Skip to content

Windows Event

Windows Event

About

The Event Viewer is a Microsoft Management Console (MMC) snap-in that enables you to browse and manage event logs. It is an indispensable tool for monitoring the health of systems and troubleshooting issues when they arise. For the latest information about Event Viewer, see Event Viewer online.

Event Viewer enables you to perform the following tasks:

  • View events from multiple event logs
  • Save useful event filters as custom views that can be reused
  • Schedule a task to run in response to an event
  • Create and manage event subscriptions

Product Details

Vendor URL: Windows Event

Product Type: OS

Product Tier: Tier III

Integration Method: Syslog

Integration URL: Windows Event - Cyderes Documentation

Log Guide: Sample Logs by Log Type

Parser Details

Log Format: JSON and Syslog

Expected Normalization Rate: 80-90%

Data Label: WINEVTLOG

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
AccessMask security_result.about.resource.name
AccessList security_result.rule_id.
Account principal.user.userid
AccountDomain target.administrative_domain
AccountName principal.user.roll_name
AccountName principal.user.user_display_name
AccountName principal.user.userid
AccountName target.user.user_display_name
AccountName target.user.userid
AccountToReset target.user.id
AccountToReset target.user.userid
AccountType principal.user.roll_description
Action about.labels.value
ad_EventRecordID metadata.product_log_id
ad_properties security_result.detection_fields.value.string_value
AdditionalInfo security_result.description
Application principal.application
appname observer.application
Arguments about.process.command_line
AttributeLDAPDisplayName target.resource.name
AttributeLDAPDisplayName target.resource.type
attribute_value target.user.userid.
attribute_value target.resource.name
AttributeValue security_reesult.rule_labels
audit.info.process.name principal.process.file.full_path
audit.target.username target.user.userid
AuthenticationPackage principal.application
AuthenticationPackageName principal.application
AuthenticationPackageName security_result.about.resource.name
AuthenticationSetId target.resource.id
AuthenticationSetName target.resource.name
CallerComputerName principal.hostname
CallerProcessName principal.process.file.full_path
CalloutKey about.labels.value
CalloutName about.labels.value
cat metadata.description
Category metadata.description
ChangeType about.labels.value
Channel security_result.summary
ClassName target.resource.resource_subtype
client_ip principal.ip
ClientUserName target.user.userid
CloudAvailabilityZone principal.cloud.availability_zone
Command about.process.command_line
CommandLine principal.process.command_line
CommandName target.application
complete_username principal.user.userid
Computer principal.hostname
Computer target.resource.type
Computer: DocumentPrinted.Param4 target.asset.asset_id
Conditions about.labels.value
ConnectionSecurityRuleId target.resource.id
ConnectionSecurityRuleName target.resource.name
CryptographicSetId target.resource.id
CryptographicSetName target.resource.name
Data_1 principal.ip
Data_2 target.url
Data1 target.user.userid
Data2 target.user.user_display_name
database_name target.hostname
DestAddress target.ip
DestMACAddress target.mac
DestPort target.port
DEVICE principal.resource.type
DeviceDescription target.resource.name
deviceNtDomain principal.administrative_domain
DfsNamespace target.resource.name
Direction network.direction
dntdom target.administrative_domain
DocumentPrinted.Param3 target.user.user_display_name
DocumentPrinted.Param5 target.resource.name
DocumentPrinted.Param7 target.file.size
Domain principal.administrative_domain
Domain target.administrative_domain
domain target.administration_domain
DomainName target.administrative_domain
dproc target.process.file.full_path
dst target.ip
duid about.labels.value
dvc principal.ip
dvchost principal.hostname
event_params.HostApplication target.file.full_path
event_params.UserId principal.user.userid
event_type observer.application
EventCode metadata.product_event_type
EventID metadata.product_event_type
EventIDCode metadata.product_event_type
EventType security_result.summary.
ExecutionProcessId principal.process.pid
ExecutionProcessID target.process.pid
file_full_path target.process.file.full_path
filename target.file.full_path
filePath target.file.full_path
FilterId target.resource.id
FilterId security_result.rule_id
FilterKey about.labels.value
FilterName target.resource.name
FilterRTID security_result.rule_id
FilterType about.labels.value
GroupMembership target.user.group_identifiers
GroupName target.group.group_display_name
HiveName target.registry.registry_key
host principal.hostname
host principal.hostname
host.name principal.hostname
HostApplication target.file.full_path
HostApplication target.process.command_line
Hostname observer.hostname
Hostname principal.hostname
Hostname target.hostname
ImagePath target.process.file.full_path
IpAddress principal.ip
IpAddress target.ip
IpPort principal.port
IpPort target.port
KeyFilePath target.file.full_path
KeyLength extensions.auth.auth_details
KeyName target.resource.name
KeyTypeContainer target.resource.type
KeyTypeContainer target.resource.type
LayerId about.labels.value
LayerKey about.labels.value
LayerName about.labels.value
LayerRTID about.labels.value
LoadPluginFailed.PluginDllName target.resource.name
LogFileCleared.SubjectUserName target.user.userid
LogFileCleared.SubjectUserSid target.user.windows_sid
LogonID target.user.userid
LogonProcessName target.process.file.full_path
LogonType extensions.auth.auth_details
LogonType extensions.auth.mechanism
MappedName about.labels.value
MappingBy about.labels.value
MemberName target.user.userid
MemberSid target.user.windows_sid
Message security_result.description
Message metadata.description
Microsoft metadata.vendor_name
Namespace target.file.full_path
namespace target.resource.type
NewProcessId target.process.pid
NewProcessName principal.process.file.full_path
NewProcessName target.process.file.full_path
NewSd target.file.full_path
NewTargetUserName target.user.userid
NewUacValue target.resource.attribute.labels
NewValue target.registry.registry_value_data
NULL principal.user.userid
object_name target.group.group_display_name
ObjectClass target.resource.type
ObjectGUID target.group.product_object_id
ObjectGUID target.resource.id
ObjectName target.file.full_path
ObjectName target.process.file.full_path
ObjectName target.registry.registry_key
ObjectName target.resource.name
ObjectServer target.resource.name
ObjectType target.resource_type
ObjectValueName target.registry.registry_value_name
OldSd src.file.full_path
OldTargetUserName src.user.userid
OldUacValue principal.resource.attribute.labels
Operation metadata.description
Operation. security_result.description
OperationType metadata.description
OriginatingComputer principal.hostname
OriginatingComputer principal.ip
OSPatch principal.platform_patch_level
OSVersion principal.platform_version
param1 principal.resource.name
param1 target.file.full_path
param3 principal.resource.name
parsed_message security_result.summary.
ParentProcessName principal.process.file.full_path
Payload target.process.file.full_path
PrinterCreated.Param1 target.resource.name
PrivilegeList security_result.about.resource.name
ProcessId principal.process.pid
ProcessId target.process.pid
ProcessName principal.process.command_line
ProcessName principal.process.file.full_path
ProcessName target.process.file.full_path
ProcessPath target.process.file.full_path
ProfileChanged target.group.group_display_name
Properties target.resource.id
Protocol network.ip_protocol
ProviderGuid metadata.product_log_id
ProviderKey about.labels.value
ProviderName about.labels.value
provider_name target.resource.name
ProxyPolicyName security_result.rule_id
Reason security_result.summary
RecordNumber observer.asset.product_object_id
RestrictedAdminMode additional.fields.value.string_value
records.0.TenantId metadata.product_deployment_id
RelativeTargetName target.file.full_path
RemoteMachineID target.hostname
RuleAttr security_result.summary
RuleId security_result.rule_id
RuleId target.resource.id
RuleName security_result.rule_name
RuleName target.resource.name
SChannelName extensions.auth.auth_details
SChannelType additional.fields.value.string_value
ScriptName target.file.full_path
SecurityID principal.user.windows_sid
SecurityPackageName target.file.full_path
SERVICE principal.resource.type
ServiceFileName target.process.file.full_path
ServiceName about.labels.value
ServiceName principal.application
ServiceName target.process.command_line
ServiceName target.resource.name
ServicePrincipalNames security_result.about.application
ServiceSid target.group.windows_sid
ServiceType target.application
SettingType target.resource.name
Severity security_result.severity
ShareLocalPath target.file.full_path
ShareLocalPath RelativeTargetName target.file.full_path
ShareName target.file.full_path
ShareName target.resource.name
ShareName RelativeTargetName target.file.full_path
SourceAddress principal.ip
SourceHandleId about.labels.key
SourceModuleName metadata.description
SourceModuleType observer.hostname
SourceName observer.application
SourceName principal.application
SourceName target.application
SourcePort principal.port
SourceProcessId src.process.pid
Status metadata.description
Status - reason security_result.description
SubjectDomainName principal.administrative_domain
SubjectDomainName target.administrative_domain
SubjectLogonId about.labels.value
SubjectUserName principal.hostname
SubjectUserName principal.user.user_display_name
SubjectUserName principal.user.userid
SubjectUserName target.user.userid
SubjectUserSid principal.user.windows_sid
SubjectUserSid target.user.windows_sid
SubscriptionManagerAddress target.url
syslog_host observer.hostname
syslog_host principal.hostname
Target target.administrative_domain
TargetDomainName target.administrative_domain
TargetHandleId about.labels.key
TargetOutboundDomainName additional.fields.value.string_value
TargetOutboundUserName additional.fields.value.string_value
TargetProcessId target.process.pid
TargetSid target.group.windows_sid
TargetSid target.resource.id
TargetSid target.user.windows_sid
TargetUserName target.group.group_display_name
TargetUserName target.resource.name
TargetUserName target.user.email_addresses
TargetUserName target.user.group_identifiers
TargetUserName target.user.user_display_name
TargetUserName target.user.userid
TargetUserSid target.user.windows_sid
TargetUserSid target.user.windows_sid
TaskName target.resource.name
ThreadID principal.process.pid
TicketEncryptionType about.resource.name
TicketOptions about.labels.value
UserID principal.user.userid
UserID principal.user.windows_sid
UserID target.user.userid
UserName principal.user.userid
username target.user.user_display_name
username target.user.userid
UserName target.user.userid
username principal.user.userid
user_name target.user.userid
UserSid principal.user.windows_sid
Weight about.labels.value
Windows metadata.product_name
WINDOWS principal.platform
winlog.event_data.ObjectClass target.resource.type
winlog.event_data.ObjectGUID target.group.product_object_id
winlog.event_data.ObjectGUID target.resource.id
Workstation principal.hostname
Workstation target.hostname
WorkstationName principal.hostname
WorkstationName target.hostname

Product Event Types

EventID, Category UDM Event Classification
16 USER_RESOURCE_UPDATE_CONTENT
104 USER_RESOURCE_ACCESS
517 GENERIC_EVENT, USER_RESOURCE_UPDATE_CONTENT
529 USER_LOGIN
600 GENERIC_EVENT
601 GENERIC_EVENT, SERVICE_UNSPECIFIED
800 GENERIC_EVENT
1100 GENERIC_EVENT, SERVICE_STOP
1102 GENERIC_EVENT, SERVICE_STOP
4103 SERVICE_START
4104 SERVICE_START
4622 FILE_UNCATEGORIZED
4624 USER_LOGIN
4625 USER_LOGIN
4627 GROUP_UNCATEGORIZED
4634 USER_LOGOUT
4648 USER_LOGIN
4656 USER_RESOURCE_ACCESS
4657 REGISTRY_MODIFICATION
4658 USER_RESOURCE_ACCESS
4660 USER_RESOURCE_DELETION
4661 USER_RESOURCE_ACCESS
4662 USER_RESOURCE_ACCESS
4663 FILE_OPEN, REGISTRY_UNCATEGORIZED, PROCESS _OPEN, USER_RESOURCE_ACCESS
4670 FILE_MODIFICATION, REGISTRY_MODIFICATION, USER_RESOURCE_UPDATE_PERMISSIONS
4672 USER_LOGIN
4673 GENERIC_EVENT
4674 GENERIC_EVENT
4688 GENERIC_EVENT, PROCESS_LAUNCH
4689 GENERIC_EVENT, PROCESS_TERMINATION
4690 GENERIC_EVENT, PROCESS_UNCATEGORIZED
4697 GENERIC_EVENT,SERVICE_UNSPECIFIED
4698 SCHEDULED_TASK_CREATION
4699 SCHEDULED_TASK_DELETION
4700 SCHEDULED_TASK_ENABLE
4701 SCHEDULED_TASK_DISABLE
4702 SCHEDULED_TASK_MODIFICATION
4715 SYSTEM_AUDIT_LOG_UNCATEGORIZED
4719 SYSTEM_AUDIT_LOG_UNCATEGORIZED
4720 USER_CREATION
4722 USER_CHANGE_PERMISSIONS
4723 USER_CHANGE_PASSWORD
4724 USER_CHANGE_PASSWORD
4725 USER_CHANGE_PERMISSIONS
4726 USER_DELETION
4728 GROUP_MODIFICATION
4729 GROUP_MODIFICATION
4732 GROUP_MODIFICATION
4733 GROUP_MODIFICATION
4734 GROUP_DELETION
4735 GROUP_MODIFICATION
4737 GROUP_MODIFICATION
4738 USER_UNCATEGORIZED
4740 USER_UNCATEGORIZED
4741 USER_RESOURCE_CREATION
4742 USER_RESOURCE_UPDATE_CONTENT
4750 USER_RESOURCE_UPDATE_CONTENT
4751 USER_RESOURCE_UPDATE_CONTENT
4752 GROUP_MODIFICATION
4755 GROUP_MODIFICATION
4756 GROUP_MODIFICATION
4757 GROUP_MODIFICATION
4765 USER_RESOURCE_UPDATE_CONTENT
4767 USER_CHANGE_PERMISSIONS
4768 GENERIC_EVENT
4769 GENERIC_EVENT
4770 GENERIC_EVENT
4771 USER_LOGIN
4772 USER_LOGIN
4774 USER_UNCATEGORIZED
4776 USER_UNCATEGORIZED
4777 USER_UNCATEGORIZED
4781 USER_UNCATEGORIZED
4782 FILE_READ
4794 USER_RESOURCE_UPDATE_CONTENT
4798 GROUP_UNCATEGORIZED
4799 GROUP_MODIFICATION
4800 USER_STATS
4801 USER_STATS
4946 SETTING_MODIFICATION
4948 SETTING_MODIFICATION
4950 SETTING_MODIFICATION
4957 SETTING_MODIFICATION
4964 GROUP_MODIFICATION
4985 GENERIC_EVENT
5038 GENERIC_EVENT, FILE_UNCATEGORIZED
5042 SETTING_MODIFICATION
5045 SETTING_MODIFICATION
5048 SETTING_MODIFICATION
5058 FILE_UNCATEGORIZED, USER_RESOURCE_ACCESS
5059 FILE_UNCATEGORIZED, USER_RESOURCE_ACCESS
5061 FILE_UNCATEGORIZED, USER_RESOURCE_ACCESS
5136 GROUP_MODIFICATION, USER_RESOURCE_UPDATE_CONTENT
5140 USER_RESOURCE_ACCESS
5142 USER_RESOURCE_ACCESS
5145 USER_RESOURCE_ACCESS
5152 GENERIC_EVENT, NETWORK_UNCATEGORIZED
5156 GENERIC_EVENT, NETWORK_UNCATEGORIZED
5447 GENERIC_EVENT, SETTING_MODIFICATION
5859 SERVICE_START
5861 SERVICE_START
6006 GENERIC_EVENT, SERVICE_STOP
7022 GENERIC_EVENT
7023 GENERIC_EVENT
7024 GENERIC_EVENT
7026 GENERIC_EVENT
7031 GENERIC_EVENT
7032 GENERIC_EVENT
7034 GENERIC_EVENT
7036 GENERIC_EVENT, SERVICE_START, SERVICE_STOP
7045 SERVICE_CREATION
8004 SYSTEM_AUDIT_LOG_UNCATEGORIZED
18452 GENERIC_EVENT, USER_LOGIN
18453 USER_LOGIN, USER_UNCATEGORIZED
18454 USER_LOGIN, USER_UNCATEGORIZED
18455 USER_LOGIN, USER_UNCATEGORIZED
18456 GENERIC_EVENT, STATUS_UPDATE, USER_LOGIN
30009 USER_UNCATEGORIZED
30010 USER_UNCATEGORIZED
Logoff USER_LOGOUT
Logon USER_LOGIN

Log Sample

<14>1 2021-10-01T11:17:35.614261-04:00 host Microsoft-Windows-Security-Auditing 532 - [NXLOG@14506 Keywords="keywords" EventType="AUDIT_SUCCESS" EventID="5145" ProviderGuid="{providerguid}" Version="0" TaskValue="12811" OpcodeValue="0" RecordNumber="recordid" ExecutionThreadID="540" Channel="Security" Category="Detailed File Share" Opcode="Info" SubjectUserSid="sid" SubjectUserName="SYSTEM" SubjectDomainName="DOMAIN" SubjectLogonId="logonid" ObjectType="File" IpAddress="10.13.100.247" IpPort="62191" ShareName="\\\\*\\SYSVOL" ShareLocalPath="\\??\\C:\\Windows\\SYSVOL_DFSR\\sysvol" RelativeTargetName="DOMAIN.local\\Policies\\{polid}\\Machine\\registry.pol" AccessMask="0x80" AccessList="%%4423 ····" AccessReason="%%4423:·%%1801·D:(A;;0x1200a9;;;WD) ····" EventReceivedTime="2021-10-01 11:17:36" SourceModuleName="MS_AD2" SourceModuleType="im_msvistalog"] A network share object was checked to see whether client can be granted desired access.  ·  Subject:  ·Security ID:··sid  ·Account Name:··account  ·Account Domain:··DOMAIN  ·Logon ID:··logonid    Network Information:·  ·Object Type:··File  ·Source Address:··10.13.100.247  ·Source Port:··62191  ·  Share Information:  ·Share Name:··\\*\SYSVOL  ·Share Path:··\??\C:\Windows\SYSVOL_DFSR\sysvol  ·Relative Target Name:·DOMAIN.local\Policies\{polid}\Machine\registry.pol    Access Request Information:  ·Access Mask:··0x80  ·Accesses:··ReadAttributes  ····  Access Check Results:  ·ReadAttributes:·Granted by·D:(A;;0x1200a9;;;WD)  ····  

Sample Parsing

metadata.product_log_id = "{providerguid}"
metadata.event_timestamp = "2021-10-01T15:17:35.614261Z"
metadata.event_type = "USER_RESOURCE_ACCESS"
metadata.vendor_name = "Microsoft"
metadata.product_name = "Windows"
metadata.product_event_type = "5145"
metadata.description = "Detailed"
principal.hostname = "hostname"
principal.user.userid = "SYSTEM"
principal.user.windows_sid = "sid"
principal.platform = "WINDOWS"
principal.ip = "10.13.100.247"
principal.mac = "00:50:b6:e7:c5:b1"
principal.administrative_domain = "DOMAIN"
principal.asset.hostname = "hostname"
principal.asset.ip = "10.13.100.247"
principal.asset.mac = "00:50:b6:e7:c5:b1"
target.port = 62191
target.file.full_path = "domain.local\Policies\{polid}\Machine\registry.pol"
target.resource.type = "File"
target.resource.name = "\\*\SYSVOL"
observer.hostname = "hostname"
observer.application = "Microsoft-Windows-Security-Auditing"
security_result.summary = "A network share object was checked to see whether client can be granted desired access. "
extensions.auth.mechanism = "MECHANISM_UNSPECIFIED"

Parser Alerting

This product currently does not have any Parser-based Alerting

Rules

Coming Soon