Windows Security Log Quick Reference

This entry is part 20 of 25 in the series Threat Detection Engineering

Views: 3

๐Ÿ›ก๏ธ For Cybersecurity Defensive Operations and IR/Threat Hunting


๐Ÿ” Authentication Events

Article content

๐Ÿ—๏ธ Account Management Events

Article content

๐Ÿ“‚ Object Access Events

Article content

โœ… Note: Requires enabling object auditing via GPO and SACLs.


๐Ÿงฐ Privilege Use and Logon Types

Article content

PRO Tip: Use Logon Type + Event 4624/4625 to spot RDP logins, scheduled tasks, or lateral movement attempts.


โš™๏ธ System and Service Events

Article content

๐Ÿง  Key Hunting & Investigation Tips

  • ๐Ÿ” Look for Logon Type 10 (RDP) with Event ID 4624 to detect potential RDP access.
  • ๐Ÿงช Failed logons (4625) with high volume or unusual usernames may indicate brute force.
  • ๐Ÿ› ๏ธ 4720 + 4728 (Account created + added to group) in quick succession โ†’ potential admin backdoor.
  • ๐Ÿงผ 1102 + cleared logs โ†’ possible anti-forensics.
  • ๐Ÿšฉ 4663 with Delete or WriteData access on sensitive files = possible data tampering or exfiltration.

โš™๏ธ Suggested Audit Policy Configuration

To fully benefit from this log reference, enable these audit policies via GPO:

๐Ÿ“ Local Policies โ†’ Audit Policy

  • Audit account logon events โœ… Success/Failure
  • Audit logon events โœ… Success/Failure
  • Audit object access โœ… Success/Failure
  • Audit privilege use โœ… Success
  • Audit account management โœ… Success/Failure

๐Ÿงฉ Advanced Audit Policy Configuration

  • Audit Credential Validation
  • Audit Logon
  • Audit Account Lockout
  • Audit Special Logon
  • Audit Detailed File Share
  • Audit Security Group Management
Article content
Series Navigation<< SIEM: Onboarding WIndows Servers