Windows Logging Hub

Event View

Event Viewer is a Windows tool that shows detailed logs of events like errors, warnings, and successful actions on a system. It's an essential component for troubleshooting, system diagnostics, and monitoring the overall health of your computer by providing a centralized location to review system, security, and application logs.

--- Logon / Logoff Events ---
Event ID 4624: Successful Account Logon - Windows Event Logs
Event ID 4625: Failed Account Logon - Windows Event Logs
Event ID 4634: Account Logoff - Windows Event Logs
Event ID 4647: User-Initiated Logoff - Windows Event Logs
Event ID 4800: The Workstation Was Locked - Windows Event Logs
Event ID 4801: The Workstation Was Unlocked - Windows Event Logs

--- Privilege / Account Management ---
Event ID 4672: Special Privileges Assigned to New Logon - Windows Event Logs
Event ID 4720: A User Account Was Created - Windows Event Logs
Event ID 4722: A User Account Was Enabled - Windows Event Logs
Event ID 4723: An Attempt Was Made to Change an Account's Password - Windows Event Logs
Event ID 4724: An Attempt Was Made to Reset an Account's Password - Windows Event Logs
Event ID 4725: A User Account Was Disabled - Windows Event Logs
Event ID 4726: A User Account Was Deleted - Windows Event Logs
Event ID 4732: A Member Was Added to a Security-Enabled Local Group - Windows Event Logs
Event ID 4733: A Member Was Removed from a Security-Enabled Local Group - Windows Event Logs
Event ID 4756: A Member Was Added to a Security-Enabled Universal Group - Windows Event Logs
Event ID 4757: A Member Was Removed from a Security-Enabled Universal Group - Windows Event Logs

--- Process / Execution ---
Event ID 4688: A New Process Has Been Created - Windows Event Logs
Event ID 4689: A Process Has Ended - Windows Event Logs
Event ID 4697: A Service Was Installed in the System - Windows Event Logs
Event ID 4700: Scheduled Task Created - Windows Event Logs
Event ID 4702: Scheduled Task Updated - Windows Event Logs

--- Authentication / Kerberos ---
Event ID 4768: A Kerberos Authentication Ticket (TGT) Was Requested - Windows Event Logs
Event ID 4769: A Kerberos Service Ticket Was Requested - Windows Event Logs
Event ID 4771: Kerberos Pre-Authentication Failed - Windows Event Logs
Event ID 4776: The Computer Attempted to Validate the Credentials for an Account - Windows Event Logs
Event ID 4798: A User's Local Group Membership Was Enumerated - Windows Event Logs

--- System / Security Changes ---
Event ID 4719: System Audit Policy Changed - Windows Event Logs
Event ID 5031: The Windows Firewall Service Was Stopped - Windows Event Logs
Event ID 5032: The Windows Firewall Settings Were Changed - Windows Event Logs
Event ID 5058: Keyfile Operation - Windows Event Logs

XML template

Important Filters

Combine Filters

Sysmon

System Monitor (Sysmon) is a Windows system service and device driver that remains resident across system reboots to monitor and log system activity to the Windows event log. Sysmon provides detailed information about process creation, network connections, changes to file creation time, and more.

Sysmon event IDs

Installing Sysmon

Download: https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon

Get-WinEvent

Get-WinEvent is a PowerShell cmdlet used to retrieve events from Windows event logs and Event Tracing for Windows (ETW) logs, enabling administrators to filter, analyze, and automate tasks related to system and application events. It is more powerful and efficient than older cmdlets for querying and filtering events, especially for complex criteria like specific event IDs, log names, and times.

Basic Queries

Advanced queries

Search to identify the Event Structure: event id 1 properties sysmon

Filter by date range

Filter by suspicious IP traffic

Identify a DLL hijacking attack

Identify LSASS dump

Detecting Strange Parent Child Relationship

Filter by using XPath

Detect installation of Sysinternals tools

Filter By XML file as Query

Last updated