Skip to content

Latest commit

 

History

History
560 lines (446 loc) · 34.7 KB

WindowsEventLogging.adoc

File metadata and controls

560 lines (446 loc) · 34.7 KB

Windows Event Logging

Overview

The table below provides an overview of the events further described in section Recommendations. From left to right the table contains the event category, a short summary of what the category entails and an estimate of the volume you can expect during collection.

Category Description Estimated Volume

Account Activity

Tracks account usage, creation, modification, privileges and group information.

High

Event Log Management

Records the clearing of event logs.

Low

External Devices

Records the use of external devices such as USB or storage devices.

Low

Network Activity (policy, default)

Network activity on the host which wasn’t included in other categories, e.g. DHCP leases, DNS, Remote Desktop use and BITS jobs.

Low

Scheduled Tasks (policy, default)

Records the creation and modification of Scheduled Tasks.

Low

Services

Records the creation and modification of services.

Low

Sysmon

Provides additional detection capabilities such as information about process creations, network activity, loading of drivers and more.

Depends on rule sets

System Security Extension

Records the loading of extension packages such as Security Support Providers (SSP) or Password Filters into the Local Security Authority (LSA) process.

Low

System Status

Records startup and shutdown of systems. Records application crashes and hangs.

Low

Object Access

Records access to network shares and objects that have system access control lists (SACL) specified.

High

Policy Changes

Records changes made to auditing policies.

Low

PowerShell

Records various PowerShell activity, including interactive usage.

Medium to High

Privilege Use

Records the use of sensitive privileges.

High

Process Monitoring

Provides visibility into which processes are created including command line arguments, accessed or terminated. In case of AppLocker also logs which processes (might) have been blocked.

Medium

Windows Defender

Windows Defender can detect malware and mitigate certain exploitation attempts.

Low

WMI

Records the use of Windows Management Instrumentation subscriptions and providers.

Low

Recommendations

Event Logs requiring changes to policies

For each category set out in section Overview, this section contains the recommended group policy settings to configure. Every group policy is accompanied by the option that should be set and the systems you should configure the policy for. Policies can be configured for one or more of the following: Clients, Member Servers, Domain Controllers or All.

We’ve provided a JSON mapping that gives insight into which Event ID gets generated by which Group Policy Setting. For each of the group policies configured you may refer to this mapping to determine which event IDs should be monitored and centrally collected.

Warning
The JSON mapping of the Event IDs does not contain every possible event that could be generated by a particular policy. It contains the event IDs which, by our assessment, provide the most value for detection or forensic purposes.

If you prefer a standard table format, you may find one at the end of this document, which is also derived from the JSON mapping.

Account Activity

Assists in tracking down the unauthorized use or modification of an account. Can also be used to identify suspicious lateral movement through the network and indicate brute-forcing or privilege escalation attempts.

Kerberos Authentication

Events in this category are related to ticket operations (Ticket Granting Ticket and Service Ticket requests) for the Kerberos authentication protocol.

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Account Logon

Group Policy Setting Option Configure for

Audit Kerberos Authentication Service

Success & Failure

Domain Controllers

Audit Kerberos Service Ticket Operations

Success & Failure

Domain Controllers

Logon/Logoff

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Logon/Logoff

Group Policy Setting Option Configure for

Audit Logon

Success & Failure

All

Audit Logoff

Success

All

Audit Special Logon

Success

All

Audit Other Logon/Logoff events

Success & Failure

All

Audit Account Lockout

Failure

All

Audit Group Membership

Success

All

Account Management

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Account Management

Group Policy Setting Option Configure for

Audit User Account Management

Success & Failure

All

Audit Security Group Management

Success

All

Audit Computer Account Management

Success

Domain Controllers

Audit Other Account Management

Success

Domain Controllers

External Devices

Some organizations have guidelines or policies in place to limit the use of external devices. You can use the events in this category to keep track of which external devices are being used in your network. This can be especially helpful to identify rogue devices in sensitive environments.

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Detailed Tracking

Group Policy Setting Option Configure for

Audit PNP Activity

Success

All

Network Activity

The events described here are aimed at providing additional context during analysis such as having a history of DHCP leases or domain names that may have been resolved in the past.

Address Assignment (DHCP)

Records the assignment of IP addresses to interfaces. This information can be useful during analysis to determine which IP address was assigned to a system at some point in time.

For these events to be available the DHCP-Client and DHCPv6-Client channel must be enabled. There are multiple ways these channels can be enabled but we found that using PowerShell provides the most reliable result.

$logs = Get-WinEvent -ListLog "Microsoft-Windows-Dhcp*-Client/Operational"
Foreach($log in $logs) {
    $log.IsEnabled = $true
    $log.MaximumSizeInBytes = $10MB
    $log.SaveChanges()
}

You should distribute these commands across your domain according to your company’s deployment strategy using elevated privileges. Deployment using configuration management software is preferred. Alternatively you can use something like an apply once scheduled task using group policies[1].

Name Resolution (DNS)

Malware may attempt to resolve domain names for the retrieval of additional files or communicating with Command & Control servers. Collecting DNS queries can be helpful in order to enable the discovery of compromise or intrusion during analysis.

Computer Configuration → Preferences → Windows Settings → Registry → New → Registry Item

DNS-Client: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-DNS-Client/Operational

Value Name Value Type Value data Configure for

Enabled

REG_DWORD

1

Domain Controllers Member Servers

Clients generate many DNS events during normal operations and have therefore been excluded. You may consider enabling it depending on your environment

Object Access

Events related to object access can help identify unauthorized access to sensitive files, registry locations or processes (like LSASS). You may audit these objects using System Access Control Lists (SACLs).

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Object Access

Network Shares

Records creation and access attempts of network shares.

Group Policy Setting Option Configure for

Audit File Share

Success & Failure

All

Recording network share activity can amount to considerable volume. Refer to the JSON mapping or subscription file to see how we reduce the noise by filtering common share activity

Registry

Configuring this policy only generates events for registry objects that have a SACL specified.

Group Policy Setting Option Configure for

Audit Registry

Success

All

Process Access

Kernel objects such as processes, file systems and registry objects can be audited. Events for these objects are only generated if the object has a SACLs defined. Configuring this group policy will by default record read and write access to the memory of the Local Security Authority Subsystem Service (LSASS.EXE) process. Monitoring LSASS is essential for the detection of unauthorized access to credentials.

Group Policy Setting Option Configure for

Audit Kernel Object

Success

All

Policy Changes

Events in this category are related to changes being made to the auditing and authentication policies. Many of the events are enabled by default. Configuring the policies below further increases the visibility into unauthorized or unusual policy changes.

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Policy Change

Group Policy Setting Option Configure for

Audit Audit Policy Change

Success

All

Audit Authentication Policy Change

Success

All

PowerShell

Script Block Logging produces an audit trail of executed code and is included in PowerShell version 5. PowerShell is often used by administrators but may also be abused for malicious purposes such as downloading and executing malware, lateral movement through the network and evading defense mechanisms.

Computer Configuration → Policies → Administrative Templates → Windows Components → Windows PowerShell

Group Policy Setting Option Configure for

Turn on PowerShell Script Block Logging

Enabled

All

Privilege Use

Records the use of sensitive privileges such as impersonating another account after authentication, debugging programs and the loading/unloading of device drivers[2].

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Privilege Use

Group Policy Setting Option Configure for

Audit Sensitive Privilege Use

Success & Failure

All

Process Monitoring

Events in this category are related to the creation of malicious processes, suspicious access to sensitive processes or misuse of legitimate tools to assist in defense evasion. If application whitelisting is being used in your organisation this category also includes events that indicate a program has been prevented from running.

Process Creation/Termination

Logs the creation and termination of processes. It’s important to include command line process auditing[3].

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Detailed Tracking

Group Policy Setting Option Configure for

Audit Process Creation

Success

All

Audit Process Termination

Success

All

Computer Configuration → Policies → Administrative Templates → System → Audit Process Creation

Group Policy Setting Option Configure for

Include Command Line in process creation events

Enabled

All

Application Whitelisting

Event Logging related to Application Whitelisting provides historical data of which applications (would) have been blocked from execution. These logs will only be available if AppLocker[4] or Software Restriction Policies[5] are configured in the environment. Once configured no additional changes are needed for logs to be available.

Channel Action

Microsoft-Windows-AppLocker

Validate if configured

Microsoft-Windows-SoftwareRestrictionPolicies

Validate if configured

Scheduled Tasks

Events in this category are related to the creation, activation and modification of Scheduled Tasks. Scheduled Tasks may be abused to facilitate automatic and recurring execution of malicious code for persistence.

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Object Access

Group Policy Setting Option Configure for

Audit Other Object Access Events

Success

All

System Integrity

System Security Extension

Events in this category are related to the loading of an authentication package, notification package or security package. These extensions are used to register with the Local Security Authority and will be used to authenticate logon attempts or submit logon requests. Example extensions include Security Support Providers such as Kerberos and NTLM. Tracking these events allows one to identify malicious packages being loaded into the LSA process which can be used to gain access to credentials and establish persistence to the network.

Configuring this policy also records the installation of a new service. New services may be created or existing services modified to facilitate persistence to the network. Services may also be used to escalate privileges.

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → System

Group Policy Setting Option Configure for

Audit Security System Extension

Success

All

Kernel Driver Loading

Code Integrity Guard detects whether an unsigned driver or system file is being loaded into the kernel, or whether a system file has been modified by malicious software. Events are generated when page hashes or the hash of an image file are not valid.

Computer Configuration → Policies → Windows Settings → Security Settings → Advanced Audit Policy Configuration → System

Group Policy Setting Option Configure for

Audit System Integrity

Failure

All

Font Files

Configuring this policy enables you to audit untrusted or attacker-controlled font files. The audit mode for this setting turns on event logging, but does not block fonts from loading.

Computer Configuration → Policies → Administrative Templates → System → Mitigation Options

Group Policy Setting Option Configure for

Untrusted Font Blocking

Enabled: Log events without blocking untrusted fonts

All

Event Logs configured by default

The event log sources below are available by default and should be collected as they provide additional context when investigating suspicious behavior. You should verify these log sources are active and enable them if they have been disabled in the past. The relevant Event IDs for each of the mentioned providers can be identified using the JSON mapping or the table at the end of this document.

Event Log Management

When event log archiving or forwarding is set up, it is unlikely that during normal operations the event logs are cleared. If this happens it could be an indication of someone covering their tracks. The events in this provider record when logs are cleared.

Network Activity

Events in this category can be used for the detection of unusual network activity by or against hosts for purposes such as lateral movement or achieving persistence.

Remote Desktop

Events related to the usage of Remote Desktop. Unusual network activity can for example include remote logins to systems which are unexpected or do not typically occur during normal operations.

BITS Job Information

Events related to the Microsoft Background Intelligent Transfer Service (BITS). BITS jobs can be used for persistence or downloading additional files from external locations.

Scheduled Tasks

In addition to the Object Access policy, events in the dedicated TaskScheduler channel provide additional context surrounding the starting and finishing of scheduled tasks.

Services

Records failures and crashes of Windows Services. The installation of new services is tracked by System Security Extension.

System Monitor (Sysmon)

Microsoft Sysmon provides additional detection capabilities, based on a user-specified configuration. If you have Sysmon configured in your environment, you should add the events to your collection strategy. If you are using our default subscription file, the events are already included.

Our current advice does not cover the deployment or configuration of Sysmon. If you have deployed Sysmon, you should tweak your configuration for your environment to prevent spamming of events.

System Status

Events in this category include: startup and shutdown of a system, application crashes and modifications to the system time. Tracking the startup and shutdown events of a system can provide additional context during analysis. Unstable or crashing applications may be an indication of malicious activity or exploitation attempts.

Windows Defender

Windows Defender is an antispyware and antivirus solution developed by Microsoft. Besides its Antivirus capability Windows Defender consists of several components to detect or prevent malicious behavior. One of these components, Exploit Protection, applies a number of exploit mitigation techniques to operating system processes and applications[6]. By default some critical processes are already being monitored. Whenever Microsoft Defender detects or prevents exploitation attempts it generates an event in the Microsoft-Windows-Security-Mitigations\* channel.

Another noteworthy component of Windows Defender, Attack Surface Reduction (ASR) uses rules to reduce the places (vulnerabilities) adversaries can use to compromise the organization[7][8]. If your organization currently does not have ASR configured, we recommend configuring ASR rules in audit mode to record suspicious activity when rules are triggered. Using audit mode you can evaluate the impact ASR rules would have on your organization when ASR is configured in block mode or add exclusions to reduce noise. ASR alerts, just like regular malware detections, are recorded in the Microsoft-Windows-Windows Defender/Operational channel.

If third party solutions are being used instead of Windows Defender you should consider collecting logs for those instead.

WMI

Windows Management Instrumentation (WMI) provides a management interface to the operating system, WMI also uses a consumer/filter model to trigger actions based on events. These WMI Subscriptions can be used for gaining persistence.

Table of Events to Collect

Below is a generated table based on the JSON mapping which events you should collect. This table can be used to configure your central collection.

Channel Provider EventID On by default

Application

Application Error

1000

True

Application

Application Hang

1002

True

Application

Microsoft-Windows-SoftwareRestrictionPolicies

865

True

Application

Microsoft-Windows-SoftwareRestrictionPolicies

866

True

Application

Microsoft-Windows-SoftwareRestrictionPolicies

867

True

Application

Microsoft-Windows-SoftwareRestrictionPolicies

868

True

Application

Microsoft-Windows-SoftwareRestrictionPolicies

882

True

Microsoft-Windows-AppLocker/EXE and DLL

Microsoft-Windows-AppLocker

8002

True

Microsoft-Windows-AppLocker/EXE and DLL

Microsoft-Windows-AppLocker

8003

True

Microsoft-Windows-AppLocker/EXE and DLL

Microsoft-Windows-AppLocker

8004

True

Microsoft-Windows-AppLocker/MSI and Script

Microsoft-Windows-AppLocker

8005

True

Microsoft-Windows-AppLocker/MSI and Script

Microsoft-Windows-AppLocker

8006

True

Microsoft-Windows-AppLocker/MSI and Script

Microsoft-Windows-AppLocker

8007

True

Microsoft-Windows-AppLocker/Packaged app-Deployment

Microsoft-Windows-AppLocker

8023

True

Microsoft-Windows-AppLocker/Packaged app-Execution

Microsoft-Windows-AppLocker

8020

True

Microsoft-Windows-Bits-Client/Operational

Microsoft-Windows-Bits-Client

1

True

Microsoft-Windows-Bits-Client/Operational

Microsoft-Windows-Bits-Client

3

True

Microsoft-Windows-Bits-Client/Operational

Microsoft-Windows-Bits-Client

4

True

Microsoft-Windows-Bits-Client/Operational

Microsoft-Windows-Bits-Client

59

True

Microsoft-Windows-DHCPv6-Client/Operational

Microsoft-Windows-DHCPv6-Client

51039

False

Microsoft-Windows-DNS-Client/Operational

Microsoft-Windows-DNS-Client

3008

False

Microsoft-Windows-Dhcp-Client/Operational

Microsoft-Windows-Dhcp-Client

50028

False

Microsoft-Windows-PowerShell/Operational

Microsoft-Windows-PowerShell

4104

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

1

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

2

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

3

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

4

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

5

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

6

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

7

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

8

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

9

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

10

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

11

True

Microsoft-Windows-Security-Mitigations/KernelMode

Microsoft-Windows-Security-Mitigations

12

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

13

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

14

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

15

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

16

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

17

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

18

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

19

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

20

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

21

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

22

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

23

True

Microsoft-Windows-Security-Mitigations/UserMode

Microsoft-Windows-Security-Mitigations

24

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

0

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

1

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

2

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

3

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

4

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

5

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

6

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

7

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

8

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

9

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

10

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

11

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

14

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

15

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

16

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

18

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

21

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

22

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

23

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

24

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

25

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

26

True

Microsoft-Windows-Sysmon/Operational

Microsoft-Windows-Sysmon

255

True

Microsoft-Windows-TaskScheduler/Operational

Microsoft-Windows-TaskScheduler

200

True

Microsoft-Windows-TaskScheduler/Operational

Microsoft-Windows-TaskScheduler

201

True

Microsoft-Windows-TerminalServices-RDPClient/Operational

Microsoft-Windows-TerminalServices-ClientActiveXCore

1024

True

Microsoft-Windows-WMI-Activity/Operational

Microsoft-Windows-WMI-Activity

5857

True

Microsoft-Windows-WMI-Activity/Operational

Microsoft-Windows-WMI-Activity

5858

True

Microsoft-Windows-WMI-Activity/Operational

Microsoft-Windows-WMI-Activity

5860

True

Microsoft-Windows-WMI-Activity/Operational

Microsoft-Windows-WMI-Activity

5861

True

Microsoft-Windows-Win32k/Operational

Microsoft-Windows-Win32k

260

False

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1006

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1007

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1008

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1009

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1010

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1116

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1117

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1118

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1119

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1121

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1122

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1123

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1124

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1125

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

1126

True

Microsoft-Windows-Windows Defender/Operational

Microsoft-Windows-Windows Defender

5007

True

Security

Microsoft-Windows-EventLog

1100

True

Security

Microsoft-Windows-EventLog

1102

True

Security

Microsoft-Windows-Security-Auditing

4610

False

Security

Microsoft-Windows-Security-Auditing

4611

False

Security

Microsoft-Windows-Security-Auditing

4614

False

Security

Microsoft-Windows-Security-Auditing

4616

True

Security

Microsoft-Windows-Security-Auditing

4622

False

Security

Microsoft-Windows-Security-Auditing

4624

False

Security

Microsoft-Windows-Security-Auditing

4625

False

Security

Microsoft-Windows-Security-Auditing

4627

False

Security

Microsoft-Windows-Security-Auditing

4634

False

Security

Microsoft-Windows-Security-Auditing

4647

False

Security

Microsoft-Windows-Security-Auditing

4648

False

Security

Microsoft-Windows-Security-Auditing

4649

False

Security

Microsoft-Windows-Security-Auditing

4657

False

Security

Microsoft-Windows-Security-Auditing

4663

False

Security

Microsoft-Windows-Security-Auditing

4672

False

Security

Microsoft-Windows-Security-Auditing

4673

True

Security

Microsoft-Windows-Security-Auditing

4688

False

Security

Microsoft-Windows-Security-Auditing

4689

False

Security

Microsoft-Windows-Security-Auditing

4697

False

Security

Microsoft-Windows-Security-Auditing

4698

False

Security

Microsoft-Windows-Security-Auditing

4699

False

Security

Microsoft-Windows-Security-Auditing

4700

False

Security

Microsoft-Windows-Security-Auditing

4701

False

Security

Microsoft-Windows-Security-Auditing

4702

False

Security

Microsoft-Windows-Security-Auditing

4706

False

Security

Microsoft-Windows-Security-Auditing

4713

False

Security

Microsoft-Windows-Security-Auditing

4715

False

Security

Microsoft-Windows-Security-Auditing

4716

False

Security

Microsoft-Windows-Security-Auditing

4717

False

Security

Microsoft-Windows-Security-Auditing

4719

False

Security

Microsoft-Windows-Security-Auditing

4720

False

Security

Microsoft-Windows-Security-Auditing

4722

False

Security

Microsoft-Windows-Security-Auditing

4723

False

Security

Microsoft-Windows-Security-Auditing

4724

False

Security

Microsoft-Windows-Security-Auditing

4725

False

Security

Microsoft-Windows-Security-Auditing

4726

False

Security

Microsoft-Windows-Security-Auditing

4727

False

Security

Microsoft-Windows-Security-Auditing

4728

False

Security

Microsoft-Windows-Security-Auditing

4729

False

Security

Microsoft-Windows-Security-Auditing

4730

False

Security

Microsoft-Windows-Security-Auditing

4731

False

Security

Microsoft-Windows-Security-Auditing

4732

False

Security

Microsoft-Windows-Security-Auditing

4733

False

Security

Microsoft-Windows-Security-Auditing

4734

False

Security

Microsoft-Windows-Security-Auditing

4735

False

Security

Microsoft-Windows-Security-Auditing

4737

False

Security

Microsoft-Windows-Security-Auditing

4738

False

Security

Microsoft-Windows-Security-Auditing

4739

False

Security

Microsoft-Windows-Security-Auditing

4740

False

Security

Microsoft-Windows-Security-Auditing

4741

False

Security

Microsoft-Windows-Security-Auditing

4742

False

Security

Microsoft-Windows-Security-Auditing

4743

False

Security

Microsoft-Windows-Security-Auditing

4754

False

Security

Microsoft-Windows-Security-Auditing

4755

False

Security

Microsoft-Windows-Security-Auditing

4756

False

Security

Microsoft-Windows-Security-Auditing

4757

False

Security

Microsoft-Windows-Security-Auditing

4758

False

Security

Microsoft-Windows-Security-Auditing

4764

False

Security

Microsoft-Windows-Security-Auditing

4767

False

Security

Microsoft-Windows-Security-Auditing

4768

False

Security

Microsoft-Windows-Security-Auditing

4769

False

Security

Microsoft-Windows-Security-Auditing

4771

False

Security

Microsoft-Windows-Security-Auditing

4778

False

Security

Microsoft-Windows-Security-Auditing

4779

False

Security

Microsoft-Windows-Security-Auditing

4780

False

Security

Microsoft-Windows-Security-Auditing

4781

False

Security

Microsoft-Windows-Security-Auditing

4782

False

Security

Microsoft-Windows-Security-Auditing

4794

False

Security

Microsoft-Windows-Security-Auditing

4798

False

Security

Microsoft-Windows-Security-Auditing

4799

False

Security

Microsoft-Windows-Security-Auditing

4817

False

Security

Microsoft-Windows-Security-Auditing

4826

True

Security

Microsoft-Windows-Security-Auditing

4865

False

Security

Microsoft-Windows-Security-Auditing

4866

False

Security

Microsoft-Windows-Security-Auditing

4867

False

Security

Microsoft-Windows-Security-Auditing

4904

False

Security

Microsoft-Windows-Security-Auditing

4905

False

Security

Microsoft-Windows-Security-Auditing

4906

False

Security

Microsoft-Windows-Security-Auditing

4907

False

Security

Microsoft-Windows-Security-Auditing

4908

False

Security

Microsoft-Windows-Security-Auditing

4912

False

Security

Microsoft-Windows-Security-Auditing

5038

False

Security

Microsoft-Windows-Security-Auditing

5140

False

Security

Microsoft-Windows-Security-Auditing

5142

False

Security

Microsoft-Windows-Security-Auditing

5376

False

Security

Microsoft-Windows-Security-Auditing

5377

False

Security

Microsoft-Windows-Security-Auditing

5632

False

Security

Microsoft-Windows-Security-Auditing

6281

False

Security

Microsoft-Windows-Security-Auditing

6410

False

Security

Microsoft-Windows-Security-Auditing

6416

False

System

Microsoft-Windows-EventLog

104

True

System

Microsoft-Windows-Kernel-General

12

True

System

Microsoft-Windows-Kernel-General

13

True

System

Microsoft-Windows-Kernel-Power

41

True

System

Microsoft-Windows-WER-Diag

5

True

System

Service Control Manager

7031

True

System

Service Control Manager

7034

True

System

Service Control Manager

7040

True

System

User32

1074

True