Windows Events log for IR/Forensics ,Part 1

Published: 2016-09-18. Last Updated: 2016-09-18 17:16:01 UTC
by Basil Alawi S.Taher (Version: 1)
3 comment(s)

In the time of incidents, Windows Event logs provide a plenty of useful information for the Incident responder.As you know Windows can generate thousands of events in few minutes ,in this diary I will talk about some of the most useful events and in the next diary I would discuss how to use PowerShell to search for them .

Here is of the most useful events for Forensics/Incident response:

Event ID

Description

Log Name

4624

Successful Logon

Security

4625

Failed Login

Security

4776

Successful /Failed Account Authentication

Security

4720

A user account was created

Security

4732

A member was added to a

security-enabled local group

Security

4728

A member was added to a security-enabled global group

Security

7030

Service Creation Errors

System

7045

Service Creation

System

 

 

One of the useful information that Successful/Failed Logon event provide is how the user/process tried to logon  (Logon Type ) but Windows display this information as a number and here is a list of the logon type and their explanation

Logon Type

Explanation

2

Logon via console

3

Network Logon, A user or computer logged on to this computer from the network.

4

Batch logon

5

Windows Service Logon

7

Credentials used to unlock screen

8

Network logon sending credentials (cleartext)

9

Different credentials used than logged on user

10

Remote interactive logon (RDP)

11

Cached credentials used to logon

12

Cached remote interactive

13

Cached unlock (Similar to logon type 7)

 

In the next diary I would show some examples how to use PowerShell  to search Windows Events of a compromised system 

 

 

Keywords:
3 comment(s)

Comments


Diary Archives