Windows Events log for IR/Forensics ,Part 1
In the time of incidents, Windows Event logs provide a plenty of useful information for the Incident responder.As you know Windows can generate thousands of events in few minutes ,in this diary I will talk about some of the most useful events and in the next diary I would discuss how to use PowerShell to search for them .
Here is of the most useful events for Forensics/Incident response:
Event ID |
Description |
Log Name |
4624 |
Successful Logon |
Security |
4625 |
Failed Login |
Security |
4776 |
Successful /Failed Account Authentication |
Security |
4720 |
A user account was created |
Security |
4732 |
A member was added to a security-enabled local group |
Security |
4728 |
A member was added to a security-enabled global group |
Security |
7030 |
Service Creation Errors |
System |
7045 |
Service Creation |
System |
One of the useful information that Successful/Failed Logon event provide is how the user/process tried to logon (Logon Type ) but Windows display this information as a number and here is a list of the logon type and their explanation
Logon Type |
Explanation |
2 |
Logon via console |
3 |
Network Logon, A user or computer logged on to this computer from the network. |
4 |
Batch logon |
5 |
Windows Service Logon |
7 |
Credentials used to unlock screen |
8 |
Network logon sending credentials (cleartext) |
9 |
Different credentials used than logged on user |
10 |
Remote interactive logon (RDP) |
11 |
Cached credentials used to logon |
12 |
Cached remote interactive |
13 |
Cached unlock (Similar to logon type 7) |
In the next diary I would show some examples how to use PowerShell to search Windows Events of a compromised system
Comments