Windows Event¶
About¶
The Event Viewer is a Microsoft Management Console (MMC) snap-in that enables you to browse and manage event logs. It is an indispensable tool for monitoring the health of systems and troubleshooting issues when they arise. For the latest information about Event Viewer, see Event Viewer online.
Event Viewer enables you to perform the following tasks:
- View events from multiple event logs
- Save useful event filters as custom views that can be reused
- Schedule a task to run in response to an event
- Create and manage event subscriptions
Product Details¶
Vendor URL: Windows Event
Product Type: OS
Product Tier: Tier III
Integration Method: Syslog
Integration URL: Windows Event - Cyderes Documentation
Log Guide: Sample Logs by Log Type
Parser Details¶
Log Format: JSON and Syslog
Expected Normalization Rate: 80-90%
Data Label: WINEVTLOG
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
AccessMask | security_result.about.resource.name |
AccessList | security_result.rule_id. |
Account | principal.user.userid |
AccountDomain | target.administrative_domain |
AccountName | principal.user.roll_name |
AccountName | principal.user.user_display_name |
AccountName | principal.user.userid |
AccountName | target.user.user_display_name |
AccountName | target.user.userid |
AccountToReset | target.user.id |
AccountToReset | target.user.userid |
AccountType | principal.user.roll_description |
Action | about.labels.value |
ad_EventRecordID | metadata.product_log_id |
ad_properties | security_result.detection_fields.value.string_value |
AdditionalInfo | security_result.description |
Application | principal.application |
appname | observer.application |
Arguments | about.process.command_line |
AttributeLDAPDisplayName | target.resource.name |
AttributeLDAPDisplayName | target.resource.type |
attribute_value | target.user.userid. |
attribute_value | target.resource.name |
AttributeValue | security_reesult.rule_labels |
audit.info.process.name | principal.process.file.full_path |
audit.target.username | target.user.userid |
AuthenticationPackage | principal.application |
AuthenticationPackageName | principal.application |
AuthenticationPackageName | security_result.about.resource.name |
AuthenticationSetId | target.resource.id |
AuthenticationSetName | target.resource.name |
CallerComputerName | principal.hostname |
CallerProcessName | principal.process.file.full_path |
CalloutKey | about.labels.value |
CalloutName | about.labels.value |
cat | metadata.description |
Category | metadata.description |
ChangeType | about.labels.value |
Channel | security_result.summary |
ClassName | target.resource.resource_subtype |
client_ip | principal.ip |
ClientUserName | target.user.userid |
CloudAvailabilityZone | principal.cloud.availability_zone |
Command | about.process.command_line |
CommandLine | principal.process.command_line |
CommandName | target.application |
complete_username | principal.user.userid |
Computer | principal.hostname |
Computer | target.resource.type |
Computer: DocumentPrinted.Param4 | target.asset.asset_id |
Conditions | about.labels.value |
ConnectionSecurityRuleId | target.resource.id |
ConnectionSecurityRuleName | target.resource.name |
CryptographicSetId | target.resource.id |
CryptographicSetName | target.resource.name |
Data_1 | principal.ip |
Data_2 | target.url |
Data1 | target.user.userid |
Data2 | target.user.user_display_name |
database_name | target.hostname |
DestAddress | target.ip |
DestMACAddress | target.mac |
DestPort | target.port |
DEVICE | principal.resource.type |
DeviceDescription | target.resource.name |
deviceNtDomain | principal.administrative_domain |
DfsNamespace | target.resource.name |
Direction | network.direction |
dntdom | target.administrative_domain |
DocumentPrinted.Param3 | target.user.user_display_name |
DocumentPrinted.Param5 | target.resource.name |
DocumentPrinted.Param7 | target.file.size |
Domain | principal.administrative_domain |
Domain | target.administrative_domain |
domain | target.administration_domain |
DomainName | target.administrative_domain |
dproc | target.process.file.full_path |
dst | target.ip |
duid | about.labels.value |
dvc | principal.ip |
dvchost | principal.hostname |
event_params.HostApplication | target.file.full_path |
event_params.UserId | principal.user.userid |
event_type | observer.application |
EventCode | metadata.product_event_type |
EventID | metadata.product_event_type |
EventIDCode | metadata.product_event_type |
EventType | security_result.summary. |
ExecutionProcessId | principal.process.pid |
ExecutionProcessID | target.process.pid |
file_full_path | target.process.file.full_path |
filename | target.file.full_path |
filePath | target.file.full_path |
FilterId | target.resource.id |
FilterId | security_result.rule_id |
FilterKey | about.labels.value |
FilterName | target.resource.name |
FilterRTID | security_result.rule_id |
FilterType | about.labels.value |
GroupMembership | target.user.group_identifiers |
GroupName | target.group.group_display_name |
HiveName | target.registry.registry_key |
host | principal.hostname |
host | principal.hostname |
host.name | principal.hostname |
HostApplication | target.file.full_path |
HostApplication | target.process.command_line |
Hostname | observer.hostname |
Hostname | principal.hostname |
Hostname | target.hostname |
ImagePath | target.process.file.full_path |
IpAddress | principal.ip |
IpAddress | target.ip |
IpPort | principal.port |
IpPort | target.port |
KeyFilePath | target.file.full_path |
KeyLength | extensions.auth.auth_details |
KeyName | target.resource.name |
KeyTypeContainer | target.resource.type |
KeyTypeContainer | target.resource.type |
LayerId | about.labels.value |
LayerKey | about.labels.value |
LayerName | about.labels.value |
LayerRTID | about.labels.value |
LoadPluginFailed.PluginDllName | target.resource.name |
LogFileCleared.SubjectUserName | target.user.userid |
LogFileCleared.SubjectUserSid | target.user.windows_sid |
LogonID | target.user.userid |
LogonProcessName | target.process.file.full_path |
LogonType | extensions.auth.auth_details |
LogonType | extensions.auth.mechanism |
MappedName | about.labels.value |
MappingBy | about.labels.value |
MemberName | target.user.userid |
MemberSid | target.user.windows_sid |
Message | security_result.description |
Message | metadata.description |
Microsoft | metadata.vendor_name |
Namespace | target.file.full_path |
namespace | target.resource.type |
NewProcessId | target.process.pid |
NewProcessName | principal.process.file.full_path |
NewProcessName | target.process.file.full_path |
NewSd | target.file.full_path |
NewTargetUserName | target.user.userid |
NewUacValue | target.resource.attribute.labels |
NewValue | target.registry.registry_value_data |
NULL | principal.user.userid |
object_name | target.group.group_display_name |
ObjectClass | target.resource.type |
ObjectGUID | target.group.product_object_id |
ObjectGUID | target.resource.id |
ObjectName | target.file.full_path |
ObjectName | target.process.file.full_path |
ObjectName | target.registry.registry_key |
ObjectName | target.resource.name |
ObjectServer | target.resource.name |
ObjectType | target.resource_type |
ObjectValueName | target.registry.registry_value_name |
OldSd | src.file.full_path |
OldTargetUserName | src.user.userid |
OldUacValue | principal.resource.attribute.labels |
Operation | metadata.description |
Operation. | security_result.description |
OperationType | metadata.description |
OriginatingComputer | principal.hostname |
OriginatingComputer | principal.ip |
OSPatch | principal.platform_patch_level |
OSVersion | principal.platform_version |
param1 | principal.resource.name |
param1 | target.file.full_path |
param3 | principal.resource.name |
parsed_message | security_result.summary. |
ParentProcessName | principal.process.file.full_path |
Payload | target.process.file.full_path |
PrinterCreated.Param1 | target.resource.name |
PrivilegeList | security_result.about.resource.name |
ProcessId | principal.process.pid |
ProcessId | target.process.pid |
ProcessName | principal.process.command_line |
ProcessName | principal.process.file.full_path |
ProcessName | target.process.file.full_path |
ProcessPath | target.process.file.full_path |
ProfileChanged | target.group.group_display_name |
Properties | target.resource.id |
Protocol | network.ip_protocol |
ProviderGuid | metadata.product_log_id |
ProviderKey | about.labels.value |
ProviderName | about.labels.value |
provider_name | target.resource.name |
ProxyPolicyName | security_result.rule_id |
Reason | security_result.summary |
RecordNumber | observer.asset.product_object_id |
RestrictedAdminMode | additional.fields.value.string_value |
records.0.TenantId | metadata.product_deployment_id |
RelativeTargetName | target.file.full_path |
RemoteMachineID | target.hostname |
RuleAttr | security_result.summary |
RuleId | security_result.rule_id |
RuleId | target.resource.id |
RuleName | security_result.rule_name |
RuleName | target.resource.name |
SChannelName | extensions.auth.auth_details |
SChannelType | additional.fields.value.string_value |
ScriptName | target.file.full_path |
SecurityID | principal.user.windows_sid |
SecurityPackageName | target.file.full_path |
SERVICE | principal.resource.type |
ServiceFileName | target.process.file.full_path |
ServiceName | about.labels.value |
ServiceName | principal.application |
ServiceName | target.process.command_line |
ServiceName | target.resource.name |
ServicePrincipalNames | security_result.about.application |
ServiceSid | target.group.windows_sid |
ServiceType | target.application |
SettingType | target.resource.name |
Severity | security_result.severity |
ShareLocalPath | target.file.full_path |
ShareLocalPath RelativeTargetName | target.file.full_path |
ShareName | target.file.full_path |
ShareName | target.resource.name |
ShareName RelativeTargetName | target.file.full_path |
SourceAddress | principal.ip |
SourceHandleId | about.labels.key |
SourceModuleName | metadata.description |
SourceModuleType | observer.hostname |
SourceName | observer.application |
SourceName | principal.application |
SourceName | target.application |
SourcePort | principal.port |
SourceProcessId | src.process.pid |
Status | metadata.description |
Status - reason | security_result.description |
SubjectDomainName | principal.administrative_domain |
SubjectDomainName | target.administrative_domain |
SubjectLogonId | about.labels.value |
SubjectUserName | principal.hostname |
SubjectUserName | principal.user.user_display_name |
SubjectUserName | principal.user.userid |
SubjectUserName | target.user.userid |
SubjectUserSid | principal.user.windows_sid |
SubjectUserSid | target.user.windows_sid |
SubscriptionManagerAddress | target.url |
syslog_host | observer.hostname |
syslog_host | principal.hostname |
Target | target.administrative_domain |
TargetDomainName | target.administrative_domain |
TargetHandleId | about.labels.key |
TargetOutboundDomainName | additional.fields.value.string_value |
TargetOutboundUserName | additional.fields.value.string_value |
TargetProcessId | target.process.pid |
TargetSid | target.group.windows_sid |
TargetSid | target.resource.id |
TargetSid | target.user.windows_sid |
TargetUserName | target.group.group_display_name |
TargetUserName | target.resource.name |
TargetUserName | target.user.email_addresses |
TargetUserName | target.user.group_identifiers |
TargetUserName | target.user.user_display_name |
TargetUserName | target.user.userid |
TargetUserSid | target.user.windows_sid |
TargetUserSid | target.user.windows_sid |
TaskName | target.resource.name |
ThreadID | principal.process.pid |
TicketEncryptionType | about.resource.name |
TicketOptions | about.labels.value |
UserID | principal.user.userid |
UserID | principal.user.windows_sid |
UserID | target.user.userid |
UserName | principal.user.userid |
username | target.user.user_display_name |
username | target.user.userid |
UserName | target.user.userid |
username | principal.user.userid |
user_name | target.user.userid |
UserSid | principal.user.windows_sid |
Weight | about.labels.value |
Windows | metadata.product_name |
WINDOWS | principal.platform |
winlog.event_data.ObjectClass | target.resource.type |
winlog.event_data.ObjectGUID | target.group.product_object_id |
winlog.event_data.ObjectGUID | target.resource.id |
Workstation | principal.hostname |
Workstation | target.hostname |
WorkstationName | principal.hostname |
WorkstationName | target.hostname |
Product Event Types¶
EventID, Category | UDM Event Classification |
---|---|
16 | USER_RESOURCE_UPDATE_CONTENT |
104 | USER_RESOURCE_ACCESS |
517 | GENERIC_EVENT, USER_RESOURCE_UPDATE_CONTENT |
529 | USER_LOGIN |
600 | GENERIC_EVENT |
601 | GENERIC_EVENT, SERVICE_UNSPECIFIED |
800 | GENERIC_EVENT |
1100 | GENERIC_EVENT, SERVICE_STOP |
1102 | GENERIC_EVENT, SERVICE_STOP |
4103 | SERVICE_START |
4104 | SERVICE_START |
4622 | FILE_UNCATEGORIZED |
4624 | USER_LOGIN |
4625 | USER_LOGIN |
4627 | GROUP_UNCATEGORIZED |
4634 | USER_LOGOUT |
4648 | USER_LOGIN |
4656 | USER_RESOURCE_ACCESS |
4657 | REGISTRY_MODIFICATION |
4658 | USER_RESOURCE_ACCESS |
4660 | USER_RESOURCE_DELETION |
4661 | USER_RESOURCE_ACCESS |
4662 | USER_RESOURCE_ACCESS |
4663 | FILE_OPEN, REGISTRY_UNCATEGORIZED, PROCESS _OPEN, USER_RESOURCE_ACCESS |
4670 | FILE_MODIFICATION, REGISTRY_MODIFICATION, USER_RESOURCE_UPDATE_PERMISSIONS |
4672 | USER_LOGIN |
4673 | GENERIC_EVENT |
4674 | GENERIC_EVENT |
4688 | GENERIC_EVENT, PROCESS_LAUNCH |
4689 | GENERIC_EVENT, PROCESS_TERMINATION |
4690 | GENERIC_EVENT, PROCESS_UNCATEGORIZED |
4697 | GENERIC_EVENT,SERVICE_UNSPECIFIED |
4698 | SCHEDULED_TASK_CREATION |
4699 | SCHEDULED_TASK_DELETION |
4700 | SCHEDULED_TASK_ENABLE |
4701 | SCHEDULED_TASK_DISABLE |
4702 | SCHEDULED_TASK_MODIFICATION |
4715 | SYSTEM_AUDIT_LOG_UNCATEGORIZED |
4719 | SYSTEM_AUDIT_LOG_UNCATEGORIZED |
4720 | USER_CREATION |
4722 | USER_CHANGE_PERMISSIONS |
4723 | USER_CHANGE_PASSWORD |
4724 | USER_CHANGE_PASSWORD |
4725 | USER_CHANGE_PERMISSIONS |
4726 | USER_DELETION |
4728 | GROUP_MODIFICATION |
4729 | GROUP_MODIFICATION |
4732 | GROUP_MODIFICATION |
4733 | GROUP_MODIFICATION |
4734 | GROUP_DELETION |
4735 | GROUP_MODIFICATION |
4737 | GROUP_MODIFICATION |
4738 | USER_UNCATEGORIZED |
4740 | USER_UNCATEGORIZED |
4741 | USER_RESOURCE_CREATION |
4742 | USER_RESOURCE_UPDATE_CONTENT |
4750 | USER_RESOURCE_UPDATE_CONTENT |
4751 | USER_RESOURCE_UPDATE_CONTENT |
4752 | GROUP_MODIFICATION |
4755 | GROUP_MODIFICATION |
4756 | GROUP_MODIFICATION |
4757 | GROUP_MODIFICATION |
4765 | USER_RESOURCE_UPDATE_CONTENT |
4767 | USER_CHANGE_PERMISSIONS |
4768 | GENERIC_EVENT |
4769 | GENERIC_EVENT |
4770 | GENERIC_EVENT |
4771 | USER_LOGIN |
4772 | USER_LOGIN |
4774 | USER_UNCATEGORIZED |
4776 | USER_UNCATEGORIZED |
4777 | USER_UNCATEGORIZED |
4781 | USER_UNCATEGORIZED |
4782 | FILE_READ |
4794 | USER_RESOURCE_UPDATE_CONTENT |
4798 | GROUP_UNCATEGORIZED |
4799 | GROUP_MODIFICATION |
4800 | USER_STATS |
4801 | USER_STATS |
4946 | SETTING_MODIFICATION |
4948 | SETTING_MODIFICATION |
4950 | SETTING_MODIFICATION |
4957 | SETTING_MODIFICATION |
4964 | GROUP_MODIFICATION |
4985 | GENERIC_EVENT |
5038 | GENERIC_EVENT, FILE_UNCATEGORIZED |
5042 | SETTING_MODIFICATION |
5045 | SETTING_MODIFICATION |
5048 | SETTING_MODIFICATION |
5058 | FILE_UNCATEGORIZED, USER_RESOURCE_ACCESS |
5059 | FILE_UNCATEGORIZED, USER_RESOURCE_ACCESS |
5061 | FILE_UNCATEGORIZED, USER_RESOURCE_ACCESS |
5136 | GROUP_MODIFICATION, USER_RESOURCE_UPDATE_CONTENT |
5140 | USER_RESOURCE_ACCESS |
5142 | USER_RESOURCE_ACCESS |
5145 | USER_RESOURCE_ACCESS |
5152 | GENERIC_EVENT, NETWORK_UNCATEGORIZED |
5156 | GENERIC_EVENT, NETWORK_UNCATEGORIZED |
5447 | GENERIC_EVENT, SETTING_MODIFICATION |
5859 | SERVICE_START |
5861 | SERVICE_START |
6006 | GENERIC_EVENT, SERVICE_STOP |
7022 | GENERIC_EVENT |
7023 | GENERIC_EVENT |
7024 | GENERIC_EVENT |
7026 | GENERIC_EVENT |
7031 | GENERIC_EVENT |
7032 | GENERIC_EVENT |
7034 | GENERIC_EVENT |
7036 | GENERIC_EVENT, SERVICE_START, SERVICE_STOP |
7045 | SERVICE_CREATION |
8004 | SYSTEM_AUDIT_LOG_UNCATEGORIZED |
18452 | GENERIC_EVENT, USER_LOGIN |
18453 | USER_LOGIN, USER_UNCATEGORIZED |
18454 | USER_LOGIN, USER_UNCATEGORIZED |
18455 | USER_LOGIN, USER_UNCATEGORIZED |
18456 | GENERIC_EVENT, STATUS_UPDATE, USER_LOGIN |
30009 | USER_UNCATEGORIZED |
30010 | USER_UNCATEGORIZED |
Logoff | USER_LOGOUT |
Logon | USER_LOGIN |
Log Sample¶
<14>1 2021-10-01T11:17:35.614261-04:00 host Microsoft-Windows-Security-Auditing 532 - [NXLOG@14506 Keywords="keywords" EventType="AUDIT_SUCCESS" EventID="5145" ProviderGuid="{providerguid}" Version="0" TaskValue="12811" OpcodeValue="0" RecordNumber="recordid" ExecutionThreadID="540" Channel="Security" Category="Detailed File Share" Opcode="Info" SubjectUserSid="sid" SubjectUserName="SYSTEM" SubjectDomainName="DOMAIN" SubjectLogonId="logonid" ObjectType="File" IpAddress="10.13.100.247" IpPort="62191" ShareName="\\\\*\\SYSVOL" ShareLocalPath="\\??\\C:\\Windows\\SYSVOL_DFSR\\sysvol" RelativeTargetName="DOMAIN.local\\Policies\\{polid}\\Machine\\registry.pol" AccessMask="0x80" AccessList="%%4423 ····" AccessReason="%%4423:·%%1801·D:(A;;0x1200a9;;;WD) ····" EventReceivedTime="2021-10-01 11:17:36" SourceModuleName="MS_AD2" SourceModuleType="im_msvistalog"] A network share object was checked to see whether client can be granted desired access. · Subject: ·Security ID:··sid ·Account Name:··account ·Account Domain:··DOMAIN ·Logon ID:··logonid Network Information:· ·Object Type:··File ·Source Address:··10.13.100.247 ·Source Port:··62191 · Share Information: ·Share Name:··\\*\SYSVOL ·Share Path:··\??\C:\Windows\SYSVOL_DFSR\sysvol ·Relative Target Name:·DOMAIN.local\Policies\{polid}\Machine\registry.pol Access Request Information: ·Access Mask:··0x80 ·Accesses:··ReadAttributes ···· Access Check Results: ·ReadAttributes:·Granted by·D:(A;;0x1200a9;;;WD) ····
Sample Parsing¶
metadata.product_log_id = "{providerguid}"
metadata.event_timestamp = "2021-10-01T15:17:35.614261Z"
metadata.event_type = "USER_RESOURCE_ACCESS"
metadata.vendor_name = "Microsoft"
metadata.product_name = "Windows"
metadata.product_event_type = "5145"
metadata.description = "Detailed"
principal.hostname = "hostname"
principal.user.userid = "SYSTEM"
principal.user.windows_sid = "sid"
principal.platform = "WINDOWS"
principal.ip = "10.13.100.247"
principal.mac = "00:50:b6:e7:c5:b1"
principal.administrative_domain = "DOMAIN"
principal.asset.hostname = "hostname"
principal.asset.ip = "10.13.100.247"
principal.asset.mac = "00:50:b6:e7:c5:b1"
target.port = 62191
target.file.full_path = "domain.local\Policies\{polid}\Machine\registry.pol"
target.resource.type = "File"
target.resource.name = "\\*\SYSVOL"
observer.hostname = "hostname"
observer.application = "Microsoft-Windows-Security-Auditing"
security_result.summary = "A network share object was checked to see whether client can be granted desired access. "
extensions.auth.mechanism = "MECHANISM_UNSPECIFIED"
Parser Alerting¶
This product currently does not have any Parser-based Alerting
Rules¶
Coming Soon