Skip to content

Latest commit

 

History

History
110 lines (105 loc) · 8.38 KB

windows-event-id-logging-list.md

File metadata and controls

110 lines (105 loc) · 8.38 KB

Windows Event ID logging list

  • EventID 104: The System log file was cleared
    • Use Case - Clearing of logs
  • EventID 400 - Powershell Engine state is changed
    • Use Case - Powershell Downgrade Attack
  • EventID 1102 - The audit log was cleared
    • Use Case - Clearing of logs
  • EventID 2003 - Host Process asked to load drivers for device
    • Use Case - External media connected
  • EventID 2010 - Successfully loaded drivers for device
    • Use Case - External media connected
  • EventID 2100 - Received Pnp or Power operation for device
    • Use Case - External media connected
  • EventID 2101 - Completed Pnp or Power operation for device
    • Use Case - External media connected
  • Event ID 4103 - Powershell Module Loaded
    • Use Case - Abnormal Command Line Length
    • Use Case - Commands Encoded with Base64
    • Use Case - Execution of Downloaded Code
    • Use Case - Suspicious Command Line String
  • Event ID 4104 - Creation of Script Block
    • Use Case - Abnormal Command Line Length
    • Use Case - Commands Encoded with Base64
    • Use Case - Execution of Downloaded Code
    • Use Case - Suspicious Command Line String
  • Event ID 4105 - Script Block Execution Start
    • Use Case - Abnormal Command Line Length
    • Use Case - Commands Encoded with Base64
    • Use Case - Execution of Downloaded Code
    • Use Case - Suspicious Command Line String
  • Event ID 4106 - Script Block Execution Stop
    • Use Case - Abnormal Command Line Length
    • Use Case - Commands Encoded with Base64
    • Use Case - Execution of Downloaded Code
  • EventID 4624 - Successful login result
    • Use Case - Local Administrator Sign-on
    • Use Case - Workstation Name login with High Entropy
    • Use Case - Logon/Attempt from local account on remote host.
    • Use Case - Suspicious Command Line String
  • EventID 4625 - An account failed to log in.
    • Use Case - Logon/Attempt from local account on remote host.
  • EventID 4648 - Login attempted using explicit credentials
    • Use Case - Use of Explicit Credentials
  • EventID 4657 - A registry Value was modified
    • Use Case - New Scheduled Task
  • EventID 4697 - A service was installed on the system
    • Use Case - New Service Created
    • Use Case - New Service Installation with high entropy service name.
  • EventID 4698 - A scheduled task was created
    • Use Case - New Scheduled Task
  • EventID 4720 - User Account
    • Use Case - New local account created
  • EventID 4727: A security-enabled global group was created
    • Use Case - New Group Created/Deleted (Windows)
  • EventID 4728: A member was added to a security-enabled local group
    • Use Case - User added to security-enabled group
  • EventID 4730: A security-enabled global group was deleted
    • Use Case - New Group Created/Deleted (Windows)
  • EventID 4731: A security-enabled local group was created
    • Use Case - New Group Created/Deleted (Windows)
  • EventID 4732: A member was added to a security-enabled global group
    • Use Case - User added to security-enabled group
  • EventID 4734: A security-enabled local group was deleted
    • Use Case - New Group Created/Deleted (Windows)
  • EventID 4754: A security-enabled universal group was created
    • Use Case - New Group Created/Deleted (Windows)
  • EventID 4756: A member was added to a security-enabled universal group
    • Use Case - User added to security-enabled group
  • EventID 4758: A security-enabled universal group was deleted
    • Use Case - New Group Created/Deleted (Windows)
  • EventID 7045 - A service was installed on the system
    • Use Case - New Service Created
    • Use Case - New Service Installation with high entropy service name.
  • EventID 8002: Allowed EXE or DLL
    • Use Case - Allowed Application generator search
  • EventID 8003: Would have blocked EXE or DLL
    • Use Case - Applocker performed a blocking action
  • EventID 8004: Blocked EXE or DLL
    • Use Case - Applocker performed a blocking action
  • EventID 8005: Allowed MSI or Script
    • Use Case - Allowed Application generator search
  • EventID 8006: Would have blocked MSI or Script
    • Use Case - Applocker performed a blocking action
  • EventID 8007: Blocked MSI or Script
    • Use Case - Applocker performed a blocking action

Reference

AD Attack Detection

Attack Event ID
Account and Group Enumeration

4798: A user's local group membership was enumerated
4799: A security-enabled local group membership was enumerated

AdminSDHolder 4780: The ACL was set on accounts which are members of administrators groups
Kekeo

4624: Account Logon
4672: Admin Logon
4768: Kerberos TGS Request

Silver Ticket

4624: Account Logon
4634: Account Logoff
4672: Admin Logon

Golden Ticket

4624: Account Logon
4672: Admin Logon

PowerShell

4103: Script Block Logging
400: Engine Lifecycle
403: Engine Lifecycle
4103: Module Logging
600: Provider Lifecycle

DCShadow

4742: A computer account was changed
5137: A directory service object was created
5141: A directory service object was deleted
4929: An Active Directory replica source naming context was removed

Skeleton Keys

4673: A privileged service was called
4611: A trusted logon process has been registered with the Local Security Authority
4688: A new process has been created
4689: A new process has exited

PYKEK MS14-068

4672: Admin Logon
4624: Account Logon
4768: Kerberos TGS Request

Kerberoasting 4769: A Kerberos ticket was requested
S4U2Proxy 4769: A Kerberos ticket was requested
Lateral Movement

4688: A new process has been created
4689: A process has exited
4624: An account was successfully logged on
4625: An account failed to log on

DNSAdmin

770: DNS Server plugin DLL has been loaded
541: The setting serverlevelplugindll on scope . has been set to <dll path>
150: DNS Server could not load or initialize the plug-in DLL

DCSync 4662: An operation was performed on an object
Password Spraying

4625: An account failed to log on
4771: Kerberos pre-authentication failed
4648: A logon was attempted using explicit credentials