Windows Security Log Quick Reference

This entry is part 20 of 28 in the series Threat Detection Engineering

Views: 22

🛡️ For Cybersecurity Defensive Operations and IR/Threat Hunting


🔐 Authentication Events

Article content

🗝️ Account Management Events

Article content

📂 Object Access Events

Article content

Note: Requires enabling object auditing via GPO and SACLs.


🧰 Privilege Use and Logon Types

Article content

PRO Tip: Use Logon Type + Event 4624/4625 to spot RDP logins, scheduled tasks, or lateral movement attempts.


⚙️ System and Service Events

Article content

🧠 Key Hunting & Investigation Tips

  • 🔍 Look for Logon Type 10 (RDP) with Event ID 4624 to detect potential RDP access.
  • 🧪 Failed logons (4625) with high volume or unusual usernames may indicate brute force.
  • 🛠️ 4720 + 4728 (Account created + added to group) in quick succession → potential admin backdoor.
  • 🧼 1102 + cleared logs → possible anti-forensics.
  • 🚩 4663 with Delete or WriteData access on sensitive files = possible data tampering or exfiltration.

⚙️ Suggested Audit Policy Configuration

To fully benefit from this log reference, enable these audit policies via GPO:

📁 Local Policies → Audit Policy

  • Audit account logon events ✅ Success/Failure
  • Audit logon events ✅ Success/Failure
  • Audit object access ✅ Success/Failure
  • Audit privilege use ✅ Success
  • Audit account management ✅ Success/Failure

🧩 Advanced Audit Policy Configuration

  • Audit Credential Validation
  • Audit Logon
  • Audit Account Lockout
  • Audit Special Logon
  • Audit Detailed File Share
  • Audit Security Group Management
Article content
Series Navigation<< SIEM: Onboarding WIndows ServersOpenCTI – Open Source Threat Intelligence Platform: PART I >>