SIEM

Notable Event Log EventID’s for Incident Response, Threat Hunting, Forensics, etc

Security Events

Quick-use filter string

1100, 1102, 4618, 4624, 4625, 4634, 4647, 4648, 4657, 4670, 4672, 4688, 4689, 4692, 4693, 4695, 4697, 4698, 4702, 4703, 4704, 4715, 4717, 4718, 4719, 4720, 4722, 4723, 4724, 4725, 4726, 4731, 4732, 4733, 4734, 4735, 4738, 4739, 4740, 4767, 4776, 4778, 4779, 4780, 4781, 4782, 4793, 4798, 4800, 4801, 4803, 4816, 4817, 4882, 4885, 4890, 4906, 4907, 4908, 4912, 4946, 4947, 4948, 4950, 4951, 4952, 4953, 4956, 4957, 4958, 4964, 5025, 5027, 5028, 5029, 5030, 5031, 5034, 5035, 5037, 5038, 5142, 5143, 5144, 5146, 5158, 5376, 5377, 5378, 6145, 6273, 6276, 6280, 6281, 6410, 6416, 6419, 6420, 6421, 6422, 6423, 6424

Quick-use filter-OUT string

-5447,-4945,-4957,-5379,-4662,-4673
EventID Description Filter
1100 The event logging service has shut down.  
1102 The audit log was cleared.  
4611 A trusted logon process has been registered with the Local Security Authority.  
4616 The system time was changed.  
4618 A monitored security event pattern has occurred.  
4624 An account was successfully logged on.  
4625 An account failed to log on.  
4634 An account was logged off.  
4647 User initiated logoff.  
4648 A logon was attempted using explicit credentials.  
4657 A registry value was modified. OperationType %%1904, %%1905, %%1906
4670 Permissions on an object were changed.  
4672 Special privileges assigned to new logon.  
4688 A new process has been created.  
4689 A process has exited.  
4692 Backup of data protection master key was attempted.  
4693 Recovery of data protection master key was attempted.  
4695 Unprotection of auditable protected data was attempted.  
4697 A service was installed in the system.  
4698 A scheduled task was created.  
4699 A scheduled task was deleted.  
4700 A scheduled task was enabled.  
4702 A scheduled task was updated.  
4703 A user right was adjusted.  
4704 A user right was assigned.  
4715 The audit policy (SACL) on an object was changed.  
4717 System security access was granted to an account.  
4718 System security access was removed from an account.  
4719 System audit policy was changed.  
4720 A user account was created.  
4722 A user account was enabled.  
4723 An attempt was made to change an account’s password.  
4724 An attempt was made to reset an account’s password.  
4725 A user account was disabled.  
4726 A user account was deleted.  
4731 A security-enabled local group was created.  
4732 A member was added to a security-enabled local group.  
4733 A member was removed from a security-enabled local group.  
4734 A security-enabled local group was deleted.  
4735 A security-enabled local group was changed.  
4738 A user account was changed.  
4739 Domain Policy was changed.  
4740 A user account was locked out.  
4767 A user account was unlocked.  
4776 The domain controller attempted to validate the credentials for an account.  
4778 A session was reconnected to a Window Station.  
4779 A session was disconnected from a Window Station.  
4780 The ACL was set on accounts which are members of administrators groups.  
4781 The name of an account was changed.  
4782 The password hash an account was accessed.  
4793 The Password Policy Checking API was called.  
4798 A user’s local group membership was enumerated.  
4800 The workstation was locked.  
4801 The workstation was unlocked.  
4803 The screen saver was dismissed.  
4816 RPC detected an integrity violation while decrypting an incoming message.  
4817 Auditing settings on object were changed.  
4882 The security permissions for Certificate Services changed.  
4885 The audit filter for Certificate Services changed.  
4890 The certificate manager settings for Certificate Services changed.  
4906 The CrashOnAuditFail value has changed.  
4907 Auditing settings on object changed  
4908 Special Groups Logon table modified  
4912 Per-User Audit Policy changed  
4946 A change has been made to Windows Firewall exception list. A rule was added.  
4947 A change has been made to Windows Firewall exception list. A rule was modified.  
4948 A change has been made to Windows Firewall exception list. A rule was deleted.  
4950 A Windows Firewall setting has changed (local only)  
4951 A rule has been ignored because its major version number was not recognized by Windows Firewall.  
4952 Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.  
4953 Windows Firewall ignored a rule because it could not be parsed.  
4956 Windows Firewall has changed the active profile.  
4957 Windows Firewall did not apply the following rule.  
4958 Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.  
4964 Special groups assigned to a new logon  
5025 Windows Firewall Service has been stopped  
5027 Windows Firewall Service unable to retrieve the security policy from the local storage service will continue enforcing the current policy  
5028 Windows Firewall Service unable to parse the new security policy service will continue with currently enforced policy  
5029 Windows Firewall Service failed to initialize the driver service will continue to enforce the current policy  
5030 Windows Firewall Service failed to start  
5031 The Windows Firewall Service blocked an application from accepting incoming connections on the network.  
5034 The Windows Firewall Driver was stopped  
5035 Windows Firewall Driver failed to start  
5037 Windows Firewall Driver detected critical runtime error Terminating  
5038 Code integrity determined that the image hash of a file is not valid Level 0 or 4
5142 Network share object added  
5143 Network share object changed  
5144 Network share object deleted  
5146 The Windows Filtering Platform has blocked a packet.  
5158 The Windows Filtering Platform has permitted a bind to a local port.  
5376 Credential Manager credentials were backed up  
5377 Credential Manager credentials were restored from a backup.  
5378 The requested credentials delegation was disallowed by policy.  
6145 One or more errors occurred while processing security policy in the group policy objects.  
6273 Network Policy Server denied access to a user  
6276 Network Policy Server quarantined a user  
6280 Network Policy Server unlocked the user account  
6281 Code Integrity determined that the page hashes of an image file are not valid. Level 0 or 4
6410 Code integrity determined that a file does not meet the security requirements to load into a process. Level 0 or 4
6416 A new external device was recognized by the system  
6419 A request was made to disable a device.  
6420 A device was disabled.  
6421 A request was made to enable a device.  
6422 A device was enabled.  
6423 The installation of this device is forbidden by system policy.  
6424 The installation of this device was allowed after having previously been forbidden by policy.  

Security Events (Domain Controller Specific)

| EventID | Description | Filter | | ——- | ————————————————————————————– | —— | | 4649 | A replay attack was detected. | | | 4706 | A new trust was created to a domain. | | | 4707 | A trust to a domain was removed. | | | 4713 | Kerberos policy was changed. | | | 4716 | Trusted domain information was modified. | | | 4727 | A security-enabled global group was created. | | | 4728 | A member was added to a security-enabled global group. | | | 4729 | A member was removed from a security-enabled global group. | | | 4730 | A security-enabled global group was deleted. | | | 4737 | A security-enabled global group was changed. | | | 4741 | A computer account was created. | | | 4742 | A computer account was changed. | | | 4743 | A computer account was deleted. | | | 4754 | A security-enabled universal group was created. | | | 4755 | A security-enabled universal group was changed. | | | 4756 | A member was added to a security-enabled universal group. | | | 4757 | A member was removed from a security-enabled universal group. | | | 4764 | A group’s type was changed. | | | 4765 | SID History was added to an account. | | | 4766 | An attempt to add SID History to an account failed. | | | 4768 | A Kerberos authentication ticket (TGT) was requested. | | | 4769 | A Kerberos service ticket was requested. | | | 4770 | A Kerberos service ticket was renewed. | | | 4771 | Kerberos pre-authentication failed. | | | 4794 | An attempt was made to set the Directory Services Restore Mode administrator password. | | | 4799 | A security-enabled local group membership was enumerated. | | | 4865 | A trusted forest information entry was added. | | | 4866 | A trusted forest information entry was removed. | | | 4867 | A trusted forest information entry was added. | | | 5136 | A directory service object was modified. [1] | | | 5137 | A directory service object was created. | | | 5138 | A directory service object was undeleted | | | 5139 | A directory service object was moved. | | | 5140 | (NOISY!) Network share object accessed | |

System Events

| EventID | Description | Filter | | :—–: | :———————————————————————————————- | ———————- | | 12 | The operating system started at system time xxxx | | | 13 | The operating system is shutting down at system time xxxx | | | 27 | Network link is disconnected | !source=Kernel-Boot | | 33 | Network link has been established | !source=Kernel-Boot | | 41 | The system has rebooted without cleanly shutting down first | | | 42 | The system is entering sleep | | | 104 | Event Log was Cleared | | | 105 | Power source change | | | 107 | The system has resumed from sleep | | | 219 | Failed Kernel Driver Loading | Level 3 | | 1001 | System Crash | | | 7022 | Service hung on starting | Level 0, 1, 2, 3, or 4 | | 7023 | Service terminated with error | Level 0, 1, 2, 3, or 4 | | 7024 | Service terminated with the following service-specific error | Level 0, 1, 2, 3, or 4 | | 7026 | The boot-start or system-start driver(s) [did not/failed to] load | Level 0, 1, 2, 3, or 4 | | 7030 | Service Creation Errors | | | 7031 | Service terminated unexpectedly | Level 0, 1, 2, 3, or 4 | | 7032 | Service tried to take a corrective action (1) after the unexpected termination of the % service | Level 0, 1, 2, 3, or 4 | | 7034 | service terminated unexpectedly | Level 0, 1, 2, 3, or 4 | | 7035 | The [Service Name] service was successfully sent a [start/stop] control | | | 7036 | The [Service Name] service entered the [Status] state | | | 7040 | The service state has changed | Level 0, 1, 2, 3, or 4 | | 7045 | A service was installed in the system | Level 0, 1, 2, 3, or 4 |

Application

| EventID | Description | | :—–: | :————————————————————- | | 1001 | Application Crash | | 1002 | Application Hang | | 1003 | Application Error | | 11707 | Product: [1] –- Installation operation completed successfully. | | 11724 | Product: [1] – Removal completed successfully. |

Note: Some installable applications are known to write to this log. Consider looking in your logs to determine if any more are necessary for proper visibility.

Microsoft-Windows-AppLocker/EXE and DLL

| EventID | Description | | :—–: | ——————————————- | | 8003 | … would have been prevented from running. | | 8004 | … was prevented from running. |

Microsoft-Windows-AppLocker/MSI and Script

| EventID | Description | | :—–: | ——————————————- | | 8006 | … would have been prevented from running. | | 8007 | … was prevented from running. |

Microsoft-Windows-AppLocker/Packaged app-Execution

| EventID | Description | | :—–: | ——————————- | | 8022 | … was prevented from running. |

Microsoft-Windows-AppLocker/Packaged app-Deployment

| EventID | Description | | :—–: | ——————————- | | 8025 | … was prevented from running. |

Microsoft-Windows-Authentication/AuthenticationPolicyFailures-DomainController

| EventID | Description | | :—–: | ——————————————————————- | | 101 | NTLM usage attempted. | | 105 | Kerberos authentication from a particular device was not permitted. | | 106 | The user or device was not allowed to authenticate to the server. | | 305 | Kerberos TGT request did not meet access control restrictions. | | 306 | User, device or both do not meet the access control restrictions. |

Microsoft-Windows-Authentication/ProtectedUserFailures-DomainController

| EventID | Description | | :—–: | ——————————————————————————————————— | | 100 | An NTLM sign-in failure occurs for an account that is in the Protected Users security group. | | 104 | The security package on the client does not contain the credentials. | | 303 | A Kerberos ticket-granting-ticket (TGT) was successfully issued for a member of the Protected User group. |

Microsoft-Windows-Bits-Client/Operational

(All)

Microsoft-Windows-CodeIntegrity/Operational

| EventID | Description | Filter | | :—–: | ————————————————————————————————————————————————————————————————————————————————————————————– | ———— | | 3001 | Code Integrity determined an unsigned kernel module %2 is loaded into the system. Check with the publisher to see if a signed version of the kernel module is available. | Level 2 or 3 | | 3002 | Code Integrity is unable to verify the image integrity of the file %2 because the set of per-page image hashes could not be found on the system. | Level 2 or 3 | | 3003 | Code Integrity is unable to verify the image integrity of the file %2 because the set of per-page image hashes could not be found on the system. The image is allowed to load because kernel mode debugger is attached. | Level 2 or 3 | | 3004 | Windows is unable to verify the image integrity of the file %2 because file hash could not be found on the system. A recent hardware or software change might have installed a file that is signed incorrectly or damaged, or that might be malicious software from an unknown source. | Level 2 or 3 | | 3010 | Code Integrity was unable to load the %2 catalog. | Level 2 or 3 | | 3023 | Windows is unable to verify the integrity of the file %2 because the signing certificate has been revoked. Check with the publisher to see if a new signed version of the kernel module is available. | Level 2 or 3 |

Microsoft-Windows-DNSServer/Audit

| EventID | Description | Filter | | :—–: | ——————————————————————— | —— | | 541 | The setting serverlevelplugindll on scope . has been set to $dll_path |

Microsoft-Windows-DNS-Client/Operational

| EventID | Description | Filter | | :—–: | ——————————— | —— | | 3008 | DNS Client events Query Completed |

Microsoft-Windows-DriverFrameworks-UserMode/Operational

| EventID | Description | | :—–: | :———————– | | 2004 | User-Mode drivers loaded |

Microsoft-Windows-Forwarding/Operational

(All)

Microsoft-Windows-GroupPolicy

| EventID | Description | Filter | | :—–: | —————————————————————————————————– | ——- | | 1085 | Windows failed to apply the … settings | Level 2 | | 1125 | The processing of Group Policy failed because of an internal system error. | Level 2 | | 1127 | The processing of Group Policy failed due to an internal error. | Level 2 | | 1129 | The processing of Group Policy failed because of lack of network connectivity to a domain controller. | Level 2 |

Microsoft-Windows-Kernel-PnP/Device Configuration

| EventID | Description | | :—–: | :—————————- | | 400 | New Mass Storage Installation | | 410 | New Mass Storage Installation |

Microsoft-Windows-NTLM/Operational

| EventID | Description | | :—–: | :——————————————————————————————- | | 8001 | NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked. | | 8002 | NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked. | | 8003 | NTLM server blocked in the domain audit: Audit NTLM authentication in this domain. | | 8004 | Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller. |

Microsoft-Windows-PrintService/Operational

| EventID | Description | Filter | | :—–: | :———- | ——- | | 307 | Print Job | Level 4 |

Microsoft-Windows-PowerShell/Analytic

EventID Description
32850 Creating a server remote session
32867 PowerShell input object
32868 PowerShell output object

Microsoft-Windows-PowerShell-DesiredStateConfiguration-FileDownloadManager/Operational

(All)

Microsoft-Windows-Powershell/Operational

| EventID | Description | | :——–: | :—————————— | | 4103 | Pipeline executed | | 4104 | Scriptblock executed | | 40961 | PowerShell Console Starting | | 40962 | PowerShell Console Started | | 24577 | Powershell script ran | | 8193, 8194 | Session created | | 8197 | Session Closed | | 53504 | Records the authenticating user |

Microsoft-Windows-RemoteDesktopServices-RdpCoreTS/Operational

| EventID | Description | | :—–: | ——————————————- | | 131 | Accepted new TCP connection | | 140 | Connection failed; bad username or password |

Microsoft-Windows-Security-Mitigations/KernelMode

| EventID | Description | | :—–: | ——————————————————————- | | * | This event log contains log about the “Exploit Protection” feature. |

Microsoft-Windows-Shell-Core/Operational

| EventID | Description | | :—–: | ————————————————————————————————————————————————————————————————————— | | 9707 | Detects the start of the execution of a process from both the “Software\Microsoft\Windows\CurrentVersion\Run” and “Software\Microsoft\Windows\CurrentVersion\RunOnce” registry keys with the full command line. | | 9708 | Detects when the aforementioned process finishes execution with the corresponding PID (Useful when the process is still running on the system). | | 28115 | Triggered when a shortcut is added to the “App Resolver Cache”. Indicates when an application is installed. |

Microsoft-Windows-SmartCard-Audit/Authentication

(All)

Microsoft-Windows-SmbClient/Security

| EventID | Description | | :—–: | ————————— | | 31001 | Failed login to destination |

Microsoft-Windows-Sysmon/Operational

| EventID | Description | | :—–: | —————————————————– | | 1 | Process creation | | 2 | A process changed a file creation time | | 3 | Network connection | | 4 | Sysmon service state changed | | 5 | Process terminated | | 6 | Driver loaded | | 7 | Image loaded | | 8 | CreateRemoteThread | | 9 | RawAccessRead | | 10 | ProcessAccess | | 11 | FileCreate | | 12 | RegistryEvent (Object create and delete) | | 13 | RegistryEvent (Value Set) | | 14 | RegistryEvent (Key and Value Rename) | | 15 | FileCreateStreamHash | | 17 | PipeEvent (Pipe Created) | | 18 | PipeEvent (Pipe Connected) | | 19 | WmiEvent (WmiEventFilter activity detected) | | 20 | WmiEvent (WmiEventConsumer activity detected) | | 21 | WmiEvent (WmiEventConsumerToFilter activity detected) | | 22 | DNSEvent (DNS query) | | 255 | Error |

Microsoft-Windows-TaskScheduler/Operational

| EventID | Description | | :—–: | :——————————————— | | 106 | Task Scheduled | | 129 | Task Scheduler successfully completed task … | | 140 | Task Updated | | 141 | Task Removed | | 200 | Task Executed | | 201 | Task Completed |

Microsoft-Windows-TerminalServices-RDPClient/Operational

| EventID | Description | | :—–: | ———————————- | | 1024 | RDP connection attempt | | 1025 | RDP connection made | | 1102 | multi-transport connection attempt | | 1103 | multi-transport connection made |

Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational

| EventID | Description | | :—–: | —————————– | | 1149 | User authentication succeeded |

Microsoft-Windows-TerminalServices-LocalSessionManager/Operational

| EventID | Description | | :—–: | ————————————————– | | 21 | Session logon succeeded | | 22 | Shell start notification received | | 23 | Session logoff succeeded | | 24 | Session has been disconnected | | 25 | Session reconnection succeeded | | 39 | Session has been disconnected by session | | 40 | Session has been disconnected, reason code |

Microsoft-Windows-TPM-WMI

| EventID | Description | | :—–: | ——————————————————————————————————- | | 513 | TPM Owner Authorization information was backed up successfully to Active Directory Domain Services. | | 514 | Failed to backup TPM Owner Authorization information to Active Directory Domain Services. Errorcode: %1 |

Microsoft-Windows-UniversalTelemetryClient/Operational

| EventID | Description | | :—–: | ————————————————— | | 55 | Indicates whether the computer has Internet or Not. |

Microsoft-Windows-VHDMP-Operational

| EventID | Description | | :—–: | —————————————————————————— | | 1 | Triggers when you mount a VHD (Virtual Hard Disk). | | 2 | Triggers when you unmount a VHD (Virtual Hard Disk). | | 12 | Contains information about the type, path, handle count of the mounted device. |

Microsoft-Windows-Windows Defender/Operational

| EventID | Description | Filter | | :—–: | ——————————————————————————————————————————————————————————– | ——- | | 1002 | An antimalware scan was stopped before it finished. | Level 2 | | 1005 | An antimalware scan failed. | | 1006 | The antimalware engine found malware or other potentially unwanted software. | | 1007 | The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. | | 1008 | The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed. | | 1009 | The antimalware platform restored an item from quarantine. | | 1013 | The antimalware platform deleted history of malware and other potentially unwanted software. | | 1014 | The antimalware platform could not delete history of malware and other potentially unwanted software. | | 1015 | The antimalware platform detected suspicious behavior. | | 1116 | The antimalware platform detected malware or other potentially unwanted software. | | 1117 | The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. | | 1118 | The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed. | | 1119 | The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. There are more details in the event message. | | 2001 | The antimalware definition update failed. | | 2003 | The antimalware engine update failed. | | 2006 | The platform update failed. | | 2042 | The antimalware engine no longer supports this operating system, and is no longer protecting your system from malware. | | 3002 | Real-time protection encountered an error and failed. | | 5001 | Real-time protection is disabled. | | 5008 | The antimalware engine encountered an error and failed. | | 5010 | Scanning for malware and other potentially unwanted software is disabled. | | 5012 | Scanning for viruses is disabled. | | 5101 | The antimalware platform is expired. |

Microsoft-Windows-Windows Firewall With Advanced Security/Firewall

| EventID | Description | | :—–: | —————————————– | | 2002 | Windows Defender Firewall setting changed | | 2004 | Firewall Rule Added | | 2005 | Firewall Rule Changed | | 2006 | Firewall Rule Deleted | | 2033 | Firewall Rule Deleted | | 2009 | Firewall Failed to load group policy |

Microsoft-Windows-Winlogon/Operational

| EventID | Description | | :—–: | ———————————————————————————————————————————————————— | | 811 | Triggers when a user logon to a machine. You can check for the “” subscriber notification in EID 811 to indicates that a user logged on via RDP. |

Microsoft-Windows-WinINet-Config/ProxyConfigChanged

| EventID | Description | | :—–: | ———————————————————————————————————————————————————- | | 5600 | Indicates change in the proxy configuration. For example if i change my proxy configuration from the “Internet Option” menu. The event will get generated. |

Microsoft-Windows-WLAN-AutoConfig/Operational

| EventID | Description | | :—–: | —————————————————————————— | | 8001 | WLAN AutoConfig service has successfully connected to a wireless network. | | 8003 | WLAN AutoConfig service has successfully disconnected from a wireless network. |

Microsoft-Windows-WMI-Activity/Operational

| EventID | Description | | :—–: | —————————————- | | 5857 | Provider started | | 5858 | Provider error | | 5860 | Registration of Temporary Event Consumer | | 5861 | Registration of Permanent Event Consumer |

Microsoft-Windows-WinRM/Operational

| EventID | Description | | :———-: | —————————— | | 6 | WSMan Session created | | 8 15, 16, 33 | WSMan Session deinitialization | | 81 | Processing Client Request | | 82 | Entering the plugin | | 134 | Sending response | | 91 | Session Created | | 168 | Authenticating attempt | | 169 | Authentication success |

EMET

Legacy. Final release was 2016. | EventID | Description | Filter | | :—–: | ———– | —————– | | 1 | | with Level 2 or 3 | | 2 | | with Level 2 or 3 |

DNS Server

| EventID | Description | Filter | | :—–: | ——————————————————- | —— | | 150 | DNS Server could not load or initialize the plug-in DLL | | 770 | DNS Server plugin DLL has been loaded |

Windows PowerShell

| EventID | Description | | :—–: | —————————- | | 400 | Engine started | | 403 | Engine stopped | | 800 | Includes partial script code |

Sources