Scheduler shutdown Task Engine "%1" process.Yamato Security Recommended
TaskScheduler/Operational319Task Engine "%1" received a message from Task Scheduler service requesting to launch task "%2" .Yamato Security Recommended
TaskScheduler/Operational320Task Engine "%1" received a message from Task Scheduler service requesting to stop task instance "%2" .Yamato Security Recommended
TaskScheduler/Operational322Task Scheduler did not launch task "%1" because instance "%2" of the same task is already running.Yamato Security Recommended
TaskScheduler/Operational323Task Scheduler stopped instance "%2" of task "%1" in order to launch new instance "%3" .Yamato Security Recommended
TaskScheduler/Operational324Task Scheduler queued instance "%2" of task "%1" and will launch it as soon as instance "%3" completes.Yamato Security Recommended
TaskScheduler/Operational325Task Scheduler queued instance "%2" of task "%1".Yamato Security Recommended
TaskScheduler/Operational326Task Scheduler did not launch task "%1" because computer is running on batteries.Yamato Security Recommended
TaskScheduler/Operational327Task Scheduler stopped instance "%2" of task "%1" because the computer is switching to battery power.Yamato Security Recommended
TaskScheduler/Operational328Task Scheduler stopped instance "%2" of task "%1" because computer is no longer idle.Yamato Security Recommended
TaskScheduler/Operational329Task Scheduler terminated "%2" instance of the "%1" task due to exceeding the time allocated for execution, as configured in the task definition.Yamato Security Recommended
TaskScheduler/Operational330Task Scheduler stopped instance "%2" of task "%1" as request by user "%3" .Yamato Security Recommended
TaskScheduler/Operational331Task Scheduler will continue to execute Instance "%2" of task "%1" even after the designated timeout, due to a failure to create the timeout mechan...Yamato Security Recommended
TaskScheduler/Operational332Task Scheduler did not launch task "%1" because user "%2" was not logged on when the launching conditions were met.Yamato Security Recommended
TaskScheduler/Operational333Task Scheduler did not launch task "%1" because target session is RemoteApp session.Yamato Security Recommended
TaskScheduler/Operational334Task Scheduler did not launch task "%1" because target session is a WORKER session.Yamato Security Recommended
TaskScheduler/Operational400Task Scheduler service has started.Yamato Security Recommended
TaskScheduler/Operational402Task Scheduler service is shutting down.Yamato Security Recommended
TaskScheduler/Operational403Task Scheduler service has encountered an error in "%1" .Yamato Security Recommended
TaskScheduler/Operational410Task Scheduler service failed to set a wakeup timer.Yamato Security Recommended
TaskScheduler/Operational411Task Scheduler service received a time system change notification.Yamato Security Recommended
TaskScheduler/Operational700Task Scheduler service started Task Compatibility module.Yamato Security Recommended
TaskScheduler/Operational706Task Compatibility module failed to update task "%1" to the required status %2.Yamato Security Recommended
TaskScheduler/Operational707Task Compatibility module failed to delete task "%1" .Yamato Security Recommended
TaskScheduler/Operational708Task Compatibility module failed to set security descriptor "%1" for task "%2" .Yamato Security Recommended
TaskScheduler/Operational709Task Compatibility module failed to update task "%1" .Yamato Security Recommended
TaskScheduler/Operational710Task Compatibility module failed to upgrade existing tasks.Yamato Security Recommended
TaskScheduler/Operational711Task Compatibility module failed to upgrade NetSchedule account "%1" .Yamato Security Recommended
TaskScheduler/Operational712Task Compatibility module failed to read existing store to upgrade tasks.Yamato Security Recommended
TaskScheduler/Operational713Task Compatibility module failed to load task "%1" for upgrade.Yamato Security Recommended
TaskScheduler/Operational714Task Compatibility module failed to register task "%1" for upgrade.Yamato Security Recommended
TaskScheduler/Operational715Task Compatibility module failed to delete LSA store for upgrade.Yamato Security Recommended
TaskScheduler/Operational717Task Compatibility module failed to determine if upgrade is needed.Yamato Security Recommended
TerminalServices-ClientActiveXCore/Operational1024RDP ClientActiveX is trying to connect to the serverMicrosoft-WEF, JSCU-NL, ANSSI Recommended
TerminalServices-ClientActiveXCore/Operational1025RDP ClientActiveX has connected to the serverANSSI Recommended
TerminalServices-LocalSessionManager/Operational16Local Multi-User session manager failed to start.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational17Remote Desktop Service start failed.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational18Remote Desktop Service is shutdown for unknown reason.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational19Registering with Service Control Manager to monitor Remote Desktop Service status failed with %1, retry in ten minutes.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational20Attempt to send %1 message to Windows video subsystem failed.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational21Remote Desktop Services: Session logon succeeded: User: %1 Session ID: %2 Source Network Address: %3.ASD, Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational22Remote Desktop Services: Shell start notification received: User: %1 Session ID: %2 Source Network Address: %3.ASD, Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational23Remote Desktop Services: Session logoff succeeded: User: %1 Session ID: %2.ASD, Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational24Remote Desktop Services: Session has been disconnected: User: EC2AMAZ-3NFFVNI\samurai Session ID: 5 Source Network Address: 219.ASD, Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational25Remote Desktop Services: Session reconnection succeeded: User: EC2AMAZ-3NFFVNI\samurai Session ID: 4 Source Network Address: 219.ASD, Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational32Plugin RDSAppXPlugin has been successfully initializedYamato Security Recommended
TerminalServices-LocalSessionManager/Operational33Plugin %1 failed to initialize, error code %2.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational34Remote Desktop Services is not accepting logons because setup is running.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational35The client process ID %1 could not complete the session change notification event sent by the Remote Desktop service.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational36An error occurred when transitioning from %3 in response to %5.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational37Invalid state transition from %3 in response to %5.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational39Session %1 has been disconnected by session %2.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational40Session 5 has been disconnected, reason code 12Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational41Begin session arbitration: User: %1 Session ID: %2.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational42End session arbitration: User: %1 Session ID: %2.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational43Windows Subsystem has taken too long to process Connect event for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational44Windows Subsystem has taken too long to process Disconnect event for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational45Windows Subsystem has taken too long to process Terminate event for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational48Remote Connection Manager has taken too long to process logon message for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational49Remote Connection Manager has taken too long to prepare for session arbitration for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational50Remote Connection Manager has taken too long to process begin-connect-message for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational51Remote Connection Manager has taken too long to process end-connect-message for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational52Remote Connection Manager has taken too long to process begin-disconnect-message for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational53Remote Connection Manager has taken too long to process end-disconnect-message for session %1.Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational54Local multi-user session manager received system shutdown messageYamato Security Recommended
TerminalServices-LocalSessionManager/Operational55Remote Desktop Service has taken too long to start upYamato Security Recommended
TerminalServices-LocalSessionManager/Operational56Remote Desktop Service has taken too long to shutdownYamato Security Recommended
TerminalServices-LocalSessionManager/Operational59%s from %S( #0x%x/0x%x )Yamato Security Recommended
TerminalServices-LocalSessionManager/Operational60Glass session %1 has been reconnected to a remote protocol, this session can now only be reconnect locally or from same remote protocol.Yamato Security Recommended
User Profiles Service/Application1511Windows cannot find the local profile and is logging you on with a temporary profile.Microsoft-WEF Recommended
User Profiles Service/Application1518Windows cannot create a local profile and is logging you on with a temporary profile.Microsoft-WEF Recommended
WER-Diag/Operational5CFG violation is detected.JSCU-NL Recommended
WER-SystemErrorReporting/System1001The computer has rebooted from a bugcheck.NSA Recommended
Win32k/Operational260%1 attempted loading a font that is restricted by font loading policy.JSCU-NL Recommended
Windows Defender/Operational1005%1 scan has encountered an error and terminated.NSA, Olaf Hartong Recommended
Windows Defender/Operational1006%1 has detected malware or other potentially unwanted software.Microsoft-Defender, Olaf Hartong, JSCU-NL Recommended
Windows Defender/Operational1007%1 has taken action to protect this machine from malware or other potentially unwanted software.Microsoft-Defender, JSCU-NL Recommended
Windows Defender/Operational1008%1 has encountered an error when taking action on malware or other potentially unwanted software.Microsoft-Defender, Olaf Hartong, JSCU-NL Recommended
Windows Defender/Operational1009%1 has restored an item from quarantine.Microsoft-WEF, JSCU-NL Recommended
Windows Defender/Operational1010%1 has encountered an error trying to restore an item from quarantine.NSA, Olaf Hartong, JSCU-NL Recommended
Windows Defender/Operational1015%1 has detected a suspicious behavior.Microsoft-Defender Recommended
Windows Defender/Operational1116%1 has detected malware or other potentially unwanted software.Microsoft-Defender, Olaf Hartong, JSCU-NL Recommended
Windows Defender/Operational1117%1 has taken action to protect this machine from malware or other potentially unwanted software.Microsoft-Defender, Olaf Hartong, JSCU-NL Recommended
Windows Defender/Operational1118%1 has encountered a non-critical error when taking action on malware or other potentially unwanted software.Microsoft-Defender, JSCU-NL Recommended
Windows Defender/Operational1119%1 has encountered a critical error when taking action on malware or other potentially unwanted software.Microsoft-Defender, JSCU-NL Recommended
Windows Defender/Operational1121Microsoft Defender Exploit Guard has blocked an operation that is not allowed by your IT administrator.Microsoft-Defender, JSCU-NL Recommended
Windows Defender/Operational1122Microsoft Defender Exploit Guard audited an operation that is not allowed by your IT administrator.JSCU-NL Recommended
Windows Defender/Operational1123%8 has been blocked from modifying %7 by Controlled Folder Access.JSCU-NL Recommended
Windows Defender/Operational1124%8 would have been blocked from modifying %7 by Controlled Folder Access.JSCU-NL Recommended
Windows Defender/Operational1125Your IT administrator would have caused Microsoft Defender Exploit Guard to block a potentially dangerous network connection.JSCU-NL Recommended
Windows Defender/Operational1126Your IT administrator has caused Microsoft Defender Exploit Guard to block a potentially dangerous network connection.JSCU-NL Recommended
Windows Defender/Operational1127Controlled Folder Access blocked %8 from making changes to memory.Microsoft-Defender Recommended
Windows Defender/Operational2001%1 has encountered an error trying to update security intelligence.Microsoft-Defender, Olaf Hartong Recommended
Windows Defender/Operational2003%1 has encountered an error trying to update the engine.NSA, Olaf Hartong Recommended
Windows Defender/Operational2004%1 has encountered an error trying to update security intelligence and will attempt to revert to a previous version.NSA, Olaf Hartong Recommended
Windows Defender/Operational3002%1 Real-Time Protection feature has encountered an error and failed.Microsoft-Defender, Olaf Hartong Recommended
Windows Defender/Operational5001%1 Real-time Protection scanning for malware and other potentially unwanted software was disabled.Microsoft-Defender Recommended
Windows Defender/Operational5004%1 Real-time Protection feature configuration has changed.Microsoft-Defender Recommended
Windows Defender/Operational5007%1 Configuration has changed.Microsoft-Defender, JSCU-NL Recommended
Windows Defender/Operational5008%1 engine has been terminated due to an unexpected error.Microsoft-Defender, Olaf Hartong Recommended
Windows Defender/Operational5010%1 scanning for spyware and other potentially unwanted software is disabled.Microsoft-Defender Recommended
Windows Defender/Operational5012%1 scanning for viruses is disabled.Microsoft-Defender Recommended
Windows Defender/Operational5013Tamper Protection %3 a change to %1.Microsoft-Defender Recommended
Windows Firewall With Advanced Security/Firewall2003A Windows Defender Firewall setting in the %1 profile has changed.Olaf Hartong Recommended
Windows Firewall With Advanced Security/Firewall2004A rule has been added to the Windows Defender Firewall exception list.NSA Recommended
Windows Firewall With Advanced Security/Firewall2005A rule has been modified in the Windows Defender Firewall exception list.NSA Recommended
Windows Firewall With Advanced Security/Firewall2006A rule has been deleted in the Windows Defender Firewall exception list.NSA Recommended
Windows Firewall With Advanced Security/Firewall2009The Windows Defender Firewall service failed to load Group Policy.NSA Recommended
Windows Firewall With Advanced Security/Firewall2033All rules have been deleted from the Windows Defender Firewall configuration on this computer.NSA Recommended
Windows-Defender/Operational1006%1 has detected malware or other potentially unwanted software.ANSSI Recommended
Windows-Defender/Operational1007%1 has taken action to protect this machine from malware or other potentially unwanted software.ANSSI Recommended
Windows-Defender/Operational1008%1 has encountered an error when taking action on malware or other potentially unwanted software.ANSSI Recommended
Windows-Defender/Operational1009%1 has restored an item from quarantine.ANSSI Recommended
Windows-Defender/Operational1116%1 has detected malware or other potentially unwanted software.ANSSI Recommended
Windows-Defender/Operational1117%1 has taken action to protect this machine from malware or other potentially unwanted software.ANSSI Recommended
Windows-Defender/Operational1118%1 has encountered a non-critical error when taking action on malware or other potentially unwanted software.ANSSI Recommended
Windows-Defender/Operational1119%1 has encountered a critical error when taking action on malware or other potentially unwanted software.ANSSI Recommended
Windows-Defender/Operational1120%1 has deduced the hashes for a threat resource.ANSSI Recommended
WindowsUpdateClient/System19Installation Successful: Windows successfully installed the following update.NSA Recommended
WindowsUpdateClient/System20Installation Failure: Windows failed to install the following update with error %1: %2.NSA Recommended
WindowsUpdateClient/System24Uninstallation Failure: Windows failed to uninstall the following update with error %1: %2.NSA Recommended
WindowsUpdateClient/Operational25Windows Update failed to check for updates with error %1.NSA Recommended
WindowsUpdateClient/Operational31Windows Update failed to download an update.NSA Recommended
WindowsUpdateClient/Operational34The Windows Update Client Core component failed to install a self-update with error %1.NSA Recommended
WindowsUpdateClient/Operational35The Windows Update Client Auxillary component failed to install a self-update with error %1.NSA Recommended
WLAN-AutoConfig/Operational8001WLAN AutoConfig service has successfully connected to a wireless network.NSA Recommended
WLAN-AutoConfig/Operational8002WLAN AutoConfig service failed to connect to a wireless network.NSA Recommended
WLAN-AutoConfig/Operational8003WLAN AutoConfig service has successfully disconnected from a wireless network.NSA Recommended
WMI-Activity/Operational5857%1 provider started with result code %2.Palantir, ASD, Yamato Security, JSCU-NL Recommended
WMI-Activity/Operational5858Id = %1; ClientMachine = %2; User = %3; ClientProcessId = %4; Component = %5; Operation = %6; ResultCode = %7; PossibleCause = %8.Palantir, ASD, Yamato Security, JSCU-NL Recommended
WMI-Activity/Operational5859Namespace = %1; NotificationQuery = %2; OwnerName = %3; HostProcessID = %4; Provider= %5, queryID = %6; PossibleCause = %7.Palantir, ASD, Yamato Security Recommended
WMI-Activity/Operational5860Namespace = %1; NotificationQuery = %2; UserName = %3; ClientProcessID = %4, ClientMachine = %5; PossibleCause = %6.Palantir, ASD, Yamato Security, JSCU-NL Recommended
WMI-Activity/Operational5861Namespace = %1; Eventfilter = %2 (refer to its activate eventid:5859); Consumer = %3; PossibleCause = %4.Palantir, ASD, Olaf Hartong, Yamato Security, JSCU-NL Recommended
MsiInstaller/Application1022Product: Microsoft .NSA Recommended
MsiInstaller/Application1033Windows Installer installed the product.NSA Recommended
PowerShell/Windows PowerShell300Olaf Hartong Recommended
PowerShell/Windows PowerShell400ASD, Olaf Hartong Recommended
PowerShell/Windows PowerShell403Olaf Hartong Recommended
PowerShell/Windows PowerShell800Microsoft-WEF, ANSSI Recommended
Service Control Manager/System7000Microsoft-WEF Recommended
Service Control Manager/System7022NSA Recommended
Service Control Manager/System7023NSA Recommended
Service Control Manager/System7024NSA Recommended
Service Control Manager/System7026NSA Recommended
Service Control Manager/System7031NSA, JSCU-NL Recommended
Service Control Manager/System7032NSA Recommended
Service Control Manager/System7034NSA, JSCU-NL Recommended
Service Control Manager/System7036The Microsoft Software Shadow Copy Provider service entered the stopped state.Palantir Recommended
Service Control Manager/System7040The start type of the msdsm service was changed from boot start to demand start.Palantir, Olaf Hartong, JSCU-NL Recommended
Service Control Manager/System7045A service was installed in the system.Palantir, Olaf Hartong Recommended
Service-Control-Manager/System7000ANSSI Recommended
Service-Control-Manager/System7045A service was installed in the system.ASD, ANSSI Recommended
Splunk-UBA Low
USER32/System1074Microsoft-WEF Recommended
User32/System1074JSCU-NL Recommended
VSSAudit/Security8222Splunk-UBA Low
Windows-Error-Reporting/Application1001Fault bucket , type 0 Event Name: crashpad_log Response: Not available Cab Id: 0 Problem signature: P1: MicrosoftEdgeUpdate.ASD Recommended