more event ids
This commit is contained in:
parent
e8c3e42f94
commit
2a561ac73f
|
|
@ -55,34 +55,46 @@ The `subject` is the account doing an action on an `object`.
|
||||||
their password
|
their password
|
||||||
* **4724**: Attempt to reset the account password. The user attempts to reset
|
* **4724**: Attempt to reset the account password. The user attempts to reset
|
||||||
the password of another account
|
the password of another account
|
||||||
* **4725**: Account disable
|
* **4725**: Account disabled
|
||||||
* **4726**: Account removed from systemved from system
|
* **4726**: Account removed from systemved from system
|
||||||
* **4728**: Attempt to add an account to a global security group
|
* **4728**: Attempt to add an account to a global security group (logged domain wide)
|
||||||
* **4729**: Attempt to remove an account from a global security group
|
* **4729**: Attempt to remove an account from a global security group
|
||||||
* **4732**: User was added to a security group (like Administrators)
|
* **4732**: User was added to a security group (like Administrators, logged on local or DC)
|
||||||
* **4733**: User was removed from a security group (like Administrators)
|
* **4733**: User was removed from a security group (like Administrators)
|
||||||
* **4738**: User account properties were changed
|
* **4738**: User account properties were changed
|
||||||
* **4740**: User account was locked after repeated attempt of access
|
* **4740**: User account was locked after repeated attempt of access
|
||||||
* **4756**: Attempt to add an account to a universal security group
|
* **4756**: Attempt to add an account to a universal security group (logged on entire ad forest)
|
||||||
* **4757**: Attempt to remove an account from a universal security group
|
* **4757**: Attempt to remove an account from a universal security group
|
||||||
* **4768**: Kerberos TGT request
|
* **4768**: Kerberos TGT request
|
||||||
* **4769**: Kerberos TGS request
|
* **4769**: Kerberos TGS request
|
||||||
* **4771**: Kerberos pre-auth failure
|
* **4771**: Kerberos pre-auth failure
|
||||||
|
* **4776**: Validate NTLM credentials at DC. This happens when the resource is
|
||||||
|
accessed via IP address, for legacy applications without Kerberos support or
|
||||||
|
auth between untrusted DC domains
|
||||||
|
|
||||||
### Account Logon
|
### Account Logon
|
||||||
|
|
||||||
These can be found via `Event Viewer` under `Windows Logs` -> `Security`.
|
These can be found via `Event Viewer` under `Windows Logs` -> `Security`.
|
||||||
The `Logon ID` is the session identifier.
|
The `Logon ID` is the session identifier.
|
||||||
|
|
||||||
* **4624**: Successful logon/login
|
* **4624**: Successful logon/login, Session created on target resource
|
||||||
* **4625**: Failed logon/login
|
* **4625**: Failed logon/login
|
||||||
* **4634** and **4647**: Logoff
|
* **4634** and **4647**: Logoff
|
||||||
* **4779**: Session disconnect
|
* **4779**: Session disconnect
|
||||||
|
|
||||||
|
### Active Directory Objects
|
||||||
|
|
||||||
|
* **5136**: Attribute-level modification on AD object (e.g. Group Policy Objects)
|
||||||
|
* **5140**: Object Access
|
||||||
|
|
||||||
### Logon Types
|
### Logon Types
|
||||||
|
|
||||||
* **10**: RDP
|
* **2**: Interactive
|
||||||
* **3**: Network
|
* **3**: Network
|
||||||
|
* **4**: Batch
|
||||||
|
* **5**: Service
|
||||||
|
* **7**: Unlock
|
||||||
|
* **10**: RDP
|
||||||
|
|
||||||
### Scheduled Tasks
|
### Scheduled Tasks
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue