Windows Security Events

Common entries

Some common entries (grouped by category) are:

Logon

Keyword Event ID Description
Audit Success 4624 An account was successfully logged on
Audit Failure 4625 An account failed to log on
Audit Success 4648 A logon was attempted using explicit credentials

Logoff

Keyword Event ID Description
Audit Success 4634 An account was logged off

User Account Management

Keyword Event ID Description
Audit Success 4722 A user account was enabled
Audit Success 4723 An attempt was made to change an account’s password
Audit Success 4725 A user account was disabled
Audit Success 4738 A user account was changed
Audit Success 4740 A user account was locked out

The User Account Management category should only be present on domain controllers

Useful custom query

A useful custom query that can’t be achieved simply through a filter is:

Get logon and logoff events for a specific user

<QueryList>
  <Query Id="0" Path="Security">
    <Select Path="Security">
      *[
        EventData[Data[@Name='TargetUserName']='{:Username:}']
        and
        System[ (EventID &gt;= 4620 and EventID &lt;= 4639) ]
      ]
    </Select>
  </Query>
</QueryList>

Tags: #Os #Windows